From c8a5cff72e1e413f10d2e3f053ea8956c4737884 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 25 Mar 2025 15:03:53 +0000 Subject: [PATCH] Auto-Update: 2025-03-25T15:00:21.124020+00:00 --- CVE-2016/CVE-2016-29xx/CVE-2016-2912.json | 6 +- CVE-2016/CVE-2016-29xx/CVE-2016-2914.json | 6 +- CVE-2017/CVE-2017-17xx/CVE-2017-1787.json | 10 +- CVE-2018/CVE-2018-15xx/CVE-2018-1533.json | 10 +- CVE-2018/CVE-2018-15xx/CVE-2018-1534.json | 10 +- CVE-2018/CVE-2018-16xx/CVE-2018-1657.json | 14 +- CVE-2018/CVE-2018-19xx/CVE-2018-1951.json | 14 +- CVE-2019/CVE-2019-44xx/CVE-2019-4431.json | 10 +- CVE-2020/CVE-2020-234xx/CVE-2020-23438.json | 65 ++++- CVE-2020/CVE-2020-43xx/CVE-2020-4316.json | 16 +- CVE-2021/CVE-2021-390xx/CVE-2021-39015.json | 20 +- CVE-2021/CVE-2021-390xx/CVE-2021-39016.json | 20 +- CVE-2021/CVE-2021-390xx/CVE-2021-39017.json | 20 +- CVE-2021/CVE-2021-390xx/CVE-2021-39018.json | 20 +- CVE-2021/CVE-2021-390xx/CVE-2021-39019.json | 20 +- CVE-2021/CVE-2021-390xx/CVE-2021-39028.json | 20 +- CVE-2022/CVE-2022-18xx/CVE-2022-1804.json | 60 +++++ CVE-2022/CVE-2022-20xx/CVE-2022-2094.json | 22 +- CVE-2022/CVE-2022-305xx/CVE-2022-30564.json | 32 ++- CVE-2022/CVE-2022-435xx/CVE-2022-43550.json | 22 +- CVE-2022/CVE-2022-445xx/CVE-2022-44566.json | 22 +- CVE-2022/CVE-2022-459xx/CVE-2022-45982.json | 32 ++- CVE-2022/CVE-2022-474xx/CVE-2022-47416.json | 22 +- CVE-2022/CVE-2022-474xx/CVE-2022-47419.json | 22 +- CVE-2022/CVE-2022-482xx/CVE-2022-48286.json | 32 ++- CVE-2022/CVE-2022-482xx/CVE-2022-48295.json | 32 ++- CVE-2022/CVE-2022-482xx/CVE-2022-48296.json | 32 ++- CVE-2022/CVE-2022-482xx/CVE-2022-48297.json | 32 ++- CVE-2022/CVE-2022-482xx/CVE-2022-48298.json | 32 ++- CVE-2022/CVE-2022-482xx/CVE-2022-48299.json | 32 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49291.json | 104 +++++++- CVE-2022/CVE-2022-493xx/CVE-2022-49328.json | 56 +++- CVE-2022/CVE-2022-493xx/CVE-2022-49349.json | 116 +++++++- CVE-2022/CVE-2022-493xx/CVE-2022-49359.json | 64 ++++- CVE-2022/CVE-2022-493xx/CVE-2022-49362.json | 48 +++- CVE-2022/CVE-2022-493xx/CVE-2022-49377.json | 57 +++- CVE-2022/CVE-2022-493xx/CVE-2022-49385.json | 81 +++++- CVE-2022/CVE-2022-493xx/CVE-2022-49388.json | 105 +++++++- CVE-2022/CVE-2022-493xx/CVE-2022-49390.json | 59 ++++- CVE-2022/CVE-2022-494xx/CVE-2022-49411.json | 81 +++++- CVE-2022/CVE-2022-496xx/CVE-2022-49696.json | 79 +++++- CVE-2022/CVE-2022-497xx/CVE-2022-49700.json | 120 ++++++++- CVE-2023/CVE-2023-07xx/CVE-2023-0751.json | 22 +- CVE-2023/CVE-2023-227xx/CVE-2023-22798.json | 22 +- CVE-2023/CVE-2023-282xx/CVE-2023-28207.json | 14 +- CVE-2023/CVE-2023-525xx/CVE-2023-52538.json | 14 +- CVE-2024/CVE-2024-100xx/CVE-2024-10037.json | 100 +++++++ CVE-2024/CVE-2024-101xx/CVE-2024-10105.json | 27 +- CVE-2024/CVE-2024-104xx/CVE-2024-10472.json | 27 +- CVE-2024/CVE-2024-105xx/CVE-2024-10554.json | 27 +- CVE-2024/CVE-2024-105xx/CVE-2024-10560.json | 27 +- CVE-2024/CVE-2024-105xx/CVE-2024-10565.json | 27 +- CVE-2024/CVE-2024-105xx/CVE-2024-10566.json | 27 +- CVE-2024/CVE-2024-106xx/CVE-2024-10638.json | 31 ++- CVE-2024/CVE-2024-106xx/CVE-2024-10679.json | 27 +- CVE-2024/CVE-2024-107xx/CVE-2024-10703.json | 27 +- CVE-2024/CVE-2024-108xx/CVE-2024-10867.json | 52 +++- CVE-2024/CVE-2024-112xx/CVE-2024-11272.json | 27 +- CVE-2024/CVE-2024-112xx/CVE-2024-11273.json | 27 +- CVE-2024/CVE-2024-114xx/CVE-2024-11499.json | 100 +++++++ CVE-2024/CVE-2024-115xx/CVE-2024-11503.json | 27 +- CVE-2024/CVE-2024-121xx/CVE-2024-12109.json | 31 ++- CVE-2024/CVE-2024-121xx/CVE-2024-12169.json | 88 +++++++ CVE-2024/CVE-2024-125xx/CVE-2024-12586.json | 27 +- CVE-2024/CVE-2024-126xx/CVE-2024-12682.json | 27 +- CVE-2024/CVE-2024-127xx/CVE-2024-12769.json | 27 +- CVE-2024/CVE-2024-131xx/CVE-2024-13118.json | 27 +- CVE-2024/CVE-2024-131xx/CVE-2024-13122.json | 27 +- CVE-2024/CVE-2024-131xx/CVE-2024-13123.json | 27 +- CVE-2024/CVE-2024-132xx/CVE-2024-13217.json | 72 ++++- CVE-2024/CVE-2024-271xx/CVE-2024-27185.json | 39 ++- CVE-2024/CVE-2024-273xx/CVE-2024-27376.json | 12 +- CVE-2024/CVE-2024-295xx/CVE-2024-29500.json | 39 ++- CVE-2024/CVE-2024-34xx/CVE-2024-3474.json | 24 +- CVE-2024/CVE-2024-355xx/CVE-2024-35558.json | 14 +- CVE-2024/CVE-2024-35xx/CVE-2024-3552.json | 22 +- CVE-2024/CVE-2024-401xx/CVE-2024-40101.json | 32 ++- CVE-2024/CVE-2024-407xx/CVE-2024-40724.json | 12 +- CVE-2024/CVE-2024-425xx/CVE-2024-42533.json | 21 ++ CVE-2024/CVE-2024-441xx/CVE-2024-44168.json | 34 ++- CVE-2024/CVE-2024-449xx/CVE-2024-44903.json | 6 +- CVE-2024/CVE-2024-456xx/CVE-2024-45653.json | 71 ++++- CVE-2024/CVE-2024-483xx/CVE-2024-48310.json | 39 ++- CVE-2024/CVE-2024-497xx/CVE-2024-49733.json | 14 +- CVE-2024/CVE-2024-514xx/CVE-2024-51448.json | 45 +++- CVE-2024/CVE-2024-545xx/CVE-2024-54564.json | 14 +- CVE-2024/CVE-2024-575xx/CVE-2024-57519.json | 39 ++- CVE-2024/CVE-2024-580xx/CVE-2024-58055.json | 142 +++++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58058.json | 142 +++++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58059.json | 70 ++++- CVE-2024/CVE-2024-580xx/CVE-2024-58062.json | 82 +++++- CVE-2024/CVE-2024-580xx/CVE-2024-58063.json | 142 +++++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58064.json | 82 +++++- CVE-2024/CVE-2024-580xx/CVE-2024-58065.json | 70 ++++- CVE-2024/CVE-2024-580xx/CVE-2024-58066.json | 70 ++++- CVE-2024/CVE-2024-580xx/CVE-2024-58067.json | 70 ++++- CVE-2024/CVE-2024-580xx/CVE-2024-58068.json | 106 +++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58069.json | 142 +++++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58070.json | 94 ++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58071.json | 142 +++++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58073.json | 70 ++++- CVE-2024/CVE-2024-580xx/CVE-2024-58076.json | 118 ++++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58080.json | 106 +++++++- CVE-2024/CVE-2024-580xx/CVE-2024-58081.json | 82 +++++- CVE-2024/CVE-2024-66xx/CVE-2024-6606.json | 27 +- CVE-2024/CVE-2024-91xx/CVE-2024-9193.json | 67 ++++- CVE-2025/CVE-2025-02xx/CVE-2025-0285.json | 27 +- CVE-2025/CVE-2025-09xx/CVE-2025-0927.json | 12 +- CVE-2025/CVE-2025-14xx/CVE-2025-1445.json | 100 +++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1798.json | 27 +- CVE-2025/CVE-2025-19xx/CVE-2025-1932.json | 39 ++- CVE-2025/CVE-2025-19xx/CVE-2025-1933.json | 27 +- CVE-2025/CVE-2025-19xx/CVE-2025-1935.json | 39 ++- CVE-2025/CVE-2025-206xx/CVE-2025-20632.json | 27 +- CVE-2025/CVE-2025-217xx/CVE-2025-21704.json | 6 +- CVE-2025/CVE-2025-218xx/CVE-2025-21833.json | 69 ++++- CVE-2025/CVE-2025-222xx/CVE-2025-22230.json | 56 ++++ CVE-2025/CVE-2025-232xx/CVE-2025-23201.json | 48 +++- CVE-2025/CVE-2025-241xx/CVE-2025-24135.json | 36 ++- CVE-2025/CVE-2025-25xx/CVE-2025-2538.json | 4 +- CVE-2025/CVE-2025-268xx/CVE-2025-26816.json | 14 +- CVE-2025/CVE-2025-268xx/CVE-2025-26852.json | 14 +- CVE-2025/CVE-2025-276xx/CVE-2025-27631.json | 56 ++++ CVE-2025/CVE-2025-276xx/CVE-2025-27632.json | 56 ++++ CVE-2025/CVE-2025-276xx/CVE-2025-27633.json | 56 ++++ CVE-2025/CVE-2025-27xx/CVE-2025-2709.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2710.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2711.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2712.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2714.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2715.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2716.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2717.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2725.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2731.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2732.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2740.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2742.json | 10 +- CVE-2025/CVE-2025-27xx/CVE-2025-2743.json | 10 +- CVE-2025/CVE-2025-292xx/CVE-2025-29226.json | 20 +- CVE-2025/CVE-2025-296xx/CVE-2025-29635.json | 21 ++ CVE-2025/CVE-2025-299xx/CVE-2025-29932.json | 56 ++++ CVE-2025/CVE-2025-300xx/CVE-2025-30091.json | 82 ++++++ README.md | 50 +++- _state.csv | 277 ++++++++++---------- 145 files changed, 5696 insertions(+), 646 deletions(-) create mode 100644 CVE-2022/CVE-2022-18xx/CVE-2022-1804.json create mode 100644 CVE-2024/CVE-2024-100xx/CVE-2024-10037.json create mode 100644 CVE-2024/CVE-2024-114xx/CVE-2024-11499.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12169.json create mode 100644 CVE-2024/CVE-2024-425xx/CVE-2024-42533.json create mode 100644 CVE-2025/CVE-2025-14xx/CVE-2025-1445.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22230.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27631.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27632.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27633.json create mode 100644 CVE-2025/CVE-2025-296xx/CVE-2025-29635.json create mode 100644 CVE-2025/CVE-2025-299xx/CVE-2025-29932.json create mode 100644 CVE-2025/CVE-2025-300xx/CVE-2025-30091.json diff --git a/CVE-2016/CVE-2016-29xx/CVE-2016-2912.json b/CVE-2016/CVE-2016-29xx/CVE-2016-2912.json index 32472ab2794..55fc16f3e52 100644 --- a/CVE-2016/CVE-2016-29xx/CVE-2016-2912.json +++ b/CVE-2016/CVE-2016-29xx/CVE-2016-2912.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2912", "sourceIdentifier": "psirt@us.ibm.com", "published": "2016-08-08T01:59:08.210", - "lastModified": "2024-11-21T02:49:01.117", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F73844BC-E832-4EC8-A030-72315E4E86B6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "08963269-CCD9-4874-9D8B-53D9B8E6B95B" } ] } diff --git a/CVE-2016/CVE-2016-29xx/CVE-2016-2914.json b/CVE-2016/CVE-2016-29xx/CVE-2016-2914.json index 61d9a759404..01fd9d21eb0 100644 --- a/CVE-2016/CVE-2016-29xx/CVE-2016-2914.json +++ b/CVE-2016/CVE-2016-29xx/CVE-2016-2914.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2914", "sourceIdentifier": "psirt@us.ibm.com", "published": "2016-08-08T01:59:09.320", - "lastModified": "2024-11-21T02:49:01.230", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F73844BC-E832-4EC8-A030-72315E4E86B6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "08963269-CCD9-4874-9D8B-53D9B8E6B95B" } ] } diff --git a/CVE-2017/CVE-2017-17xx/CVE-2017-1787.json b/CVE-2017/CVE-2017-17xx/CVE-2017-1787.json index 487df30c352..0d1b0194c4c 100644 --- a/CVE-2017/CVE-2017-17xx/CVE-2017-1787.json +++ b/CVE-2017/CVE-2017-17xx/CVE-2017-1787.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1787", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-03-02T17:29:00.280", - "lastModified": "2024-11-21T03:22:21.710", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,13 +105,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "845D4C30-7B1B-4713-9D04-D89C139593EA" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:2.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EF6F33B2-7C70-45B1-B942-DE4C67AFE13B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6EC27D-5688-40CB-84FC-8E4D706F84E0" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D427ADAB-C11B-4A0B-AF88-DFC316B6BFCC" } ] } diff --git a/CVE-2018/CVE-2018-15xx/CVE-2018-1533.json b/CVE-2018/CVE-2018-15xx/CVE-2018-1533.json index 2620476349f..518b59bf6b7 100644 --- a/CVE-2018/CVE-2018-15xx/CVE-2018-1533.json +++ b/CVE-2018/CVE-2018-15xx/CVE-2018-1533.