diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25083.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25083.json index a57452dd3a3..e4c03108234 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25083.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25083.json @@ -2,7 +2,7 @@ "id": "CVE-2018-25083", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-27T03:15:07.103", - "lastModified": "2024-11-21T04:03:31.223", + "lastModified": "2025-02-24T20:15:31.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3923.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3923.json index 3d16eb3b907..96e5711c77a 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3923.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3923.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3923", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T21:15:09.980", - "lastModified": "2024-11-21T06:22:47.100", + "lastModified": "2025-02-24T20:15:31.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2237.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2237.json index 5df8998aa52..5f28f920b95 100644 --- a/CVE-2022/CVE-2022-22xx/CVE-2022-2237.json +++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2237.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2237", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T22:15:11.817", - "lastModified": "2024-11-21T07:00:35.877", + "lastModified": "2025-02-24T20:15:31.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json index b8a9de1ab97..6a36d7fe495 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3116", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T22:15:11.987", - "lastModified": "2024-11-21T07:18:51.613", + "lastModified": "2025-02-24T19:15:12.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48348.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48348.json index 007e1fd7893..c147b0281a9 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48348.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48348.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48348", "sourceIdentifier": "psirt@huawei.com", "published": "2023-03-27T22:15:19.703", - "lastModified": "2024-11-21T07:33:13.483", + "lastModified": "2025-02-24T19:15:14.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48349.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48349.json index daba321d719..04b8f3793dc 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48349.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48349.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48349", "sourceIdentifier": "psirt@huawei.com", "published": "2023-03-27T22:15:19.920", - "lastModified": "2024-11-21T07:33:13.603", + "lastModified": "2025-02-24T19:15:14.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21044.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21044.json index f4636b8bf81..44fec2d2267 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21044.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21044.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21044", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.090", - "lastModified": "2024-11-21T07:42:03.433", + "lastModified": "2025-02-24T20:15:32.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21045.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21045.json index 98ce41c4177..8821fc0b527 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21045.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21045.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21045", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.127", - "lastModified": "2024-11-21T07:42:03.543", + "lastModified": "2025-02-24T20:15:32.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21048.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21048.json index 34aa6ef6446..5d7433c7b19 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21048.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21048", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.230", - "lastModified": "2024-11-21T07:42:03.887", + "lastModified": "2025-02-24T20:15:32.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10222.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10222.json index ee1a39bc61d..578109c948d 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10222.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10222.json @@ -2,20 +2,24 @@ "id": "CVE-2024-10222", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-21T14:15:30.680", - "lastModified": "2025-02-21T14:15:30.680", - "vulnStatus": "Received", + "lastModified": "2025-02-24T19:43:57.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors." + }, + { + "lang": "es", + "value": "El complemento SVG Support para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de la carga de archivos SVG en todas las versiones hasta la 2.5.10 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG. De forma predeterminada, esto solo puede ser explotado por administradores, pero la capacidad de cargar archivos SVG se puede extender a los autores." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,22 +71,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:benbodhi:svg_support:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.11", + "matchCriteriaId": "6B2AC543-F85D-4054-9F0B-87A2B454E8C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/benbodhi/svg-support/commit/eee3e13b650511c9cc9ee0746be485d031c7c072", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3244181/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/svg-support/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5852f08d-0506-464e-afd1-c625e4034e1d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json index da7463f38ae..74bb20a5f69 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13775", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T13:15:22.847", - "lastModified": "2025-02-01T13:15:22.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-24T19:04:52.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanquish:woocommerce_support_ticket_system:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "17.9", + "matchCriteriaId": "B35A75C3-0BB3-4F28-85ED-4EC10AD20DBD" + } + ] + } + ] + } + ], "references": [ { "url": "https://codecanyon.net/item/woocommerce-support-ticket-system/17930050#item-description__change-log", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72dc919a-c13d-49b4-927d-a0bb837b63dd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json index 85cea7fb888..860483bc0ce 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45781", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-18T20:15:19.450", - "lastModified": "2025-02-18T20:15:19.450", - "vulnStatus": "Received", + "lastModified": "2025-02-24T19:15:14.423", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-45781", diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json index 9ba85f40e4f..640c839e14f 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57160", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.817", - "lastModified": "2025-01-31T21:15:10.910", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T19:38:22.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + "criteria": "cpe:2.3:a:07fly:customer_relationship_management:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "AFD4EA7E-A093-40CF-98BB-85A410F39D2B" } ] } diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json index bc432066368..dcb5477bf52 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57161", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.937", - "lastModified": "2025-01-31T21:15:11.153", - "vulnStatus": "Modified", + "lastModified": "2025-02-24T19:38:43.