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1533", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-10-12T11:29:00.277", - "lastModified": "2024-11-21T03:59:58.297", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,13 +105,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6EC27D-5688-40CB-84FC-8E4D706F84E0" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D427ADAB-C11B-4A0B-AF88-DFC316B6BFCC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "954E25D6-55A3-4271-AE15-E88D0EC487E6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" } ] } diff --git a/CVE-2018/CVE-2018-15xx/CVE-2018-1534.json b/CVE-2018/CVE-2018-15xx/CVE-2018-1534.json index d3ee888207e..b1e3d26649b 100644 --- a/CVE-2018/CVE-2018-15xx/CVE-2018-1534.json +++ b/CVE-2018/CVE-2018-15xx/CVE-2018-1534.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1534", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-10-12T11:29:00.477", - "lastModified": "2024-11-21T03:59:58.410", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,13 +105,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6EC27D-5688-40CB-84FC-8E4D706F84E0" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D427ADAB-C11B-4A0B-AF88-DFC316B6BFCC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "954E25D6-55A3-4271-AE15-E88D0EC487E6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" } ] } diff --git a/CVE-2018/CVE-2018-16xx/CVE-2018-1657.json b/CVE-2018/CVE-2018-16xx/CVE-2018-1657.json index 3b0c797bdb6..e4cf535c037 100644 --- a/CVE-2018/CVE-2018-16xx/CVE-2018-1657.json +++ b/CVE-2018/CVE-2018-16xx/CVE-2018-1657.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1657", "sourceIdentifier": "psirt@us.ibm.com", "published": "2019-01-04T15:29:00.297", - "lastModified": "2024-11-21T04:00:09.113", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,18 +105,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "845D4C30-7B1B-4713-9D04-D89C139593EA" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:2.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EF6F33B2-7C70-45B1-B942-DE4C67AFE13B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6EC27D-5688-40CB-84FC-8E4D706F84E0" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D427ADAB-C11B-4A0B-AF88-DFC316B6BFCC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "954E25D6-55A3-4271-AE15-E88D0EC487E6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" } ] } diff --git a/CVE-2018/CVE-2018-19xx/CVE-2018-1951.json b/CVE-2018/CVE-2018-19xx/CVE-2018-1951.json index bc49c23c359..0f14e23071d 100644 --- a/CVE-2018/CVE-2018-19xx/CVE-2018-1951.json +++ b/CVE-2018/CVE-2018-19xx/CVE-2018-1951.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1951", "sourceIdentifier": "psirt@us.ibm.com", "published": "2019-01-04T15:29:00.500", - "lastModified": "2024-11-21T04:00:39.260", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,18 +105,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "845D4C30-7B1B-4713-9D04-D89C139593EA" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:2.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EF6F33B2-7C70-45B1-B942-DE4C67AFE13B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6EC27D-5688-40CB-84FC-8E4D706F84E0" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D427ADAB-C11B-4A0B-AF88-DFC316B6BFCC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "954E25D6-55A3-4271-AE15-E88D0EC487E6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" } ] } diff --git a/CVE-2019/CVE-2019-44xx/CVE-2019-4431.json b/CVE-2019/CVE-2019-44xx/CVE-2019-4431.json index aaa398b44ab..68fdbdf8927 100644 --- a/CVE-2019/CVE-2019-44xx/CVE-2019-4431.json +++ b/CVE-2019/CVE-2019-44xx/CVE-2019-4431.json @@ -2,7 +2,7 @@ "id": "CVE-2019-4431", "sourceIdentifier": "psirt@us.ibm.com", "published": "2020-02-12T16:15:11.393", - "lastModified": "2024-11-21T04:43:36.180", + "lastModified": "2025-03-25T14:26:28.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -107,13 +107,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "954E25D6-55A3-4271-AE15-E88D0EC487E6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F95A4EEB-086D-487E-917D-B1D11A88CF80" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" } ] } diff --git a/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json b/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json index 90a5071dbad..722d63a998f 100644 --- a/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json +++ b/CVE-2020/CVE-2020-234xx/CVE-2020-23438.json @@ -2,8 +2,8 @@ "id": "CVE-2020-23438", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-04T21:15:10.907", - "lastModified": "2025-03-04T21:15:10.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T13:02:34.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Wondershare Filmora 9.2.11 se ve afectado por el secuestro de Dll de Trojan, lo que conduce a una escalada de privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wondershare:filmora:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.2.11", + "matchCriteriaId": "E55200E5-5C0C-42DE-BDE0-EC7BC8912CD3" + } + ] + } + ] + } + ], "references": [ { "url": "https://cvewalkthrough.com/cve-2020-23438-wondershare-filmora-9-2-11-trojan-dll-hijacking-leading-to-privilege-escalation/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json b/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json index eb163faae72..5dae7d5de54 100644 --- a/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json +++ b/CVE-2020/CVE-2020-43xx/CVE-2020-4316.json @@ -2,8 +2,8 @@ "id": "CVE-2020-4316", "sourceIdentifier": "psirt@us.ibm.com", "published": "2020-07-16T15:15:27.987", - "lastModified": "2024-11-21T05:32:34.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T14:51:52.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -107,18 +107,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:publishing_engine:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E39C011E-34C4-4D0D-BD25-194994B5EB8E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:-:*:*:*:*:*:*", + "matchCriteriaId": "6821C7CB-AADC-4D4D-85B4-719EE7A1FBB4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "954E25D6-55A3-4271-AE15-E88D0EC487E6" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:-:*:*:*:*:*:*", + "matchCriteriaId": "D8CCC081-807F-4342-9D6A-E52B37EE1182" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_publishing_engine:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F95A4EEB-086D-487E-917D-B1D11A88CF80" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F583497F-CEE8-46B5-A15A-91007AA4D310" } ] } diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39015.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39015.json index 073f74a0af6..3655551f371 100644 --- a/CVE-2021/CVE-2021-390xx/CVE-2021-39015.json +++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39015.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39015", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-07-14T17:15:08.013", - "lastModified": "2024-11-21T06:18:25.010", + "lastModified": "2025-03-25T14:21:02.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,24 +83,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "96A1CD37-BB30-46C0-AB69-28DAA115CC1E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "25400833-E011-47C8-82F3-451CC15D9AFE" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD252F7-F264-42CE-ACE9-41D8655220A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2AD86D-D092-415E-A7AC-F6FC26D336D2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4BFF673F-BDEC-482B-850C-C035C589111C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.2:*:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39016.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39016.json index 3beca80cc0d..d482f2182e2 100644 --- a/CVE-2021/CVE-2021-390xx/CVE-2021-39016.json +++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39016.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39016", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-07-14T17:15:08.203", - "lastModified": "2024-11-21T06:18:25.170", + "lastModified": "2025-03-25T14:21:02.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,24 +83,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "96A1CD37-BB30-46C0-AB69-28DAA115CC1E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "25400833-E011-47C8-82F3-451CC15D9AFE" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD252F7-F264-42CE-ACE9-41D8655220A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2AD86D-D092-415E-A7AC-F6FC26D336D2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4BFF673F-BDEC-482B-850C-C035C589111C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.2:*:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39017.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39017.json index 069b87fcb63..7496065da7f 100644 --- a/CVE-2021/CVE-2021-390xx/CVE-2021-39017.json +++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39017.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39017", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-07-14T17:15:08.250", - "lastModified": "2024-11-21T06:18:25.333", + "lastModified": "2025-03-25T14:21:02.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,24 +83,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "96A1CD37-BB30-46C0-AB69-28DAA115CC1E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "25400833-E011-47C8-82F3-451CC15D9AFE" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD252F7-F264-42CE-ACE9-41D8655220A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2AD86D-D092-415E-A7AC-F6FC26D336D2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4BFF673F-BDEC-482B-850C-C035C589111C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.2:*:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39018.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39018.json index 134767e8404..cc937f2f1cf 100644 --- a/CVE-2021/CVE-2021-390xx/CVE-2021-39018.json +++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39018.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39018", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-07-14T17:15:08.297", - "lastModified": "2024-11-21T06:18:25.480", + "lastModified": "2025-03-25T14:21:02.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,24 +83,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "96A1CD37-BB30-46C0-AB69-28DAA115CC1E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "25400833-E011-47C8-82F3-451CC15D9AFE" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD252F7-F264-42CE-ACE9-41D8655220A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2AD86D-D092-415E-A7AC-F6FC26D336D2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4BFF673F-BDEC-482B-850C-C035C589111C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.2:*:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39019.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39019.json index fb9189d43c9..184ea503815 100644 --- a/CVE-2021/CVE-2021-390xx/CVE-2021-39019.json +++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39019.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39019", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-07-14T17:15:08.343", - "lastModified": "2024-11-21T06:18:25.630", + "lastModified": "2025-03-25T14:21:02.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,24 +83,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "96A1CD37-BB30-46C0-AB69-28DAA115CC1E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "25400833-E011-47C8-82F3-451CC15D9AFE" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD252F7-F264-42CE-ACE9-41D8655220A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2AD86D-D092-415E-A7AC-F6FC26D336D2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4BFF673F-BDEC-482B-850C-C035C589111C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.2:*:*:*:*:*:*:*", diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39028.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39028.json index 0faa39768a0..8943c4f292d 100644 --- a/CVE-2021/CVE-2021-390xx/CVE-2021-39028.json +++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39028.json @@ -2,7 +2,7 @@ "id": "CVE-2021-39028", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-07-14T17:15:08.387", - "lastModified": "2024-11-21T06:18:27.003", + "lastModified": "2025-03-25T14:21:02.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,24 +83,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "96A1CD37-BB30-46C0-AB69-28DAA115CC1E" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "45E5E732-2A3A-4300-BC15-2591F0D1B3C6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:6.0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "25400833-E011-47C8-82F3-451CC15D9AFE" + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:6.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB638AE-44C2-4ED0-9FEE-1EADE239BBF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FD252F7-F264-42CE-ACE9-41D8655220A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2AD86D-D092-415E-A7AC-F6FC26D336D2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4BFF673F-BDEC-482B-850C-C035C589111C" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:engineering_lifecycle_optimization_publishing:7.0.2:*:*:*:*:*:*:*", diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1804.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1804.json new file mode 100644 index 00000000000..9db2aef428a --- /dev/null +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1804.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-1804", + "sourceIdentifier": "security@ubuntu.com", + "published": "2025-03-25T13:15:38.703", + "lastModified": "2025-03-25T13:15:38.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "accountsservice no longer drops permissions when writting .pam_environment" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ubuntu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@ubuntu.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1974250", + "source": "security@ubuntu.com" + }, + { + "url": "https://ubuntu.com/security/notices/USN-5439-1", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-20xx/CVE-2022-2094.json b/CVE-2022/CVE-2022-20xx/CVE-2022-2094.json index a858fa35743..300dd49633c 100644 --- a/CVE-2022/CVE-2022-20xx/CVE-2022-2094.json +++ b/CVE-2022/CVE-2022-20xx/CVE-2022-2094.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2094", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-08T10:15:09.157", - "lastModified": "2024-11-21T07:00:18.543", + "lastModified": "2025-03-25T14:15:16.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-305xx/CVE-2022-30564.json b/CVE-2022/CVE-2022-305xx/CVE-2022-30564.json index aba8b7a3bba..4cea65318e1 100644 --- a/CVE-2022/CVE-2022-305xx/CVE-2022-30564.json +++ b/CVE-2022/CVE-2022-305xx/CVE-2022-30564.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30564", "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2023-02-09T17:15:11.607", - "lastModified": "2024-11-21T07:02:56.830", + "lastModified": "2025-03-25T14:15:17.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43550.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43550.json index 16d127d6944..f7a8fe583b0 100644 --- a/CVE-2022/CVE-2022-435xx/CVE-2022-43550.json +++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43550.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43550", "sourceIdentifier": "support@hackerone.com", "published": "2023-02-09T20:15:10.873", - "lastModified": "2024-11-21T07:26:45.820", + "lastModified": "2025-03-25T14:15:17.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44566.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44566.json index 7171817e5f4..7879ada0bff 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44566.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44566.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44566", "sourceIdentifier": "support@hackerone.com", "published": "2023-02-09T20:15:11.017", - "lastModified": "2024-11-21T07:28:08.547", + "lastModified": "2025-03-25T14:15:18.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45982.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45982.json index 1864095fdbd..23d31a4a271 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45982.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45982.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45982", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-08T21:15:10.653", - "lastModified": "2024-11-21T07:30:02.610", + "lastModified": "2025-03-25T14:15:18.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47416.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47416.json index fa123c05b4c..06a71f7747c 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47416.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47416.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47416", "sourceIdentifier": "cve@rapid7.com", "published": "2023-02-07T22:15:10.863", - "lastModified": "2024-11-21T07:31:55.120", + "lastModified": "2025-03-25T14:15:18.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47419.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47419.json index c11dc809364..d86f101ce77 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47419.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47419.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47419", "sourceIdentifier": "cve@rapid7.com", "published": "2023-02-07T22:15:11.000", - "lastModified": "2024-11-21T07:31:55.463", + "lastModified": "2025-03-25T14:15:19.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48286.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48286.json index c81dcbc5f34..29e0f5b3623 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48286.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48286.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48286", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-09T17:15:12.237", - "lastModified": "2024-11-21T07:33:05.470", + "lastModified": "2025-03-25T14:15:19.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48295.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48295.json index b1880018256..df1e617ffab 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48295.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48295.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48295", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-09T17:15:14.113", - "lastModified": "2024-11-21T07:33:06.643", + "lastModified": "2025-03-25T14:15:19.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48296.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48296.json index 70392282e16..ecee47e6e9d 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48296.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48296.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48296", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-09T17:15:14.337", - "lastModified": "2024-11-21T07:33:06.753", + "lastModified": "2025-03-25T14:15:19.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48297.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48297.json index e17e84cb164..9b6ffa9c642 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48297.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48297.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48297", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-09T17:15:14.490", - "lastModified": "2024-11-21T07:33:06.863", + "lastModified": "2025-03-25T14:15:19.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48298.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48298.json index ec1ace46bba..fd380232b16 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48298.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48298.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48298", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-09T17:15:14.687", - "lastModified": "2024-11-21T07:33:06.973", + "lastModified": "2025-03-25T14:15:19.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-1284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48299.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48299.json index c68c11fcdad..ed97ea717c3 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48299.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48299.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48299", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-09T17:15:14.853", - "lastModified": "2024-11-21T07:33:07.090", + "lastModified": "2025-03-25T14:15:20.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json index ad0bdec142f..8495cd2c31b 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49291.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49291", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:05.950", - "lastModified": "2025-02-27T18:15:25.323", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:49:23.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.14.279", + "matchCriteriaId": "E398D278-925B-4646-9105-4FA36B6398BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.243", + "matchCriteriaId": "8577DA08-190B-481F-B919-ED3DAEA3E339" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.193", + "matchCriteriaId": "EA77E853-1F30-4942-8B6A-37B168460310" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.109", + "matchCriteriaId": "F3E1A428-8D87-4CD4-B9CA-C621B32933F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.32", + "matchCriteriaId": "3191B916-53BD-46E6-AE21-58197D35768E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.18", + "matchCriteriaId": "C86410A0-E312-4F41-93E9-929EAFB31757" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.1", + "matchCriteriaId": "3004D9BF-0093-4C9C-8560-F3E91AFAE409" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json index 111b593e70f..3d530fb9ed9 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49328.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49328", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:09.610", - "lastModified": "2025-02-27T19:15:43.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:50:40.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "0DFC6E4B-8C85-4056-80F1-C9129E42FE45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4448327b41738dbfcda680eb4935ff835568f468", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51fb1278aa57ae0fc54adaa786e1965362bed4fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5f77f1dbb59feae81f88e44551e8e1d8a802d9a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e55bcdd0bf34a8b10d45ce80ebb3164c5292a17d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json index 4eb06f4ca41..6596613cbc7 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49349.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49349", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:11.623", - "lastModified": "2025-02-27T19:15:43.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:51:05.