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + "criteria": "cpe:2.3:a:07fly:customer_relationship_management:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "AFD4EA7E-A093-40CF-98BB-85A410F39D2B" } ] } diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1489.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1489.json index 6fb1aabc04d..cb39581fe91 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1489.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1489.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1489", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-21T12:15:30.740", - "lastModified": "2025-02-21T12:15:30.740", - "vulnStatus": "Received", + "lastModified": "2025-02-24T19:45:21.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP-Appbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's appbox shortcode in all versions up to, and including, 4.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP-Appbox para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto de piecal del complemento en todas las versiones hasta la 1.2.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tchgdns:wp-appbox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.5", + "matchCriteriaId": "FC6736B3-6866-4D30-B6F4-D3A027FBFE1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3244084/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-appbox/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d58355d-2762-4ecc-aec2-52a1e3323017?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26525.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26525.json new file mode 100644 index 00000000000..f57fa23b9aa --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26525.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26525", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.103", + "lastModified": "2025-02-24T20:15:33.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient sanitizing in the TeX notation filter resulted in an \narbitrary file read risk on sites where pdfTeX is available (such as \nthose with TeX Live installed)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84136", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466141", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26526.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26526.json new file mode 100644 index 00000000000..067495dd4e0 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26526.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26526", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.263", + "lastModified": "2025-02-24T20:15:33.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Separate Groups mode restrictions were not factored into permission \nchecks before allowing viewing or deletion of responses in Feedback \nactivities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79976", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466142", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26527.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26527.json new file mode 100644 index 00000000000..aa514a2b2d3 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26527.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26527", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.403", + "lastModified": "2025-02-24T20:15:33.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1230" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-83941", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466143", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26528.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26528.json new file mode 100644 index 00000000000..a17b438bb89 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26528.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26528", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.543", + "lastModified": "2025-02-24T20:15:33.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 3.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82896", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466144", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26529.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26529.json new file mode 100644 index 00000000000..9c6e6f03f0b --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26529.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26529", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.677", + "lastModified": "2025-02-24T20:15:33.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Description information displayed in the site administration live log \nrequired additional sanitizing to prevent a stored XSS risk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84145", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466145", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26530.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26530.json new file mode 100644 index 00000000000..aee3cdcf98a --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26530.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26530", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.807", + "lastModified": "2025-02-24T20:15:33.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The question bank filter required additional sanitizing to prevent a reflected XSS risk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84146", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466146", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26531.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26531.json new file mode 100644 index 00000000000..dca3de2a6ae --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26531.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26531", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:33.933", + "lastModified": "2025-02-24T20:15:33.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient capability checks made it possible to disable badges a user does not have permission to access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84239", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466148", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26532.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26532.json new file mode 100644 index 00000000000..4db1ded3330 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26532.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26532", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-02-24T20:15:34.053", + "lastModified": "2025-02-24T20:15:34.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84003", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=466149", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27112.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27112.json new file mode 100644 index 00000000000..464e0c785ce --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27112.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27112", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-24T19:15:14.597", + "lastModified": "2025-02-24T19:15:14.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials. An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails with a \"permission denied\" error due to insufficient permissions, limiting the impact to unauthorized viewing of information. Version 0.54.5 contains a patch for this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/navidrome/navidrome/commit/287079a9e409fb6b9708ca384d7daa7b5185c1a0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-c3p4-vm8f-386p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json new file mode 100644 index 00000000000..7f0e694505e --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27133.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27133", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-24T19:15:14.763", + "lastModified": "2025-02-24T19:15:14.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27364.