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,42 +51,136 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.318", + "matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0be698ecbe4471fcad80e81ec6a05001421041b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0ff38b99fa075ddd246487a28cb9af049f4ceef1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/10801095224de0d0ab06ae60698680c1f883a3ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a3a15bf6f9963d755270cbdb282863b84839195", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/364380c00912bed9b5d99eb485018360b0ecf64f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a2bea60cf7ff957b3eda0b17750d483876a02fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97f802a652a749422dede32071d29a53cf4bd034", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd887f83ea54aea5b780a84527e23ab95f777fed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eaecf7ebfd5dd09038a80b14be46b844f54cfc5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json index 73e4a13af71..39ec9a20540 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49359.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49359", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.583", - "lastModified": "2025-02-27T19:15:43.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:51:30.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.67", + "versionEndExcluding": "5.11", + "matchCriteriaId": "7A76EA36-1A32-42E8-93FC-BF561EE04439" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13.19", + "versionEndExcluding": "5.14", + "matchCriteriaId": "097A0850-FAA6-4FFF-88C2-F5B49B5CE740" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14.6", + "versionEndExcluding": "5.17.15", + "matchCriteriaId": "87B23815-EF6B-44C0-93AF-C7D1ABA2C903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.4", + "matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/472dd7ea5e19a1aeabf1711ddc756777e05ee7c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6e516faf04317db2c46cbec4e3b78b4653a5b109", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c8e8cc91a6ffc79865108279a74fd57d9070a17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json index ac318a62249..0a3bf489a42 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49362.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49362", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:12.860", - "lastModified": "2025-02-27T19:15:43.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:51:55.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.4", + "matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/261eabe19cb28e4a8587a4442d257b543d7c2d57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/333dcc94ebf53f79f3dc0e7a7c16700bc7ff7e57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ada1757b259f353cade47037ee0a0249b4cddad3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b6c71c66b0ad8f2b59d9bc08c7a5079b110bec01", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json index ddb906594f2..6335266a625 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49377.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49377", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:14.357", - "lastModified": "2025-02-27T19:15:43.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:58:01.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.47", + "matchCriteriaId": "E8CE53EB-22BF-479D-A782-6BDD74CD210E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.15", + "matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.4", + "matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/460aa288c5cd0544dcf933a2f0ad0e8c6d2d35ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d05426e2d5fd7df8afc866b78c36b37b00188b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70fdd922c7bf8949f8df109cf2635dff64c90392", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b140bac470b4f707cda59c7266214246238661df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json index 6f3dcdc76db..652ed7275b3 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49385.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49385", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.103", - "lastModified": "2025-02-27T18:15:25.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:58:25.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.9", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "289EB399-F22E-4F49-A013-FDAA898FE70E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.122", + "matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.47", + "matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.15", + "matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.4", + "matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/310862e574001a97ad02272bac0fd13f75f42a27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5389101257828d1913d713d9a40acbe14f5961df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d709f58c743166fe1c6914b9de0ae8868600d9b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/823f24f2e329babd0330200d0b74882516fe57f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c059665c84feab46b7173d3a1bf36c2fb7f9df86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cdf1a683a01583bca4b618dd16223cbd6e462e21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json index 01273c711c9..3029c0d34fe 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49388.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49388", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.430", - "lastModified": "2025-02-27T18:15:25.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:59:13.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,123 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "C1826012-E991-4F57-B5A8-B3B6949796C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.122", + "matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.47", + "matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.15", + "matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.4", + "matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1174ab8ba36a48025b68b5ff1085000b1e510217", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25ff1e3a1351c0d936dd1ac2f9e58231ea1510c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ff2514e4fb55dcf3d88294686040ca73ea0c1a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d8d3f68cbecfd31925796f0fb668eb21ab06734", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8302620aeb940f386817321d272b12411ae7d39f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c03a1c21d72210f81cb369cc528e3fde4b45411", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abb67043060f2bf4c03d7c3debb9ae980e2b6db3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e27ecf325e51abd06aaefba57a6322a46fa4178b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json b/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json index 7e930d1ad93..118296d3857 100644 --- a/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json +++ b/CVE-2022/CVE-2022-493xx/CVE-2022-49390.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49390", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:15.620", - "lastModified": "2025-02-27T18:15:25.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T13:48:09.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.154", + "versionEndExcluding": "4.15", + "matchCriteriaId": "344FEFB4-E393-4E04-905A-4734AC267EC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.84", + "versionEndExcluding": "4.20", + "matchCriteriaId": "B7EACEB9-7173-47F4-83A4-AE06CE74D78B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.11", + "versionEndExcluding": "5.17.15", + "matchCriteriaId": "ADA13345-8170-4521-B0CB-44DDF2C0713F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-494xx/CVE-2022-49411.json b/CVE-2022/CVE-2022-494xx/CVE-2022-49411.json index 9d86b4d85dd..ddc0814d523 100644 --- a/CVE-2022/CVE-2022-494xx/CVE-2022-49411.json +++ b/CVE-2022/CVE-2022-494xx/CVE-2022-49411.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49411", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:17.613", - "lastModified": "2025-03-05T22:15:34.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T13:42:10.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "05A83EED-420E-4720-92F3-563C3AB9A2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51f724bffa3403a5236597e6b75df7329c1ec6e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7781c38552e6cc54ed8e9040279561340516b881", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97bd6c56bdcb41079e488e31df56809e3b2ce628", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ccddf8cd411c1800863ed357064e56ceffd356bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json index ef0dddcb575..6c8c9295cf5 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49696.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49696", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.357", - "lastModified": "2025-02-27T19:15:46.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T13:39:35.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,89 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.83", + "versionEndExcluding": "5.5", + "matchCriteriaId": "89DFEADE-E552-4D59-BEA8-8CDC23D1DBEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9.14", + "versionEndExcluding": "5.10.127", + "matchCriteriaId": "AA01C0B2-1717-4416-AE10-348629F36041" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.51", + "matchCriteriaId": "B43F7696-8D52-482D-9080-84279B0CB38C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.8", + "matchCriteriaId": "0172D3FA-DDEB-482A-A270-4A1495A8798C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/361c5521c1e49843b710f455cae3c0a50b714323", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b246ddd394d7d9640816611693b0096b998e27a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/911600bf5a5e84bfda4d33ee32acc75ecf6159f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd7789e659e84f137631dc1f5ec8d794f2700e6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json index a5c0e841517..fe7a60ed4d5 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49700.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49700", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:44.740", - "lastModified": "2025-02-27T19:15:46.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T13:37:51.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,138 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1", + "versionEndExcluding": "4.9.323", + "matchCriteriaId": "2B9BA632-0605-4759-8828-79C0E7F757FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.288", + "matchCriteriaId": "11E86C4E-715B-4E25-81E9-2FD98431E3FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.252", + "matchCriteriaId": "2CC8E927-649A-40AD-AB62-F7EE444BEF0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.205", + "matchCriteriaId": "844199C4-DEBE-4DA1-AB77-5A7984F9393B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.130", + "matchCriteriaId": "8BF24898-7C80-443F-93F3-F82029BBFF72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.54", + "matchCriteriaId": "B2197EF1-3D9C-4EBA-9F94-6C8668E719B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.8", + "matchCriteriaId": "0172D3FA-DDEB-482A-A270-4A1495A8798C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0515cc9b6b24877f59b222ade704bfaa42caa2a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/197e257da473c725dfe47759c3ee02f2398d8ea5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c32496964da0dc230cea763a0e934b2e02dabd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6a597450e686d4c6388bd3cdcb17224b4dae7f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7e3e90d671078455a3a08189f89d85b3da2de9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eeaa345e128515135ccb864c04482180c08e3259", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0751.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0751.json index 3e789bd1c57..d62e1f6384b 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0751.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0751.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0751", "sourceIdentifier": "secteam@freebsd.org", "published": "2023-02-08T20:15:24.377", - "lastModified": "2024-11-21T07:37:45.253", + "lastModified": "2025-03-25T14:15:20.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22798.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22798.json index 4c7aec63206..b4d4fea7b36 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22798.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22798.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22798", "sourceIdentifier": "support@hackerone.com", "published": "2023-02-09T20:15:11.613", - "lastModified": "2024-11-21T07:45:26.777", + "lastModified": "2025-03-25T14:15:20.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28207.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28207.json index b7c4d8e5a00..8b6b83ff1f3 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28207.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28207.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28207", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-21T01:15:12.240", - "lastModified": "2025-03-24T15:09:20.773", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-25T13:15:39.417", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json index 076e75b806a..cbd21c88110 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52538", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.453", - "lastModified": "2025-03-13T15:45:54.530", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-25T14:15:21.010", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10037.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10037.json new file mode 100644 index 00000000000..f57f19cccf4 --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10037.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-10037", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:39.673", + "lastModified": "2025-03-25T13:15:39.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in the RTU500 web server component that can cause a denial of service to the RTU500 CMU application if a specially crafted message sequence is executed on a WebSocket connection.\nAn attacker must be properly authenticated and the test mode function of RTU500 must be enabled to exploit this vulnerability.\n\nThe affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000207&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10105.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10105.json index 3c5e4457308..54c7d5ccb8b 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10105.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10105.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10105", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:36.350", - "lastModified": "2025-03-25T06:15:36.350", + "lastModified": "2025-03-25T14:15:21.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Job Postings WordPress plugin before 2.7.11 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4477db12-26e9-4c6d-8b71-f3f6a0d19813/", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10472.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10472.json index fb9bc0f4369..a06a6d9bdda 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10472.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10472.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10472", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:37.750", - "lastModified": "2025-03-25T06:15:37.750", + "lastModified": "2025-03-25T14:15:21.510", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Stylish Price List WordPress plugin before 7.1.12 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d79e5c05-26d0-4223-891f-42ac9fb6ef6e/", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10554.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10554.json index ec2921a03a7..ed906b02050 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10554.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10554.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10554", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:37.847", - "lastModified": "2025-03-25T06:15:37.847", + "lastModified": "2025-03-25T14:15:21.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The WordPress WP-Advanced-Search WordPress plugin before 3.3.9.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7c15b082-caa5-4cf2-9986-2eb519dcb7c5/", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10560.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10560.json index a882eb1df50..5afd2cc2b22 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10560.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10560.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10560", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:37.947", - "lastModified": "2025-03-25T06:15:37.947", + "lastModified": "2025-03-25T14:15:21.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Form Maker by 10Web WordPress plugin before 1.15.30 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/80298c89-544d-4894-a837-253f5f26cf42/", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10565.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10565.json index c993c0008f3..76b20b58cde 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10565.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10565.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10565", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.053", - "lastModified": "2025-03-25T06:15:38.053", + "lastModified": "2025-03-25T14:15:21.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Slider by 10Web WordPress plugin before 1.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/4ef05302-a6ca-4816-ab0d-a4e3bf7a5e22/", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10566.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10566.json index 87f458e2558..533c2c1b05d 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10566.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10566.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10566", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.147", - "lastModified": "2025-03-25T06:15:38.147", + "lastModified": "2025-03-25T14:15:22.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Slider by 10Web WordPress plugin before 1.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a98a7f11-4c01-4b91-8adc-465beefa310a/", diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json index 0abecc6ff42..3e0aaa5b4ab 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10638.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10638", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.240", - "lastModified": "2025-03-25T06:15:38.240", + "lastModified": "2025-03-25T14:15:22.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,38 @@ "value": "The Product Labels For Woocommerce (Sale Badges) WordPress plugin before 1.5.11 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/32a7a778-2211-45b4-bdc2-528f27b7d4fe/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/32a7a778-2211-45b4-bdc2-528f27b7d4fe/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10679.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10679.json index 2c7358b2f85..2e170fd834b 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10679.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10679.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10679", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.337", - "lastModified": "2025-03-25T06:15:38.337", + "lastModified": "2025-03-25T14:15:22.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Quiz and Survey Master (QSM) WordPress plugin before 9.2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/001391eb-f181-441d-b777-d9ce098ba143/", diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10703.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10703.json index a3364c1a56b..5d56fac0e02 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10703.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10703.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10703", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.440", - "lastModified": "2025-03-25T06:15:38.440", + "lastModified": "2025-03-25T14:15:22.513", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Registrations for the Events Calendar WordPress plugin before 2.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/5601ac03-09e4-4b4e-b03e-98323bd36dba/", diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json index 046d38f255c..8be1dcdfa68 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10867", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-31T05:15:09.803", - "lastModified": "2025-01-31T05:15:09.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T14:35:01.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:visualmodo:borderless:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "F5D2F180-3700-4DE9-B447-B6BBB368F278" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/borderless/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88b0acee-f378-487d-8ab9-96146e0cde10?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11272.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11272.json index fb1337842ff..7b87ab3badd 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11272.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11272.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11272", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.530", - "lastModified": "2025-03-25T06:15:38.530", + "lastModified": "2025-03-25T14:15:22.660", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Contact Form & SMTP Plugin for WordPress by PirateForms WordPress plugin before 2.6.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d7a76794-bc7d-42d6-9e7d-d7b845a7f461/", diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11273.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11273.json index fc4c4c62252..4d830b9bf63 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11273.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11273.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11273", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.627", - "lastModified": "2025-03-25T06:15:38.627", + "lastModified": "2025-03-25T14:15:22.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Contact Form & SMTP Plugin for WordPress by PirateForms WordPress plugin before 2.6.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d1049a83-1298-4c8c-aeac-0055110d38fb/", diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11499.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11499.json new file mode 100644 index 00000000000..1356149bd87 --- /dev/null +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11499.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-11499", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:39.890", + "lastModified": "2025-03-25T13:15:39.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in RTU500 IEC 60870-4-104 controlled station functionality, that allows an authenticated and authorized attacker to perform a CMU restart. The vulnerability can be triggered if certificates are updated while in use on active connections.\n\nThe affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000207&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json index 28227899fec..db52c35d920 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11503.