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27364.json new file mode 100644 index 00000000000..27ed3cbf38a --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27364.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2025-27364", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-24T19:15:14.917", + "lastModified": "2025-02-24T20:15:34.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mitre/caldera/commit/35bc06e42e19fe7efbc008999b9f993b1b7109c0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mitre/caldera/pull/3129", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mitre/caldera/pull/3131/commits/61de40f92a595bed462372a5e676c2e5a32d1050", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mitre/caldera/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mitre/caldera/security", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b7efda38d04..858736ca53f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-24T19:00:56.224341+00:00 +2025-02-24T21:00:43.964845+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-24T18:22:30.857000+00:00 +2025-02-24T20:15:34.180000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -282211 +282222 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `11` -- [CVE-2024-54820](CVE-2024/CVE-2024-548xx/CVE-2024-54820.json) (`2025-02-24T18:15:17.523`) -- [CVE-2024-57026](CVE-2024/CVE-2024-570xx/CVE-2024-57026.json) (`2025-02-24T18:15:19.023`) -- [CVE-2025-22495](CVE-2025/CVE-2025-224xx/CVE-2025-22495.json) (`2025-02-24T17:15:13.723`) -- [CVE-2025-26200](CVE-2025/CVE-2025-262xx/CVE-2025-26200.json) (`2025-02-24T17:15:14.273`) -- [CVE-2025-26201](CVE-2025/CVE-2025-262xx/CVE-2025-26201.json) (`2025-02-24T17:15:14.460`) +- [CVE-2025-26525](CVE-2025/CVE-2025-265xx/CVE-2025-26525.json) (`2025-02-24T20:15:33.103`) +- [CVE-2025-26526](CVE-2025/CVE-2025-265xx/CVE-2025-26526.json) (`2025-02-24T20:15:33.263`) +- [CVE-2025-26527](CVE-2025/CVE-2025-265xx/CVE-2025-26527.json) (`2025-02-24T20:15:33.403`) +- [CVE-2025-26528](CVE-2025/CVE-2025-265xx/CVE-2025-26528.json) (`2025-02-24T20:15:33.543`) +- [CVE-2025-26529](CVE-2025/CVE-2025-265xx/CVE-2025-26529.json) (`2025-02-24T20:15:33.677`) +- [CVE-2025-26530](CVE-2025/CVE-2025-265xx/CVE-2025-26530.json) (`2025-02-24T20:15:33.807`) +- [CVE-2025-26531](CVE-2025/CVE-2025-265xx/CVE-2025-26531.json) (`2025-02-24T20:15:33.933`) +- [CVE-2025-26532](CVE-2025/CVE-2025-265xx/CVE-2025-26532.json) (`2025-02-24T20:15:34.053`) +- [CVE-2025-27112](CVE-2025/CVE-2025-271xx/CVE-2025-27112.json) (`2025-02-24T19:15:14.597`) +- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-24T19:15:14.763`) +- [CVE-2025-27364](CVE-2025/CVE-2025-273xx/CVE-2025-27364.json) (`2025-02-24T19:15:14.917`) ### CVEs modified in the last Commit -Recently modified CVEs: `43` +Recently modified CVEs: `15` -- [CVE-2024-13770](CVE-2024/CVE-2024-137xx/CVE-2024-13770.json) (`2025-02-24T17:08:04.307`) -- [CVE-2024-13850](CVE-2024/CVE-2024-138xx/CVE-2024-13850.json) (`2025-02-24T17:36:09.667`) -- [CVE-2024-2081](CVE-2024/CVE-2024-20xx/CVE-2024-2081.json) (`2025-02-24T18:18:52.893`) -- [CVE-2024-2471](CVE-2024/CVE-2024-24xx/CVE-2024-2471.json) (`2025-02-24T18:18:30.513`) -- [CVE-2024-3208](CVE-2024/CVE-2024-32xx/CVE-2024-3208.json) (`2025-02-24T17:57:40.263`) -- [CVE-2024-46975](CVE-2024/CVE-2024-469xx/CVE-2024-46975.json) (`2025-02-24T17:15:13.257`) -- [CVE-2024-55925](CVE-2024/CVE-2024-559xx/CVE-2024-55925.json) (`2025-02-24T18:15:17.823`) -- [CVE-2024-55926](CVE-2024/CVE-2024-559xx/CVE-2024-55926.json) (`2025-02-24T18:15:17.997`) -- [CVE-2024-55927](CVE-2024/CVE-2024-559xx/CVE-2024-55927.json) (`2025-02-24T18:15:18.163`) -- [CVE-2024-55928](CVE-2024/CVE-2024-559xx/CVE-2024-55928.json) (`2025-02-24T18:15:18.337`) -- [CVE-2024-55929](CVE-2024/CVE-2024-559xx/CVE-2024-55929.json) (`2025-02-24T18:15:18.507`) -- [CVE-2024-55930](CVE-2024/CVE-2024-559xx/CVE-2024-55930.json) (`2025-02-24T18:15:18.663`) -- [CVE-2024-55931](CVE-2024/CVE-2024-559xx/CVE-2024-55931.json) (`2025-02-24T18:15:18.830`) -- [CVE-2025-0661](CVE-2025/CVE-2025-06xx/CVE-2025-0661.json) (`2025-02-24T17:10:16.007`) -- [CVE-2025-0837](CVE-2025/CVE-2025-08xx/CVE-2025-0837.json) (`2025-02-24T17:08:29.033`) -- [CVE-2025-1553](CVE-2025/CVE-2025-15xx/CVE-2025-1553.json) (`2025-02-24T17:15:13.540`) -- [CVE-2025-25460](CVE-2025/CVE-2025-254xx/CVE-2025-25460.json) (`2025-02-24T17:15:13.900`) -- [CVE-2025-25679](CVE-2025/CVE-2025-256xx/CVE-2025-25679.json) (`2025-02-24T18:15:19.213`) -- [CVE-2025-25769](CVE-2025/CVE-2025-257xx/CVE-2025-25769.json) (`2025-02-24T18:15:19.487`) -- [CVE-2025-25770](CVE-2025/CVE-2025-257xx/CVE-2025-25770.json) (`2025-02-24T18:15:20.280`) -- [CVE-2025-25876](CVE-2025/CVE-2025-258xx/CVE-2025-25876.json) (`2025-02-24T17:15:14.100`) -- [CVE-2025-26306](CVE-2025/CVE-2025-263xx/CVE-2025-26306.json) (`2025-02-24T18:15:21.357`) -- [CVE-2025-26308](CVE-2025/CVE-2025-263xx/CVE-2025-26308.json) (`2025-02-24T18:15:21.647`) -- [CVE-2025-26793](CVE-2025/CVE-2025-267xx/CVE-2025-26793.json) (`2025-02-24T17:15:14.580`) -- [CVE-2025-27109](CVE-2025/CVE-2025-271xx/CVE-2025-27109.json) (`2025-02-24T17:15:14.850`) +- [CVE-2018-25083](CVE-2018/CVE-2018-250xx/CVE-2018-25083.json) (`2025-02-24T20:15:31.150`) +- [CVE-2021-3923](CVE-2021/CVE-2021-39xx/CVE-2021-3923.json) (`2025-02-24T20:15:31.777`) +- [CVE-2022-2237](CVE-2022/CVE-2022-22xx/CVE-2022-2237.json) (`2025-02-24T20:15:31.973`) +- [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2025-02-24T19:15:12.707`) +- [CVE-2022-48348](CVE-2022/CVE-2022-483xx/CVE-2022-48348.json) (`2025-02-24T19:15:14.043`) +- [CVE-2022-48349](CVE-2022/CVE-2022-483xx/CVE-2022-48349.json) (`2025-02-24T19:15:14.227`) +- [CVE-2023-21044](CVE-2023/CVE-2023-210xx/CVE-2023-21044.json) (`2025-02-24T20:15:32.190`) +- [CVE-2023-21045](CVE-2023/CVE-2023-210xx/CVE-2023-21045.json) (`2025-02-24T20:15:32.380`) +- [CVE-2023-21048](CVE-2023/CVE-2023-210xx/CVE-2023-21048.json) (`2025-02-24T20:15:32.620`) +- [CVE-2024-10222](CVE-2024/CVE-2024-102xx/CVE-2024-10222.json) (`2025-02-24T19:43:57.037`) +- [CVE-2024-13775](CVE-2024/CVE-2024-137xx/CVE-2024-13775.json) (`2025-02-24T19:04:52.170`) +- [CVE-2024-45781](CVE-2024/CVE-2024-457xx/CVE-2024-45781.json) (`2025-02-24T19:15:14.423`) +- [CVE-2024-57160](CVE-2024/CVE-2024-571xx/CVE-2024-57160.json) (`2025-02-24T19:38:22.867`) +- [CVE-2024-57161](CVE-2024/CVE-2024-571xx/CVE-2024-57161.json) (`2025-02-24T19:38:43.083`) +- [CVE-2025-1489](CVE-2025/CVE-2025-14xx/CVE-2025-1489.json) (`2025-02-24T19:45:21.653`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ff594ee0a47..53042260248 100644 --- a/_state.csv +++ b/_state.csv @@ -121411,7 +121411,7 @@ CVE-2018-25079,0,0,48685ce9847add0e1ab9b8fceec97ce7a120ddb8b1b4b09c009c856d198e6 CVE-2018-25080,0,0,6c04fa6da42f79e635cc0cfe6f9f34c19609115b31e939d312cadffd27491508,2024-11-21T04:03:30.707000 CVE-2018-25081,0,0,4806ebac23e887becfaf51184ce6d12d8c88b37f8b3dfc1b14c300e4e20c2294,2024-11-21T04:03:30.847000 CVE-2018-25082,0,0,d7307469bd8b245316599e3552df8df9a48e8e1e76dbf66ac43e7bcba9fe864c,2024-11-21T04:03:31.080000 -CVE-2018-25083,0,0,9541b9956f31ddfc2686faef5fe77cdd0203ff83cdff0710c21a54861b224071,2024-11-21T04:03:31.223000 +CVE-2018-25083,0,1,74ba0756e5dafa541e4aaaaefcaefb10d8ede7ee35c986b20dfd74cd307530e8,2025-02-24T20:15:31.150000 CVE-2018-25084,0,0,9c184f17da7aafecde9ed5052529315a36ee449d7077376af8b33a2cbd5d6c43,2024-11-21T04:03:31.363000 CVE-2018-25085,0,0,73bfea48ffd0c9cdf4c809f671883689556215e478ba2335dea12376d92bdc92,2024-11-21T04:03:31.500000 CVE-2018-25086,0,0,b66fd9bd4e9ee72936a4458a94a97d90fafb9ae16612a4f6f711df55e0868a80,2024-11-21T04:03:31.630000 @@ -181593,7 +181593,7 @@ CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78 CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000 CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000 CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000 -CVE-2021-3923,0,0,17b1d10036794c55059f72c0706459b92801031c77093dbf04d2d5b5711c9916,2024-11-21T06:22:47.100000 +CVE-2021-3923,0,1,8f33120d39dbfb40fa5931a99dfe1de830ad6771a3e98d91fa15e273454439b2,2025-02-24T20:15:31.777000 CVE-2021-39230,0,0,a1ff4462fdf7e73cfc9f905531f8050df43fde4ffa355fe087d4f58aa28b9f70,2024-11-21T06:18:57.887000 CVE-2021-39231,0,0,69ac8f30e5ab6fd510e2644b69e1647296deefa37af2bf4373d60b90a662deae,2024-11-21T06:18:58.047000 CVE-2021-39232,0,0,46dca2479f21c28a81ec3dbdc29193e04bd5bd93ca4c70f295f263619234968f,2024-11-21T06:18:58.203000 @@ -192084,7 +192084,7 @@ CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39ca CVE-2022-22367,0,0,f882ca26722150b960229aa69678dc678f007562e394dfb4b417a39357dc7df4,2024-11-21T06:46:42.593000 CVE-2022-22368,0,0,4575f523f8115fcbc6bf4fcce9d55648189bfb8804149d364401ff13b317f534,2024-11-21T06:46:42.703000 CVE-2022-22369,0,0,57d094f830c9aade14309e978b8c909e905f3069a575a6823563de9c6cc548bf,2024-11-21T06:46:42.820000 -CVE-2022-2237,0,0,4e04ad032e6be7c3890ea1d2a86e7fd6d5b490e5fe27f7f1372ceeeca877c584,2024-11-21T07:00:35.877000 +CVE-2022-2237,0,1,e4713513ef55760b84ff9456d90526423f234823f2124885ce696e1691eae550,2025-02-24T20:15:31.973000 CVE-2022-22370,0,0,67d4116112ef932abd2bd63b802bb14e3f709993807fc0144ff90914519a656f,2024-11-21T06:46:42.937000 CVE-2022-22371,0,0,3c0ad31752e89144bb37a83b9d144a252c96c6ec5b4551862b225a581279dc8a,2024-11-21T06:46:43.060000 CVE-2022-22373,0,0,75763a7cca7f104d29029f2448a59f86f6607bf8aa5b41517082c08af9f29e22,2024-11-21T06:46:43.190000 @@ -199498,7 +199498,7 @@ CVE-2022-31156,0,0,2eaf51f38380072e6df6598bc8ce64fdddae7651edad8425e219157401a34 CVE-2022-31157,0,0,f97dabe995205a4290cb284ef75e2678e935f9593f36e46051a4473bd3747780,2024-11-21T07:04:01.233000 CVE-2022-31158,0,0,d0bb5395bc1894916b6f96263e1c2b4f3801271bb0dc425949da7198d4395245,2024-11-21T07:04:01.367000 CVE-2022-31159,0,0,73592c7c0c7382416e092a874c18103dd659c120906594ad5be3f95252b49a45,2024-11-21T07:04:01.497000 -CVE-2022-3116,0,0,f8e6f5411efa270ded319873772923e5efce07f0e1053090a44e88dd466c6574,2024-11-21T07:18:51.613000 +CVE-2022-3116,0,1,a66a78018254a28a9aa08fd9b8f04f2685a8ae4c0cd4ad20cf04b7b4f10b3d37,2025-02-24T19:15:12.707000 CVE-2022-31160,0,0,3f3c950e160a4c2913d6e10c3f9e06df49d400b943dc94f33bbeae200029c88e,2024-11-21T07:04:01.617000 CVE-2022-31161,0,0,50f1400bdf87989a0c6d37c9cf60d06f1c39bde3cac5984099d4324714a40142,2024-11-21T07:04:01.790000 CVE-2022-31162,0,0,60ece6ef2e20ad2436826f672bc8ae1cdedb95d111b3216c989d89e826d75bb6,2024-11-21T07:04:01.930000 @@ -212452,11 +212452,11 @@ CVE-2022-48344,0,0,99cfe32832587baf5d1527923c94101a148d12b13e3382d19bbf5f4f88a41 CVE-2022-48345,0,0,c43bfd3ba9d46379c49b9847b6f17f16ace8072a4eee27968587d44b52b60457,2024-11-21T07:33:13.103000 CVE-2022-48346,0,0,e9a6fca484067f694b4295c67382bb27add976e780c49b7a6de551ef92454947,2025-02-19T19:15:11.730000 CVE-2022-48347,0,0,2a2a2e7682966e3b51f22fc18957ee285c28256a87b17e92c00e8dd8185e131a,2025-02-19T19:15:11.850000 -CVE-2022-48348,0,0,47f57d4bd071bd8d153b05584cd6d761a94445852248c85c1fd1957601b19157,2024-11-21T07:33:13.483000 -CVE-2022-48349,0,0,ea8149ba67a972f5c4f4e134a57dcae0690d1644c460de70cd78210afd8b2b1d,2024-11-21T07:33:13.603000 +CVE-2022-48348,0,1,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000 +CVE-2022-48349,0,1,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000 CVE-2022-4835,0,0,0342ae1f95dc8d2e957e0430756d0a4236a488c4c4e1a010bf206123dd786fcd,2024-11-21T07:36:02.473000 -CVE-2022-48350,0,1,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000 -CVE-2022-48351,0,1,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000 +CVE-2022-48350,0,0,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000 +CVE-2022-48351,0,0,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000 CVE-2022-48352,0,0,d86867be797a1b5b2dd8a70bd1cbeb2c21eccf0ad77186550568b0580b01790a,2025-02-24T15:15:10.903000 CVE-2022-48353,0,0,ba8df961b31ea4a14f5a347cf0d4ef1527afa65a712feabcae9952cd3ddda423,2025-02-24T15:15:11.180000 CVE-2022-48354,0,0,e4e996be4865dc038b5d4156f4bf61c45f363b3efd2e5e5dbfa8445bcc4512a5,2024-11-21T07:33:14.200000 @@ -213671,7 +213671,7 @@ CVE-2023-0490,0,0,de5db187dc29d08e72001552229674aafbc72c7f1535c50224381914e9f169 CVE-2023-0491,0,0,06e62cdbc65c7f9df8b049d1bf89eea404775b51e3a06b276978ccbab8d65943,2025-02-19T20:15:33.683000 CVE-2023-0492,0,0,9a42b95385a6a697457a253f3876b4596a6ab1ce2819f8e960b2526ffa8d6462,2024-11-21T07:37:17.077000 CVE-2023-0493,0,0,4112b37c84480c3e817b15aba44244f27f093695299d80f2ccbb4dc5be272ce9,2024-11-21T07:37:17.177000 -CVE-2023-0494,0,1,e2194944e342b75c9a543ada747319fe61a722384955b154deb3b42be68e29f8,2025-02-24T18:15:16.550000 +CVE-2023-0494,0,0,e2194944e342b75c9a543ada747319fe61a722384955b154deb3b42be68e29f8,2025-02-24T18:15:16.550000 CVE-2023-0495,0,0,0a7a46df0d96b49f5e481433ce55c27724b9ca98c12f16dcefd88050bba8dfd6,2025-02-19T21:15:11.760000 CVE-2023-0496,0,0,76dfc339b37fc8f39bdd911715fe72ab4603e4fe8a10357be39ba3c4482e300a,2025-02-14T16:15:32.377000 CVE-2023-0497,0,0,60487cc13983df9ea1a2d5a704f12a258915d999bbd0a3c673377072ca11c4d0,2024-11-21T07:37:17.637000 @@ -213944,7 +213944,7 @@ CVE-2023-0774,0,0,049af1bb37ee5d540c89c1b828762fe47f13d23aa60a24fb68700fde6df4c4 CVE-2023-0775,0,0,4ba8722bdb81eca730d3390b5131a1937f73b6d8eb1836ea816af214b010b6ab,2024-11-21T07:37:47.827000 CVE-2023-0776,0,0,1062763acc90dab7b4f5e8aad81b99040d1f4ded8327a395ea6aa95205267666,2024-11-21T07:37:47.953000 CVE-2023-0777,0,0,71a2f902342e5506fc31ce626bc78f303535354f1ecb4b1a0b1e7a3561f27a76,2024-11-21T07:37:48.087000 -CVE-2023-0778,0,1,b7bb340f0c4af58dfab5361b720b656af8a24a73bca5d4c3898c3ea2fa9f7f1e,2025-02-24T18:15:16.863000 +CVE-2023-0778,0,0,b7bb340f0c4af58dfab5361b720b656af8a24a73bca5d4c3898c3ea2fa9f7f1e,2025-02-24T18:15:16.863000 CVE-2023-0779,0,0,e6e91017eb83f108f29fca1ea7191647b24869f0c5ce64aea1dd5a9190fe097d,2024-11-21T07:37:48.327000 CVE-2023-0780,0,0,e8e2f0426cdd391a26483e8789d8e86bae4ddde8ba9e52dd1088ac20ab8a0154,2024-11-21T07:37:48.450000 CVE-2023-0781,0,0,8a8496d4416dfe6d64d43bbc8f0ea270163cd648da6a03d2e8ed80772b9c0df2,2024-11-21T07:37:48.583000 @@ -214227,8 +214227,8 @@ CVE-2023-1071,0,0,b9efb5fd32552e831e9a6d68b0c512d4a8889297dc12027569d5401838a194 CVE-2023-1072,0,0,7c1718e96865a95b5dcb1e20eec041f4d38e13520351d35ddfbe6ea8c477df56,2024-11-21T07:38:24.320000 CVE-2023-1073,0,0,41c8f0d6826bcdd917561ed5928907cc323c6e5df9e279f68769c572085d2eaa,2024-11-21T07:38:24.440000 CVE-2023-1074,0,0,4192ac377555c94402a9411eb8a093d9a7f3f5498532717e31b4697c44de5a3e,2024-11-21T07:38:24.567000 -CVE-2023-1075,0,1,614fa18715d68c97ded92967d9598158d47f4277445bb5a4b026914a82716d3c,2025-02-24T17:15:11.467000 -CVE-2023-1076,0,1,cbd27dd9e5eca167c53b19d3bee72f3a209fe852f4c876408a0f6dbdd42a6707,2025-02-24T17:15:12.320000 +CVE-2023-1075,0,0,614fa18715d68c97ded92967d9598158d47f4277445bb5a4b026914a82716d3c,2025-02-24T17:15:11.467000 +CVE-2023-1076,0,0,cbd27dd9e5eca167c53b19d3bee72f3a209fe852f4c876408a0f6dbdd42a6707,2025-02-24T17:15:12.320000 CVE-2023-1077,0,0,60b3ed85066fa60ace32acf691ce80b25341948b43193759a5d179c71cb02930,2024-11-21T07:38:24.903000 CVE-2023-1078,0,0,6f05a57264a5ec490ef94ea87b90a2bd23e954d113212ea2831471457cd13513,2024-11-21T07:38:25.047000 CVE-2023-1079,0,0,6c65183c9016e5023aca467df3978cbe9d28eec643aa64f104193787f2642901,2025-02-19T22:15:11.597000 @@ -215915,7 +215915,7 @@ CVE-2023-21015,0,0,cecf1af576c9b801c71b79ae4e9d6df12121b3a243448437871c714827f50 CVE-2023-21016,0,0,458548724cc71cfad5285ef3922c28e822361bef89d73e7163793c200bb4a04b,2024-11-21T07:42:00.437000 CVE-2023-21017,0,0,76b475727b02d7f06ae44a793e4f20c233e0866f4995965de228dd2867dcdeb8,2024-11-21T07:42:00.543000 CVE-2023-21018,0,0,896cce17934660c28fa90e7f4e5fde23337320157d5aae42031e9ce7f12778c6,2024-11-21T07:42:00.647000 -CVE-2023-21019,0,1,f47020d35392fde71ac070ea65b490b0c01efb4610768ed35c4e7350d211d42e,2025-02-24T17:15:12.527000 +CVE-2023-21019,0,0,f47020d35392fde71ac070ea65b490b0c01efb4610768ed35c4e7350d211d42e,2025-02-24T17:15:12.527000 CVE-2023-2102,0,0,1f30776bd7546109d3fea589110ed243a709b5e1f7f74a918b4d566f83ca9c4d,2025-02-06T16:15:36.037000 CVE-2023-21020,0,0,d98d21ca140e17a8a5cd6b7ad75c664051a69a331f05c79e40733315f1fcab2c,2025-02-24T15:15:11.720000 CVE-2023-21021,0,0,d55dab5bb1ffd1ff4d3fe3d1856e21c43ecda1745938d739327dc3ccc73c46ac,2024-11-21T07:42:00.983000 @@ -215941,16 +215941,16 @@ CVE-2023-21040,0,0,c774c5983f36a821f7c5e24674b2f104bfce612ef836674ee849ac3705d7a CVE-2023-21041,0,0,6a99a6b0541876b22115214a822814538877e83cbef9875bd54521daf0d2d9cb,2024-11-21T07:42:03.070000 CVE-2023-21042,0,0,92ab35321b2fd324542efae6d2f60a172590991a879dc4bde56d7ee1e48c0b18,2025-02-19T22:15:11.810000 CVE-2023-21043,0,0,4cf28ca85bcbd27b9227b2573af8a0495fc89cd1fdcf1c2734276d761401f69f,2024-11-21T07:42:03.320000 -CVE-2023-21044,0,0,f01920dc762e3a152ff7b5a4ca15d0c1356720e7c0f7b82205cab239ea1eb390,2024-11-21T07:42:03.433000 -CVE-2023-21045,0,0,a152788a6f62c7091dc78aabc332acb1f5c41a0d65c30484aa75368547d3719c,2024-11-21T07:42:03.543000 +CVE-2023-21044,0,1,d546efe130a0e8b835c1a714bf68d2df24c0e09247ccbe869006e82495f3584f,2025-02-24T20:15:32.190000 +CVE-2023-21045,0,1,c7c3c273f0be1c563af52eae3c5ca603c13c6789a4270f0a2032e21fcdad0ce1,2025-02-24T20:15:32.380000 CVE-2023-21046,0,0,157a9520e5ae8a81ac1e742275b614c5004e15922aec14a449810537f3053229,2024-11-21T07:42:03.653000 CVE-2023-21047,0,0,a8d476de5c22475a663a6cd0b7905a4e2678b820fc08e9b5926d525d5d6554e1,2025-02-24T15:15:11.890000 -CVE-2023-21048,0,0,6eeae311c884bda35e7413de1723b0378d2d91f4bb8846497781364b6654419b,2024-11-21T07:42:03.887000 +CVE-2023-21048,0,1,609d2a83ed3221a308ae0d1de751ad1ffcc2d677804d0c4e261c7271f9a2b453,2025-02-24T20:15:32.620000 CVE-2023-21049,0,0,bb73e93fe402a1a1fd3c7954e241829b82101223330bf83d184d14f361624b5f,2025-02-21T21:15:12.563000 CVE-2023-2105,0,0,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000 CVE-2023-21050,0,0,c97a15ee08f147244a1178bb0faf4b2c275cbb0d598a4d3e22fffa17b5a3621d,2025-02-21T22:15:11.040000 -CVE-2023-21051,0,1,c609aaa30d557ea6fa763b443e2c4038dfe63d25a45eda662851123ac346a6af,2025-02-24T17:15:12.700000 -CVE-2023-21052,0,1,0b2340855d9b6925ed8fb119c848597a25874325b8217b27cfec3835992f18e3,2025-02-24T17:15:12.880000 +CVE-2023-21051,0,0,c609aaa30d557ea6fa763b443e2c4038dfe63d25a45eda662851123ac346a6af,2025-02-24T17:15:12.700000 +CVE-2023-21052,0,0,0b2340855d9b6925ed8fb119c848597a25874325b8217b27cfec3835992f18e3,2025-02-24T17:15:12.880000 CVE-2023-21053,0,0,c192dfa305a3ea071a0683ac561b0f1f691c8fdfbf892643e0c978097d186029,2025-02-21T20:15:31.557000 CVE-2023-21054,0,0,5c4569e80bedcc53693658dcd651c85d39fb77ec6e7679071e7e36be2eba0d20,2025-02-21T20:15:32.530000 CVE-2023-21055,0,0,ca0e7fa42b81270cc4187d66e5388652e4b9ea02749b2c91f46a22f24c8e3aca,2025-02-21T20:15:32.677000 @@ -239319,7 +239319,7 @@ CVE-2023-51308,0,0,4bcbdb7b793145ac3b10d8145b7d5335bf14b807b86268829f166f3300b36 CVE-2023-51309,0,0,eba924e04dc2770a8dd8e0f8bbcd99c1bf251381ab5a93a32f4f375a20690884,2025-02-20T18:15:22.890000 CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000 CVE-2023-51310,0,0,5ff44a8e60152b5a8222d23ace8728692bc50a1391618a6bf228fd8cf2f1cfa9,2025-02-20T18:15:23.090000 -CVE-2023-51311,0,1,d4e651f51e8aba72b98d1e38d35db64a4f1cd04060a101aac7ddce6778795b26,2025-02-24T18:15:17.150000 +CVE-2023-51311,0,0,d4e651f51e8aba72b98d1e38d35db64a4f1cd04060a101aac7ddce6778795b26,2025-02-24T18:15:17.150000 CVE-2023-51312,0,0,c5f1cf5674b7e294a5b5a557c49039d98e1261a1424602ca885450a6ed4c5035,2025-02-20T18:15:23.293000 CVE-2023-51313,0,0,6a2045e17d1649f3a297166f69c1bb87652b9a1ee94412aac61dddb35d0383d3,2025-02-21T18:15:15.350000 CVE-2023-51314,0,0,ed0c0946f48ea9e4165925b66798a07395b88ccd084d7b53e90b457b808050fa,2025-02-21T18:15:15.567000 @@ -242286,7 +242286,7 @@ CVE-2023-6943,0,0,9ce8ce1fbfe1c0ee5363f171dbc5ad0666f516779b82e995b05555add6a2e7 CVE-2023-6944,0,0,df2b7229c517209019fce35466d5ffbbde525fb676023ff8b16393577f2b89f6,2024-11-21T08:44:53.520000 CVE-2023-6945,0,0,eee61cdc8cecbbaa6c3be1b94704de1a8c4d868a06c2b4c07233fbc728fc898a,2024-11-21T08:44:53.660000 CVE-2023-6946,0,0,d11da4da13dc038beb075b5af1213743f8b40d251e7b7ea3b52df4c6657ce74d,2024-11-21T08:44:53.810000 -CVE-2023-6947,0,1,681ae83ea96dd1197213cace9f29ac2d9a0cee2cf919317601ee722b94cb412c,2025-02-24T18:22:30.857000 +CVE-2023-6947,0,0,681ae83ea96dd1197213cace9f29ac2d9a0cee2cf919317601ee722b94cb412c,2025-02-24T18:22:30.857000 CVE-2023-6948,0,0,fe5733c12b0ee41b32ac32792a9499fb1c2fbb29abf274a6083757f7f49e4eea,2024-11-21T08:44:53.957000 CVE-2023-6949,0,0,078850d39f1204331fbc98d392a0469ded8443843d8a5c473dc39bd1460bfcd6,2024-11-21T08:44:54.107000 CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d2f,2024-11-21T08:44:54.263000 @@ -243715,7 +243715,7 @@ CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0 CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000 CVE-2024-1022,0,0,2538d56f6669aecae5f12904278656fbaaa9fa83dd2447751caf0dde04c23b1f,2024-11-21T08:49:37.160000 CVE-2024-10220,0,0,0717049f6d4c212a875763951e37b8f3da2918e18cb00732d9d60eff6c4a140d,2024-11-22T17:15:06.650000 -CVE-2024-10222,0,0,a6ca531f70eae3a23ac6713dcc60df403d48fa9c5b9ea19669f3314137f83531,2025-02-21T14:15:30.680000 +CVE-2024-10222,0,1,832d681b9ef817b9c70fe649db0ec26d6568e99a827bbeb02954537ee5aaf11c,2025-02-24T19:43:57.037000 CVE-2024-10223,0,0,5f5e151c95f5ef79d0a7fc297e9a009a73a481f63f2b3ce4a2e96835fd5bc43d,2024-11-01T12:57:03.417000 CVE-2024-10224,0,0,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000 CVE-2024-10226,0,0,90902af4bb0025c8b4afcf3dd7a0c8ab645b3d8bdbe2f31e8aac22ff12a9d686,2024-10-31T16:48:41.553000 @@ -245150,7 +245150,7 @@ CVE-2024-11777,0,0,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2 CVE-2024-11778,0,0,ed546f5ae360e455508e4e386fdc82d78b9472397f9ba2e46d09300dfc1f6bfe,2025-02-19T08:15:13.027000 CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000 CVE-2024-1178,0,0,8ab0a2a01e80408842a29a813ae0f71a9342bc7b3eeef6127c8bbe6845a6d705,2025-01-08T17:16:27.800000 -CVE-2024-11780,0,1,c757f2673a7fd0520b5d1535df6f50a1511b2d463dc2b762fafd8e9077c7c8bb,2025-02-24T17:26:33.223000 +CVE-2024-11780,0,0,c757f2673a7fd0520b5d1535df6f50a1511b2d463dc2b762fafd8e9077c7c8bb,2025-02-24T17:26:33.223000 CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000 CVE-2024-11782,0,0,32efa64b128c88aabdfed834337ad65ab786b6692f5faee3dcb9cdb0f84122ef,2025-02-10T18:10:42.510000 CVE-2024-11783,0,0,a1a89800681b730546355720a381b5c434c9a4d5304a89bbf16fe8919a3038c8,2024-12-20T07:15:10.777000 @@ -245503,7 +245503,7 @@ CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bf CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000 CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 -CVE-2024-12171,0,1,6256993d9f0f389a5120f8a5fcb51c966cc24463f22b2943402e672b9dead5b0,2025-02-24T17:05:34.500000 +CVE-2024-12171,0,0,6256993d9f0f389a5120f8a5fcb51c966cc24463f22b2943402e672b9dead5b0,2025-02-24T17:05:34.500000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 CVE-2024-12173,0,0,7d944d4e8e3eae3c31019309f9ace7394848c049126e10d571e77e1246f0e144,2025-02-21T17:15:11 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 @@ -245838,7 +245838,7 @@ CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c CVE-2024-12522,0,0,9a29eaa26b8e72f060e0541b1bd56e919175e1dea7b36022bab30609cf3ac5c0,2025-02-19T08:15:14.323000 CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000 CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000 -CVE-2024-12525,0,1,2c42baf29c519a4ae8a9d35fe807a994e1b47214d101f54cce57a3cae21be29b,2025-02-24T17:11:30.987000 +CVE-2024-12525,0,0,2c42baf29c519a4ae8a9d35fe807a994e1b47214d101f54cce57a3cae21be29b,2025-02-24T17:11:30.987000 CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000 CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000 CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000 @@ -246430,7 +246430,7 @@ CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a CVE-2024-13225,0,0,fd5bdb87f02a5554907e108887a0ec447c92e5005d465261f05bb066fe20b559,2025-02-18T19:15:13.430000 CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000 CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000 -CVE-2024-13229,0,1,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000 +CVE-2024-13229,0,0,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000 CVE-2024-13231,0,0,6b2bf7946a3918f4f1317f58265852494615d3a82c5ba9db5c6afe2c9cc9bdb4,2025-02-19T09:15:08.930000 @@ -246547,8 +246547,8 @@ CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca6713 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000 CVE-2024-13343,0,0,640200c7757a0fe07b53b1ed98de77b765153c818110e07c8a501ce037c2ed28,2025-02-24T16:21:30.933000 -CVE-2024-13345,0,1,2f3032297f8332972573fb3f498fd72586e19dd8c8868b7492b543e5342b848c,2025-02-24T17:09:19.853000 -CVE-2024-13346,0,1,1f1e8b78579e17cc330b0ba450b33ebe007d77d280315cb8ae956100d22451e5,2025-02-24T17:09:53.907000 +CVE-2024-13345,0,0,2f3032297f8332972573fb3f498fd72586e19dd8c8868b7492b543e5342b848c,2025-02-24T17:09:19.853000 +CVE-2024-13346,0,0,1f1e8b78579e17cc330b0ba450b33ebe007d77d280315cb8ae956100d22451e5,2025-02-24T17:09:53.907000 CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f0474b,2025-02-03T16:15:32.580000 CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000 CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000 @@ -246706,7 +246706,7 @@ CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70 CVE-2024-13522,0,0,00c085e855bb7c9f3026d445957f1adf7577732941d53fc12a5ce3f291cdce05,2025-02-24T14:28:46.687000 CVE-2024-13523,0,0,a22589ae6ec5992efe47bdb0fb01b8cdac2a43ff89103cd45e22c3f11d842d97,2025-02-21T15:41:26.060000 CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000 -CVE-2024-13525,0,1,d856e0492a07e8bc12ebbe371954626a06f4d820679af6cffeb9304d385023c3,2025-02-24T17:10:47.023000 +CVE-2024-13525,0,0,d856e0492a07e8bc12ebbe371954626a06f4d820679af6cffeb9304d385023c3,2025-02-24T17:10:47.023000 CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000 CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a301d8,2025-02-18T18:53:58.897000 CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000 @@ -246885,8 +246885,8 @@ CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000 CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 -CVE-2024-13770,0,1,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000 -CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000 +CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000 +CVE-2024-13775,0,1,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000 CVE-2024-13789,0,0,7e93b6d08cc6df1b6bc2f867c0f4be1ee78646a7a043ad72e374fd176f679c40,2025-02-20T10:15:10.637000 @@ -246922,7 +246922,7 @@ CVE-2024-13846,0,0,7a6b2d68f6b35a1c0346eb229a9db02fce41ef7ca697acebf08e29ec1c131 CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000 CVE-2024-13849,0,0,76427ddbd1b9c89aad3ff1ad69ba5ca19d42f02190050e5d0291188382af9c14,2025-02-20T10:15:11.330000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 -CVE-2024-13850,0,1,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 +CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 CVE-2024-13854,0,0,b293d3f2f05083e98beb719565723791c5cf1a85fbf867f7cfec3a20f9286342,2025-02-19T08:15:21.440000 CVE-2024-13855,0,0,07563565d63aa0673a3108e0a48747889696d3c84d85640c1521db3b7a6edb9f,2025-02-20T10:15:11.530000 @@ -248159,7 +248159,7 @@ CVE-2024-20806,0,0,f84687e6ca27853ea722b74b6896660825869789a3d6900811ae37e86ae97 CVE-2024-20807,0,0,77916569275eb8dd7e9f7d46cda3d6f7424ea6382ea63bf17b9f16c373d503f2,2024-11-21T08:53:10.990000 CVE-2024-20808,0,0,357e606a78af1d093b1e517a3f4f56db91192b24dcbbb4daa0a7f54fb5863c47,2024-11-21T08:53:11.133000 CVE-2024-20809,0,0,93ae2c7a12cb7905d7572e5a78fea642f215334a51b59e794d9d6a27cefc3b08,2024-11-21T08:53:11.267000 -CVE-2024-2081,0,1,de1eeeff5db231bd4d1cab878e18da2be499c7de15a53c99e0b8b72d9578f35a,2025-02-24T18:18:52.893000 +CVE-2024-2081,0,0,de1eeeff5db231bd4d1cab878e18da2be499c7de15a53c99e0b8b72d9578f35a,2025-02-24T18:18:52.893000 CVE-2024-20810,0,0,548be65c086436b8a320f58abdc3613f0c10e36b13681e4dc45fdb75999f091d,2024-11-21T08:53:11.390000 CVE-2024-20811,0,0,bfcdda7fb3ccf6704bf5fdf5cbfa692d5d730ca5a9b1aab757de7d0def4ce60e,2024-11-21T08:53:11.563000 CVE-2024-20812,0,0,0c55c29e5c5975f821f304280d9826bc1bea845ee09e139bccc9bd51242c8313,2024-11-21T08:53:11.713000 @@ -251197,7 +251197,7 @@ CVE-2024-24705,0,0,44a6fafe0c6dd1b5a76c5b567fc6821bb1bc347be4d901e9eadf2df289bd1 CVE-2024-24706,0,0,99608966374565ae18ae703dbaf8477e67d081e532b39247cf263b507d4fd7c5,2024-11-21T08:59:32.947000 CVE-2024-24707,0,0,5dfcfcaaa6d07a5fd016f4454c159955ea08a45723f1fba322dbb6aeba927137,2024-11-21T08:59:33.090000 CVE-2024-24708,0,0,65871d812be26c4047bc05ce51f0c2e1ab39e5576dbdebbd79ac05fb039f446a,2024-11-21T08:59:33.233000 -CVE-2024-2471,0,1,3001e122774e09551ca8b61e1734c975ba32aa314c19e1baf58ea05ccbf0137d,2025-02-24T18:18:30.513000 +CVE-2024-2471,0,0,3001e122774e09551ca8b61e1734c975ba32aa314c19e1baf58ea05ccbf0137d,2025-02-24T18:18:30.513000 CVE-2024-24710,0,0,3e1e20a8dfa79a8b78b75c17d13801e5e4aa6e91804fe24acce34eb915d0b381,2024-11-21T08:59:33.360000 CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000 CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000 @@ -256874,7 +256874,7 @@ CVE-2024-3207,0,0,a44f07a61b866cfd9c1defb1f2cc6163677fc58ce9121127937bb40a8755f7 CVE-2024-32077,0,0,d2d4ad809c590238d608f30c1067ee36825e3385ffb5bcc6e6ecc0cbdac25aa2,2025-02-13T18:18:02.033000 CVE-2024-32078,0,0,82ba60cc46e9aa4228ce6f631a63a9303f5be477f0d9a2dc16c6651d36d28708,2024-11-21T09:14:25.543000 CVE-2024-32079,0,0,1bc3c03f2b5772f3aa8b52ceeb2e0251532ab71b12d3b25db239c0f26b173c66,2024-11-21T09:14:25.670000 -CVE-2024-3208,0,1,825a61e8cc05584c2ef2bb5c9aa68d5659595de19829f1ae20c53568a7d588e9,2025-02-24T17:57:40.263000 +CVE-2024-3208,0,0,825a61e8cc05584c2ef2bb5c9aa68d5659595de19829f1ae20c53568a7d588e9,2025-02-24T17:57:40.263000 CVE-2024-32080,0,0,d73a822059be2548c669c29d56fa05dbd56ce653eefa07178c56f749bf1c6752,2024-11-21T09:14:25.797000 CVE-2024-32081,0,0,db02a9c977213fd7cb23f3465beae81e4acc89954358d09d1359e2064ece0c6b,2024-11-21T09:14:25.920000 CVE-2024-32082,0,0,33bc10f980e8e4374b9c6b2cf94d3ebe7b9f6b8f6912d6b2882d77aab441d3fd,2024-11-21T09:14:26.053000 @@ -267361,7 +267361,7 @@ CVE-2024-45775,0,0,dc9934913719b7ba371689f85d372f27a1c5a62c61667ba391c7f8d330af4 CVE-2024-45776,0,0,7a04b7c7af22da1288ed82b6f5b30f15805ed4d914e4fc273482119cb2625695,2025-02-18T20:15:19.313000 CVE-2024-45777,0,0,bcd0bab214a719b58ddcd730a7be37124827cbe868fcd457da07097e9b2f3848,2025-02-19T18:15:23.210000 CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000 -CVE-2024-45781,0,0,a587a3b87f71b568c9e051f17c521e2c823b1cb6704713cfcb2fd1f1a495d795,2025-02-18T20:15:19.450000 +CVE-2024-45781,0,1,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000 CVE-2024-45783,0,0,e4aa133b1a4c5368c5e922eb069f3b52cda2e750027d303f7902e92d25e80622,2025-02-18T20:15:19.560000 CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000 CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000 @@ -268069,7 +268069,7 @@ CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d258 CVE-2024-46972,0,0,95b9b829ac40a71aa8b72076be82f629ce22983a71f926ad95be3c5975b4b190,2025-02-18T22:15:11.490000 CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000 CVE-2024-46974,0,0,dfb76a0433767383a52519f3e13a26b3bbbc934082dde21f8b8c392f6cc03115,2025-02-18T19:15:16.563000 -CVE-2024-46975,0,1,da641012f378447cfd1fa138a99342207bccf299f2c707ea29d06ccb7d119962,2025-02-24T17:15:13.257000 +CVE-2024-46975,0,0,da641012f378447cfd1fa138a99342207bccf299f2c707ea29d06ccb7d119962,2025-02-24T17:15:13.257000 CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 CVE-2024-46978,0,0,6b4b273c251da2584d7ee17daf2abe4b18d0c96b507318935ca3196d6f3415b7,2025-02-07T15:48:36.660000 @@ -273653,7 +273653,7 @@ CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e57 CVE-2024-54818,0,0,c43119f169232e03fce78f76fd8c17d403249b4db9d275dadea7d70095cbc4c7,2025-01-08T20:15:28.303000 CVE-2024-54819,0,0,8ec44a69779700b75dce08ce23b0b696a8e67a9684b58a33ba4824157f9f0485,2025-01-08T15:15:19.317000 CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000 -CVE-2024-54820,1,1,6678e3df85de3bf744bc8983980765bb86f83e197543d0fc950af8fd675e5c3d,2025-02-24T18:15:17.523000 +CVE-2024-54820,0,0,6678e3df85de3bf744bc8983980765bb86f83e197543d0fc950af8fd675e5c3d,2025-02-24T18:15:17.523000 CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 CVE-2024-54840,0,0,10f38e8aac69675a42acd017e36b1ddc2fb9fc13d5cad0d6cef53aed3dd38dd6,2025-02-19T23:15:10.673000 @@ -273986,13 +273986,13 @@ CVE-2024-55921,0,0,5fa81d92601e70d676a1016b709a0f2741abaf55426856cddb4a06e34b9a7 CVE-2024-55922,0,0,ab9ba749ee333e9f82aad55cb9be15ec2bea94f8fc77977baf33bef44d3cce51,2025-01-14T20:15:30.033000 CVE-2024-55923,0,0,219ffcee25fb405d9a02cdc68a4fa5af829e860803373b590c58a214037e5d08,2025-01-14T20:15:30.197000 CVE-2024-55924,0,0,51b538faaafc8081c0d91ed65951b4c0e863d37d4f9e21b793ae96fe9f20d0fe,2025-01-14T20:15:30.367000 -CVE-2024-55925,0,1,d6533bd3d28b09d0fbefee7c35bce6598563f6e25dcb6801632bc68dd02cf731,2025-02-24T18:15:17.823000 -CVE-2024-55926,0,1,45637f3cff729de9f1ee0c554ec62a2e93d0ac1b3428a19941afc770d8d43590,2025-02-24T18:15:17.997000 -CVE-2024-55927,0,1,9acefaba7646c8c6ed3d4b6969da306acd6ef9d8be264534bcfa3d531563287a,2025-02-24T18:15:18.163000 -CVE-2024-55928,0,1,018babed0310658b07b5c4cc048ea862b97dde417bea4aec4ac96e78c63e7465,2025-02-24T18:15:18.337000 -CVE-2024-55929,0,1,73ab0f50a888e1a4aaabff70d3287dce031dab7e455c55fb0f3949fe9cb909b7,2025-02-24T18:15:18.507000 -CVE-2024-55930,0,1,200301077d6523a98f2cdf7b12555f283c4f9f49342ea4a79e0f4277912f7457,2025-02-24T18:15:18.663000 -CVE-2024-55931,0,1,1707a199fa8f7a35e3d361e474111ddc1bb4d01126b118e72f6c6549081fa177,2025-02-24T18:15:18.830000 +CVE-2024-55925,0,0,d6533bd3d28b09d0fbefee7c35bce6598563f6e25dcb6801632bc68dd02cf731,2025-02-24T18:15:17.823000 +CVE-2024-55926,0,0,45637f3cff729de9f1ee0c554ec62a2e93d0ac1b3428a19941afc770d8d43590,2025-02-24T18:15:17.997000 +CVE-2024-55927,0,0,9acefaba7646c8c6ed3d4b6969da306acd6ef9d8be264534bcfa3d531563287a,2025-02-24T18:15:18.163000 +CVE-2024-55928,0,0,018babed0310658b07b5c4cc048ea862b97dde417bea4aec4ac96e78c63e7465,2025-02-24T18:15:18.337000 +CVE-2024-55929,0,0,73ab0f50a888e1a4aaabff70d3287dce031dab7e455c55fb0f3949fe9cb909b7,2025-02-24T18:15:18.507000 +CVE-2024-55930,0,0,200301077d6523a98f2cdf7b12555f283c4f9f49342ea4a79e0f4277912f7457,2025-02-24T18:15:18.663000 +CVE-2024-55931,0,0,1707a199fa8f7a35e3d361e474111ddc1bb4d01126b118e72f6c6549081fa177,2025-02-24T18:15:18.830000 CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000 CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 @@ -274791,7 +274791,7 @@ CVE-2024-57022,0,0,7e42a0eaca76fdaf1f44229827afe4be716bd161a679aa735bbcf9243657f CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000 CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000 CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000 -CVE-2024-57026,1,1,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000 +CVE-2024-57026,0,0,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000 CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000 CVE-2024-57030,0,0,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082c3b,2025-01-17T21:15:09.823000 CVE-2024-57031,0,0,1d859728d6d66a6bcfe5da6cfb404ff9c10a4846f51b5dd74817dad1e9184348,2025-02-18T21:15:22.993000 @@ -274846,8 +274846,8 @@ CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190 CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000 CVE-2024-57159,0,0,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef975,2025-02-03T19:15:12.880000 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 -CVE-2024-57160,0,0,d044a821e4cd7d6f282a359da69fef7f6a3fff09a99b2b7f3d3224dfc169d2b6,2025-01-31T21:15:10.910000 -CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf8ff,2025-01-31T21:15:11.153000 +CVE-2024-57160,0,1,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000 +CVE-2024-57161,0,1,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000 CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000 @@ -279287,7 +279287,7 @@ CVE-2025-0648,0,0,ec79ce6f39b47487aa16e0340c9bff69ff776daf1028d3a38c4c3ba8e39e1f CVE-2025-0650,0,0,a9fc324c64dd82aee521d1bffa9b7782cf03bd2f6e410628d7018de6f1170f96,2025-02-06T09:15:11.697000 CVE-2025-0651,0,0,e2215d27193b6db6cba4dbdda5349954e60373a439e45e60be4d39bd216d0a6b,2025-01-22T18:15:20.363000 CVE-2025-0659,0,0,a231e421d524771ecef4ddd421dffcbb4d37f1c0838cd9830fba22194e88f80c,2025-01-28T16:15:40.360000 -CVE-2025-0661,0,1,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000 +CVE-2025-0661,0,0,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000 CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000 CVE-2025-0665,0,0,32d62a31dda68c00a725e820e49c088e5a4c0cbb7a3a5fc704b21339eef4d91c,2025-02-18T19:15:23.280000 CVE-2025-0674,0,0,f9a5b719b45bd5bb8c1b4e4a7f4ed3325700578bc985184c525f090e2005e85a,2025-02-07T00:15:27.017000 @@ -279379,7 +279379,7 @@ CVE-2025-0821,0,0,c0f9c17d34dd02f439cce895873742df5bc79e8c6fc655f0e6995bd60a4635 CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000 CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 -CVE-2025-0837,0,1,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 +CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 CVE-2025-0838,0,0,b3bedc01b96cdbe25c8f6922cea4e94abd529b95831b6c6b3a257c0f4033b9cb,2025-02-21T15:15:11.890000 CVE-2025-0840,0,0,dcc73de0595740e9bb877d1b68b6e13f7a74ad4d50a26f82e22ce56d8c04db6b,2025-01-29T20:15:35.007000 CVE-2025-0841,0,0,d34ffb164e9f6e4e065c3a7bf9858f8af34d279265f630e92f70d22138303c3f,2025-01-29T21:15:20.973000 @@ -279696,7 +279696,7 @@ CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000 CVE-2025-1483,0,0,ce3e2374c8ceeb73bbc31bdc8dbf6b8de9bfef289bdc35ff175139154a83c52b,2025-02-20T10:15:12.537000 CVE-2025-1488,0,0,43cfa98a915bcf0660c9d6b45b3151f7578e9794c9b93f44777c487cb0fa081f,2025-02-24T11:15:10.193000 -CVE-2025-1489,0,0,33b499615f5a9d47836021ac5ca54335451238d68926a899e34dbf51c4c427a7,2025-02-21T12:15:30.740000 +CVE-2025-1489,0,1,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000 CVE-2025-1492,0,0,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000 CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000 CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000 @@ -279709,7 +279709,7 @@ CVE-2025-1543,0,0,079e018e26abed20b54fa2585c54e2a36ef2ea5d437d5ac399037949b75daa CVE-2025-1544,0,0,6dfefee8c1beb9250313ea7950237ab90994f9ae50b689b8e2c00c600bd9529e,2025-02-21T16:15:32.953000 CVE-2025-1546,0,0,7a27654d265dd0e0c87a112414ca356bea46a4aa4326e4b6c538ca7fa17cdb3d,2025-02-21T18:15:21.523000 CVE-2025-1548,0,0,dc77eed63b703112b11128556adaac7473d7e2c58e805a91497e7bcaa94271fc,2025-02-21T17:15:13.897000 -CVE-2025-1553,0,1,3c10d6a755dcef4709f1d7b4a32da74f40ecec9ec11c525c5e38cbe72383a6ad,2025-02-24T17:15:13.540000 +CVE-2025-1553,0,0,3c10d6a755dcef4709f1d7b4a32da74f40ecec9ec11c525c5e38cbe72383a6ad,2025-02-24T17:15:13.540000 CVE-2025-1555,0,0,b87953fc659c2e74abd428dd8b83c4d989fea69643d0c4eecfbab0e6ac242e9a,2025-02-24T15:15:12.810000 CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000 CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000 @@ -280435,7 +280435,7 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 -CVE-2025-22495,1,1,b69414b6cefd90565ddf9757afc00445135fb48616564da9514c4b5ad30aaa8c,2025-02-24T17:15:13.723000 +CVE-2025-22495,0,0,b69414b6cefd90565ddf9757afc00445135fb48616564da9514c4b5ad30aaa8c,2025-02-24T17:15:13.723000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 @@ -281905,7 +281905,7 @@ CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3 CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 -CVE-2025-25460,0,1,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000 +CVE-2025-25460,0,0,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000 CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000 CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000 CVE-2025-25469,0,0,741fdd6513e01efbd7a9bf5df4924bb989fc1989e61032b7cef4423372c52af7,2025-02-19T21:15:15.750000 @@ -281937,7 +281937,7 @@ CVE-2025-25674,0,0,6d025ae220f91c2a57ba855f1dbf317fed89516da1582298cc4667448bef5 CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd351,2025-02-21T18:16:00.790000 CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000 CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000 -CVE-2025-25679,0,1,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 +CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 CVE-2025-25740,0,0,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10df2,2025-02-19T19:02:59.180000 @@ -281949,11 +281949,11 @@ CVE-2025-25765,0,0,3adfd18b0523627b6799d8f3fe18ae9718bbe1da9964013c36335171c37fd CVE-2025-25766,0,0,57af4b18309fbf59a64f83f90aab5cd3bfbe39741914f4dbb52a684f7edb326e,2025-02-21T18:16:12.647000 CVE-2025-25767,0,0,65da93516558bfe81b43fcd0adbd639aa009f9a52ab8537bd361623a21370b60,2025-02-21T19:15:14.253000 CVE-2025-25768,0,0,304c7220a311f269a43e8f32a234f6d1b13317a69f4862236989f7ec5468694b,2025-02-21T19:15:14.363000 -CVE-2025-25769,0,1,23c8747da587b2cec740d3eb785ff6bb03890bf557e1689c0c836490aea47b0b,2025-02-24T18:15:19.487000 -CVE-2025-25770,0,1,b3e515f133a4ee2a001c39c5da953da7ccc7cb2840f20050012ea90a9b8becc3,2025-02-24T18:15:20.280000 +CVE-2025-25769,0,0,23c8747da587b2cec740d3eb785ff6bb03890bf557e1689c0c836490aea47b0b,2025-02-24T18:15:19.487000 +CVE-2025-25770,0,0,b3e515f133a4ee2a001c39c5da953da7ccc7cb2840f20050012ea90a9b8becc3,2025-02-24T18:15:20.280000 CVE-2025-25772,0,0,2f0f0f58a3ad6615016a2856b7a87760fb37871ed912f01a814631976a58d051,2025-02-21T22:15:12.813000 CVE-2025-25875,0,0,4ae4a41a47ee817f194e373119e06368304ab5bcd19c90c39f2f631e9bca1c06,2025-02-21T18:16:12.873000 -CVE-2025-25876,0,1,d6c09f94538a5c36fd70d310b48b5e98ead81616eeefe6e6f1451c304b2ebe13,2025-02-24T17:15:14.100000 +CVE-2025-25876,0,0,d6c09f94538a5c36fd70d310b48b5e98ead81616eeefe6e6f1451c304b2ebe13,2025-02-24T17:15:14.100000 CVE-2025-25877,0,0,f6914eb034148bb528f1091838ce10955d1010e17f96a9876034900b21fe7f33,2025-02-21T22:15:12.977000 CVE-2025-25878,0,0,f590bd91a14f49dcf8300dd3d531cc9f479b1804dcefa71a21760252a310563b,2025-02-21T22:15:13.133000 CVE-2025-25891,0,0,9ffea80911f1e47c70786967af69881dfb74e93322751a9813ef61512aae0c90,2025-02-19T16:15:41.447000 @@ -281991,13 +281991,13 @@ CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8c CVE-2025-26156,0,0,a8694b3e45c4489013c1cde3d4ed9238920082c88bdc645d51681df5fb2b64af,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,7804a33112b2a9ac773ed8a4ce8c66afc4de94479098b9344da6b84d1d9bf6e8,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407063,2025-02-14T20:15:37.677000 -CVE-2025-26200,1,1,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000 -CVE-2025-26201,1,1,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000 +CVE-2025-26200,0,0,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000 +CVE-2025-26201,0,0,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 -CVE-2025-26306,0,1,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 +CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 CVE-2025-26307,0,0,985beed55a8f638fd04d0a13d2505a90eaf2bf50598c60df60e93fb1afdd71ae,2025-02-21T15:15:13.223000 -CVE-2025-26308,0,1,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d451c,2025-02-24T18:15:21.647000 +CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d451c,2025-02-24T18:15:21.647000 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000 @@ -282062,6 +282062,14 @@ CVE-2025-26520,0,0,17d02b8206df6278a5daac40c2b231fb3d4ebedc90f89b701d393457344ae CVE-2025-26522,0,0,81134038c496481bfa5c560aae63c4f4621e7f68899375180dc3955b52ec6e4d,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,cd12665da062e93af2c690c3b3ac969d692dcb2b834904fb031d67807c219377,2025-02-14T12:15:29.723000 CVE-2025-26524,0,0,bd7001926462f269d35a46f341242eea9f256eba3c891acb3af12e0119a6db89,2025-02-14T12:15:29.887000 +CVE-2025-26525,1,1,e2470c0b89fb5f4c317b46f89a75742cf40aaeb4834d01cf3fd91c3994e3b2df,2025-02-24T20:15:33.103000 +CVE-2025-26526,1,1,6425f2747c445b6d9158d4211ff4088ba074b3474102b40bdc631e2e2abbb90b,2025-02-24T20:15:33.263000 +CVE-2025-26527,1,1,bf2779fcba04200fdcb75a5a7a9f5531a86e849eab0d085762947141b3c2eaf1,2025-02-24T20:15:33.403000 +CVE-2025-26528,1,1,a365d827164795bc1ef58abd6171679d3069ce4ccde2807be350c01d0b3aa5d5,2025-02-24T20:15:33.543000 +CVE-2025-26529,1,1,a4ee1915d14b95ea82ab1944c3df3a492d57176e49f9ca84129b30a726b6a965,2025-02-24T20:15:33.677000 +CVE-2025-26530,1,1,63219eb639d784006748b7e9b7585eb4cb931b1cccb20a31dfcf93c2af986358,2025-02-24T20:15:33.807000 +CVE-2025-26531,1,1,4454ead5716d53108591ae776002c8d02ed96d405f2b930f023008b300798475,2025-02-24T20:15:33.933000 +CVE-2025-26532,1,1,598f624e5c9d1c4c60a7140797a329e77af0a449c9c4b34a91bafc0972369445,2025-02-24T20:15:34.053000 CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000 @@ -282134,7 +282142,7 @@ CVE-2025-26779,0,0,8a262025d77166fa868782d4b8f9b46644ef804b486a3f05cf1d89fa1cfb4 CVE-2025-26788,0,0,6e0ad5eea5859828ac73a22164fbb38f733c72d94018b5153d62b3e4b0af0638,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,ca7d12f2abb1c99361932e960f77e482442b11d4e054c4c52afe3c09d090d91c,2025-02-14T08:15:31.357000 CVE-2025-26791,0,0,14f0d0b897ce6b3b47f78e719fad727635dc1654f1791907b55fa0b08f85a137,2025-02-14T16:15:37.350000 -CVE-2025-26793,0,1,f4d2d5412189dc053f3b0a2570c5ffe6a45b414de066e605db6d5d1fb564c0ef,2025-02-24T17:15:14.580000 +CVE-2025-26793,0,0,f4d2d5412189dc053f3b0a2570c5ffe6a45b414de066e605db6d5d1fb564c0ef,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26803,0,0,7a255b740667bada4fca34455e40a59365b611b064e171d9a400283919805118,2025-02-24T16:15:15.020000 CVE-2025-26819,0,0,0ede991b4b81e17fa4f92afd2308026e6f3d0368afffc246b266200c177a850a,2025-02-15T00:15:28.510000 @@ -282157,8 +282165,10 @@ CVE-2025-27104,0,0,15aaaf6917676f5eff2f89fbd0c3a21c0c13a6b224565fcd05537a337b887 CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b7cb,2025-02-22T16:15:32.827000 CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000 CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000 -CVE-2025-27109,0,1,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000 +CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000 +CVE-2025-27112,1,1,ee0d927c6fb13b15cf89a5e5e15c73d10b42a1b52bf52c1bf9cbd01c1bbcaebd,2025-02-24T19:15:14.597000 CVE-2025-27113,0,0,d170fa3c72db3eb74309693f02d592d61ed72cb3e9e67a063d1482cf1b9614a1,2025-02-18T23:15:10.960000 +CVE-2025-27133,1,1,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000 CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000 CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000 CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000 @@ -282210,3 +282220,4 @@ CVE-2025-27353,0,0,e9330e465bd2b224e768917457bf183dd9e6e3a03d6a86b1c73c647172eb9 CVE-2025-27355,0,0,66e7c6f2a2b25e7dd96aabb373de405f0d7238e697b5f6eca301307be69d4dd5,2025-02-24T15:15:20.917000 CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d5028c9,2025-02-24T15:15:21.077000 CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000 +CVE-2025-27364,1,1,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000