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11503", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.720", - "lastModified": "2025-03-25T06:15:38.720", + "lastModified": "2025-03-25T14:15:23.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The WP Tabs WordPress plugin before 2.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/25592b6c-b9ab-4d9e-b314-091594ce9189/", diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12109.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12109.json index a203d89f927..59d5f9d34c2 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12109.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12109.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12109", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.823", - "lastModified": "2025-03-25T06:15:38.823", + "lastModified": "2025-03-25T14:15:23.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,38 @@ "value": "The Product Labels For Woocommerce (Sale Badges) WordPress plugin before 1.5.9 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/2eca2f88-c843-4794-8cd9-46f17c92753a/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/2eca2f88-c843-4794-8cd9-46f17c92753a/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12169.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12169.json new file mode 100644 index 00000000000..1e65bdf110d --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12169.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-12169", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:40.050", + "lastModified": "2025-03-25T13:15:40.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in RTU500 IEC 60870-5-104 controlled station functionality and IEC 61850 functionality, that allows an attacker performing a specific attack sequence to restart the affected CMU. This vulnerability only applies, if secure communication using IEC 62351-3 (TLS) is enabled." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000207&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json index 0b47b036d5f..1607ea66895 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12586", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.607", - "lastModified": "2025-02-18T18:15:15.673", + "lastModified": "2025-03-25T14:15:23.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Chalet-Montagne.com Tools de WordPress hasta la versi\u00f3n 2.7.8 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/2ce05a44-762b-4aaf-b88a-92c830fd8ec4/", diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12682.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12682.json index 36fb0ce5ca9..8b52957b1be 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12682.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12682.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12682", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:38.993", - "lastModified": "2025-03-25T06:15:38.993", + "lastModified": "2025-03-25T14:15:23.513", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Smart Maintenance Mode WordPress plugin before 1.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/79d0a139-0fb3-4a4b-ac33-80cbc6cb3831/", diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12769.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12769.json index 70aea703a7f..dd94911593c 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12769.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12769.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12769", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:39.120", - "lastModified": "2025-03-25T06:15:39.120", + "lastModified": "2025-03-25T14:15:23.663", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Simple Banner WordPress plugin before 3.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/02b5c1a8-cf2a-4378-bfda-84d841d88a18/", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13118.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13118.json index 2cead6425ba..4fae10f94e9 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13118.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13118.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13118", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:39.213", - "lastModified": "2025-03-25T06:15:39.213", + "lastModified": "2025-03-25T14:15:23.797", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The IP Based Login WordPress plugin before 2.4.1 does not have CSRF checks in some places, which could allow attackers to make logged in users delete all logs via a CSRF attack" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/eba6f98e-b931-4f02-b190-ca855a674839/", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13122.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13122.json index b419d107f51..0697afe8f42 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13122.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13122.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13122", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:39.310", - "lastModified": "2025-03-25T06:15:39.310", + "lastModified": "2025-03-25T14:15:23.943", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The AFI WordPress plugin before 1.100.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/512721cb-e544-4d26-87ca-43d83e77f8e4/", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13123.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13123.json index b9bd0342c86..67152e94659 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13123.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13123.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13123", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:39.410", - "lastModified": "2025-03-25T06:15:39.410", + "lastModified": "2025-03-25T14:15:24.083", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The AFI WordPress plugin before 1.100.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/417178de-17ff-438c-a36c-b90db6486a46/", diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json index 3f88f84c578..a12910258bc 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13217", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-27T12:15:34.857", - "lastModified": "2025-02-27T12:15:34.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T13:29:59.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,24 +69,64 @@ "value": "CWE-359" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6.11", + "matchCriteriaId": "448AD0E3-01DB-4728-ABAA-FBCC5A89BBB2" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/jeg-elementor-kit/trunk/class/elements/views/class-countdown-view.php#L107", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/jeg-elementor-kit/trunk/class/elements/views/class-off-canvas-view.php#L25", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3246154/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2136cad8-6b0b-4458-a357-6e98f1ac3e0b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json index c00067cfc97..b6443815a61 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27185", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.840", - "lastModified": "2025-01-09T20:15:37.793", + "lastModified": "2025-03-25T14:15:24.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La clase de paginaci\u00f3n incluye par\u00e1metros arbitrarios en los enlaces, lo que genera vectores de ataque de envenenamiento de cach\u00e9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://developer.joomla.org/security-centre/942-20240802-core-cache-poisoning-in-pagination.html", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json index d7c4a66473d..5200f264336 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27376", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.767", - "lastModified": "2024-11-21T09:04:28.803", + "lastModified": "2025-03-25T14:15:24.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json index 5436cb2516d..14b396d59b7 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29500", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T20:15:07.510", - "lastModified": "2025-02-21T17:15:11.583", + "lastModified": "2025-03-25T14:15:24.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el modo quiosco de Secure Lockdown Multi Application Edition v2.00.219 permite a los atacantes ejecutar c\u00f3digo arbitrario ejecutando una instancia de aplicaci\u00f3n ClickOnce." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening", diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3474.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3474.json index 1503a6f9fa2..a7ce4dbd48b 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3474.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3474", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-02T06:15:50.527", - "lastModified": "2025-03-21T16:31:23.820", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-25T14:15:25.040", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json index d00a98c172d..e860a9e95bf 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35558.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35558", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.653", - "lastModified": "2024-11-21T09:20:27.063", + "lastModified": "2025-03-25T14:15:24.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/bearman113/1.md/blob/main/24/csrf.md", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json index 4a084cb42ac..29106dbf358 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3552", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-13T06:15:11.633", - "lastModified": "2024-11-21T09:29:51.677", + "lastModified": "2025-03-25T14:15:25.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json index 5e415e07dd9..312b19613d7 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40101.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40101", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T14:16:04.117", - "lastModified": "2024-11-21T09:30:56.960", + "lastModified": "2025-03-25T14:15:25.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json index c819f497d89..5f931be5d25 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40724.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40724", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-19T08:15:02.070", - "lastModified": "2024-11-21T09:31:29.927", + "lastModified": "2025-03-25T14:15:25.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42533.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42533.json new file mode 100644 index 00000000000..9b4ae8e92c4 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42533.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42533", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-25T14:15:25.750", + "lastModified": "2025-03-25T14:15:25.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in the authentication module in Convivance StandVoice 4.5 through 6.2 allows remote attackers to execute arbitrary code via the GEST_LOGIN parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/7h30th3r0n3/eae27e0eed39741365c55dfd46b57dc8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44168.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44168.json index 32734317ce1..50159c7d422 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44168.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44168.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44168", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:51.367", - "lastModified": "2024-09-26T13:56:00.007", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-25T14:15:25.867", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-114" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44903.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44903.json index 250e3046d82..cffc59bd4c3 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44903.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44903.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44903", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-25T06:15:39.790", - "lastModified": "2025-03-25T06:15:39.790", + "lastModified": "2025-03-25T14:15:26.030", "vulnStatus": "Received", "cveTags": [ { @@ -58,6 +58,10 @@ { "url": "https://www.artresilia.com/cve-2024-44903-sql-injection-vulnerability-in-horizon-information-portal/", "source": "cve@mitre.org" + }, + { + "url": "https://www.artresilia.com/cve-2024-44903-sql-injection-vulnerability-in-horizon-information-portal/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json index 2dff7aa45c2..8422d92855b 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45653", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-19T03:15:07.643", - "lastModified": "2025-01-19T03:15:07.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T14:27:46.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,12 +69,57 @@ "value": "CWE-201" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C768ACC8-D269-4E95-93F3-011DF3E7794C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BB84B3B4-6E20-4310-9BF9-DA8D3ED44E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "11E72803-A97E-45DE-AC70-EFF2BADCB7AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_connect_direct_web_services:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "914935D0-4F22-4653-8FCA-208AD42EFC94" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174104", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json index e63d89b423e..0fbec5d4f8b 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48310", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T23:15:07.677", - "lastModified": "2025-02-18T19:15:17.370", + "lastModified": "2025-03-25T14:15:26.223", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que el AutoLib Software Systems OPAC v20.10 tiene varias claves API expuestas dentro del c\u00f3digo fuente. Los atacantes pueden usar estas claves para acceder a la API de backend o a otra informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2025/Jan/11", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json index 4f77c8f726b..a2316acd4c2 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49733", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.197", - "lastModified": "2025-03-14T18:15:30.047", + "lastModified": "2025-03-25T14:15:26.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json index 4554ad92b79..665db1993c4 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51448.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51448", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-18T15:15:08.183", - "lastModified": "2025-01-18T15:15:08.183", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T14:06:48.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,51 @@ "value": "CWE-277" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0.0", + "versionEndIncluding": "21.0.7.17", + "matchCriteriaId": "DD5A94A8-24DB-4F6F-A629-031BD4BDB7F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndIncluding": "23.0.18", + "matchCriteriaId": "4641E270-157D-4040-901F-8EC5BC13961C" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7177586", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54564.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54564.json index 58f37a50df9..afd54c10db5 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54564.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54564", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-21T00:15:18.613", - "lastModified": "2025-03-24T15:09:35.767", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-25T13:15:40.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json index 8ee638c87bd..96467051b90 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57519", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T23:15:08.230", - "lastModified": "2025-02-18T19:15:22.163", + "lastModified": "2025-03-25T14:15:26.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Open5GS v.2.7.2 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n ogs_dbi_auth_info en el archivo lib/dbi/subscription.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-57519", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json index 67fbe40e9b6..d08a9e14bd7 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58055", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:51.730", - "lastModified": "2025-03-13T13:15:45.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:34:54.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_tcm: No libere el comando inmediatamente No libere el comando de forma prematura. Espere a que se complete el estado de detecci\u00f3n. En ese momento, se puede liberar. De lo contrario, liberaremos el comando dos veces." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.6", + "versionEndExcluding": "5.4.291", + "matchCriteriaId": "12DA8BBB-38CB-4CD1-897F-7B5EA22A779B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.235", + "matchCriteriaId": "545121FA-DE31-4154-9446-C2000FB4104D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.179", + "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16907219ad6763f401700e1b57b2da4f3e07f047", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/38229c35a6d7875697dfb293356407330cfcd23e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cb72dc08ed8da60fd6d1f6adf13bf0e6ee0f694", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/929b69810eec132b284ffd19047a85d961df9e4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bbb7f49839b57d66ccaf7b5752d9b63d3031dd0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c225d006a31949d673e646d585d9569bc28feeb9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e6693595bd1b55af62d057a4136a89d5c2ddf0e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0c33e7d387ccbb6870e73a43c558fefede06614", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json index 6c277d19d95..c6870f85189 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58058", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.037", - "lastModified": "2025-03-13T13:15:45.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:35:24.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: omite el volcado del \u00e1rbol tnc cuando zroot es nulo. Limpiar el cach\u00e9 de slab liberar\u00e1 todos los znode en la memoria y har\u00e1 que c->zroot.znode = NULL, luego, al volcar el \u00e1rbol tnc se acceder\u00e1 a c->zroot.znode, lo que provocar\u00e1 una desreferencia del puntero nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.27", + "versionEndExcluding": "5.4.291", + "matchCriteriaId": "9BC85AFC-19A2-4FCE-ADDB-66E528FF6039" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.235", + "matchCriteriaId": "545121FA-DE31-4154-9446-C2000FB4104D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.179", + "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1787cd67bb94b106555ffe64f887f6aa24b47010", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a987950df825d0144370e700dc5fb337684ffba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40e25a3c0063935763717877bb2a814c081509ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/428aff8f7cfb0d9a8854477648022cef96bcab28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6211c11fc20424bbc6d79c835c7c212b553ae898", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77e5266e3d3faa6bdcf20d9c68a8972f6aa06522", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdb0ca39e0acccf6771db49c3f94ed787d05f2d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e01b55f261ccc96e347eba4931e4429d080d879d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json index 51902c84b52..4d15f231ede 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58059", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.140", - "lastModified": "2025-03-06T16:15:52.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:35:53.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Se solucion\u00f3 el bloqueo durante uvc_probe Si uvc_probe() falla, puede terminar llamando a uvc_status_unregister() antes de que se llame a uvc_status_init(). Solucione esto verificando si dev->status es NULL o no en uvc_status_unregister()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a67f75c2b5ecf534eab416ce16c11fe780c4f8f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db577ededf3a18b39567fc1a6209f12a0c4a3c52", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json index 19f3c13ffb8..8e78449331a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58062", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.490", - "lastModified": "2025-03-06T16:15:52.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:36:55.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: evitar la desreferencia de puntero NULL Al iterar sobre los enlaces de un vif, debemos asegurarnos de que el puntero sea v\u00e1lido (en otras palabras, que el enlace exista) antes de desreferenciarlo. Utilice for_each_vif_active_link que tambi\u00e9n realiza la verificaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "8507AA00-C52F-4231-94AC-4D0374F5A9F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7f6fb4b7611eb6371c493c42fefad84a1742bcbb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf704a7624f99eb2ffca1a16c69183e85544a613", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fbb563ad5032a07ac83c746ce5c8de5f25b5ffd0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json index a78931968ce..f4e7f8f2ac2 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58063", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.583", - "lastModified": "2025-03-13T13:15:45.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:37:12.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtlwifi: corrige fugas de memoria y acceso no v\u00e1lido en la ruta de error de la sonda Desinicializar en orden inverso cuando la sonda falla. Cuando init_sw_vars falla, no se debe llamar a rtl_deinit_core, especialmente ahora que destruye la cola de trabajo rtl_wq. Y llame a rtl_pci_deinit y deinit_sw_vars, de lo contrario, se perder\u00e1 memoria. Elimine la llamada a pci_set_drvdata ya que ya estar\u00e1 limpiada por el c\u00f3digo del controlador central y tambi\u00e9n podr\u00eda provocar fugas de memoria. cf. commit 8d450935ae7f (\"wireless: rtlwifi: eliminar pci_set_drvdata() innecesario\") y commit 3d86b93064c7 (\"rtlwifi: corregir la memoria hu\u00e9rfana en la ruta de error de la sonda PCI\")." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.38", + "versionEndExcluding": "5.4.291", + "matchCriteriaId": "DF4BC78F-729F-4B3C-B3DB-21B562F909E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.235", + "matchCriteriaId": "545121FA-DE31-4154-9446-C2000FB4104D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.179", + "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32acebca0a51f5e372536bfdc0d7d332ab749013", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/455e0f40b5352186a9095f2135d5c89255e7c39a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/624cea89a0865a2bc3e00182a6b0f954a94328b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b76bab5c257463302c9e97f5d84d524457468eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/85b67b4c4a0f8a6fb20cf4ef7684ff2b0cf559df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b96371339fd9cac90f5ee4ac17ee5c4cbbdfa6f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7ceefbfd8d447abc8aca8ab993a942803522c06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee0b0d7baa8a6d42c7988f6e50c8f164cdf3fa47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json index a42d953eddc..5d07a5f77d6 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58064", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.733", - "lastModified": "2025-03-06T16:15:52.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:37:32.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: pruebas: Se corrige la posible desreferenciaci\u00f3n de NULL en test_cfg80211_parse_colocated_ap() kunit_kzalloc() puede devolver NULL, desreferenciarlo sin la comprobaci\u00f3n de NULL puede provocar una desreferencia de NULL. Agregue una comprobaci\u00f3n de NULL para ies." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "AF4DF509-8040-448A-9D90-DDFA1A298CFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d17d81143f5aa56ee87e60bb1000a2372a0ada8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13c4f7714c6a1ecf748a2f22099447c14fe6ed8c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/886271409603956edd09df229dde7442c410a872", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json index af9ea3ac73a..95059fa9a3a 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58065", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.830", - "lastModified": "2025-03-06T16:15:52.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:37:52.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp: pxa1908-apbc: Se ha corregido la comprobaci\u00f3n NULL frente a IS_ERR() La funci\u00f3n devm_kzalloc() devuelve NULL en caso de error, no punteros de error. Corrija la comprobaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6628f7f88de5f65f01adef5a63c707cb49d0fddb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5ca5d7b4d7c29246d957dc45d63610584ae3a54", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json index 13fd185bb9b..5cd7d127f40 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58066", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:52.997", - "lastModified": "2025-03-06T16:15:52.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:43:37.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp: pxa1908-apbcp: Se corrige una comprobaci\u00f3n de NULL frente a IS_ERR() La funci\u00f3n devm_kzalloc() no devuelve punteros de error, devuelve NULL en caso de error. Actualice la comprobaci\u00f3n para que coincida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2b3a36fb572caf9fb72f158be328395b1c938bf7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3acea81be689b77b3ceac6ff345ff0366734d967", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json index e735a38c87b..598db45a292 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58067", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:53.150", - "lastModified": "2025-03-06T16:15:53.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:44:00.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp: pxa1908-mpmu: Se corrige una comprobaci\u00f3n de NULL frente a IS_ERR() La funci\u00f3n devm_kzalloc() devuelve NULL en caso de error, no punteros de error. Actualice la comprobaci\u00f3n para que coincida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0869a7b2afdfcdd2beb0a5fb683119bcf39c0e9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7def56f841af22e07977e193eea002e085facbdb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json index 8e7e0dfaf9b..27f77e0891d 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58068", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:53.257", - "lastModified": "2025-03-06T16:15:53.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:47:07.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: OPP: se corrige dev_pm_opp_find_bw_*() cuando la tabla de ancho de banda no est\u00e1 inicializada Si un controlador llama a dev_pm_opp_find_bw_ceil/floor() para recuperar el ancho de banda de la tabla OPP pero la tabla de ancho de banda no se cre\u00f3 porque faltaban las propiedades de interconexi\u00f3n en el nodo consumidor de OPP, el kernel se bloquear\u00e1 con: No se puede gestionar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000004 ... pc : _read_bw+0x8/0x10 lr : _opp_table_find_key+0x9c/0x174 ... Rastreo de llamada: _read_bw+0x8/0x10 (P) _opp_table_find_key+0x9c/0x174 (L) _find_key+0x98/0x168 dev_pm_opp_find_bw_ceil+0x50/0x88 ... Para solucionar el fallo, cree una funci\u00f3n de afirmaci\u00f3n para verificar si la tabla de ancho de banda se cre\u00f3 antes de intentar obtener un ancho de banda con _read_bw()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2AA002D6-67A4-467A-9906-F93FAB357DD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5165486681dbd67b61b975c63125f2a5cb7f96d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84ff05c9bd577157baed711a4f0b41206593978b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8532fd078d2a5286915d03bb0a0893ee1955acef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b44b9bc7cab2967c3d6a791b1cd542c89fc07f0e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff2def251849133be6076a7c2d427d8eb963c223", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json index 76f3ba4d1e3..5bce27d86fe 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58069", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:53.373", - "lastModified": "2025-03-13T13:15:45.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:48:40.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: pcf85063: se corrige una posible escritura OOB en la lectura NVMEM PCF85063 La interfaz nvmem admite tama\u00f1os de b\u00fafer variables, mientras que la interfaz regmap opera con almacenamiento de tama\u00f1o fijo. Si un cliente nvmem usa un tama\u00f1o de b\u00fafer menor a 4 bytes, regmap_read escribir\u00e1 fuera de los l\u00edmites ya que espera que el b\u00fafer apunte a una int sin signo. Corrija esto usando una int sin signo intermedia para contener el valor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.4.291", + "matchCriteriaId": "18F68456-FFB3-4E0E-A802-F3E41C67B10E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.235", + "matchCriteriaId": "545121FA-DE31-4154-9446-C2000FB4104D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.179", + "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21cd59fcb9952eb7505da2bdfc1eb9c619df3ff4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f2a8ca9a0a38589f52a7f0fb9425b9ba987ae7c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5536677da803ed54a29a446515c28dce7d3d574", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json index 7dcb2ca2540..4a9cea922c9 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58070", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:53.480", - "lastModified": "2025-03-06T16:15:53.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:21:57.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT In PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible context. bpf_mem_alloc must be used in PREEMPT_RT. This patch is to enforce bpf_mem_alloc in the bpf_local_storage when CONFIG_PREEMPT_RT is enabled. [ 35.118559] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 [ 35.118566] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1832, name: test_progs [ 35.118569] preempt_count: 1, expected: 0 [ 35.118571] RCU nest depth: 1, expected: 1 [ 35.118577] INFO: lockdep is turned off. ... [ 35.118647] __might_resched+0x433/0x5b0 [ 35.118677] rt_spin_lock+0xc3/0x290 [ 35.118700] ___slab_alloc+0x72/0xc40 [ 35.118723] __kmalloc_noprof+0x13f/0x4e0 [ 35.118732] bpf_map_kzalloc+0xe5/0x220 [ 35.118740] bpf_selem_alloc+0x1d2/0x7b0 [ 35.118755] bpf_local_storage_update+0x2fa/0x8b0 [ 35.118784] bpf_sk_storage_get_tracing+0x15a/0x1d0 [ 35.118791] bpf_prog_9a118d86fca78ebb_trace_inet_sock_set_state+0x44/0x66 [ 35.118795] bpf_trace_run3+0x222/0x400 [ 35.118820] __bpf_trace_inet_sock_set_state+0x11/0x20 [ 35.118824] trace_inet_sock_set_state+0x112/0x130 [ 35.118830] inet_sk_state_store+0x41/0x90 [ 35.118836] tcp_set_state+0x3b3/0x640 No es necesario ajustar el gfp_flags que se pasa a bpf_mem_cache_alloc_flags() que solo respeta el GFP_KERNEL. El verificador se ha asegurado de que GFP_KERNEL se pase solo en un contexto en el que se pueda dormir. Ha sido un problema antiguo desde la primera introducci\u00f3n de bpf_local_storage hace unos 5 a\u00f1os, por lo que este parche apunta a bpf-next. Se necesita bpf_mem_alloc para resolverlo, por lo que la etiqueta Fixes se establece en el commit cuando bpf_mem_alloc se utiliz\u00f3 por primera vez en bpf_local_storage." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "C6A28F1A-2CCA-4B18-AA73-20D184A7D477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3392fa605d7c5708c5fbe02e4fbdac547c3b7352", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8eef6ac4d70eb1f0099fff93321d90ce8fa49ee1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0027500000dfcb8ee952557d565064cea22c43e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1d398a3af7e59d7fef351c84fed7ebb575d1f1a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json index 4dc1f962d60..d0fd67dd573 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58071", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:53.593", - "lastModified": "2025-03-13T13:15:45.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:22:11.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: equipo: evitar agregar un dispositivo que ya es un dispositivo de equipo inferior Evitar agregar un dispositivo que ya es un dispositivo de equipo inferior, por ejemplo, agregar veth0 si vlan1 ya se agreg\u00f3 y veth0 es un inferior de vlan1. Esto no es \u00fatil en la pr\u00e1ctica y puede provocar un bloqueo recursivo: $ ip link add veth0 type veth peer name veth1 $ ip link set veth0 up $ ip link set veth1 up $ ip link add link veth0 name veth0.1 type vlan protocol 802.1Q id 1 $ ip link add team0 type team $ ip link set veth0.1 down $ ip link set veth0.1 master team0 team0: Port device veth0.1 added $ ip link set veth0 down $ ip link set veth0 master team0 ============================================ WARNING: possible recursive locking detected 6.13.0-rc2-virtme-00441-ga14a429069bb #46 Not tainted -------------------------------------------- ip/7684 is trying to acquire lock: ffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) but task is already holding lock: ffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_add_slave (drivers/net/team/team_core.c:1147 drivers/net/team/team_core.c:1977) other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(team->team_lock_key); lock(team->team_lock_key); *** DEADLOCK *** May be due to missing lock nesting notation 2 locks held by ip/7684: stack backtrace: CPU: 3 UID: 0 PID: 7684 Comm: ip Not tainted 6.13.0-rc2-virtme-00441-ga14a429069bb #46 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: dump_stack_lvl (lib/dump_stack.c:122) print_deadlock_bug.cold (kernel/locking/lockdep.c:3040) __lock_acquire (kernel/locking/lockdep.c:3893 kernel/locking/lockdep.c:5226) ? netlink_broadcast_filtered (net/netlink/af_netlink.c:1548) lock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 2)) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? lock_acquire (kernel/locking/lockdep.c:5822) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) __mutex_lock (kernel/locking/mutex.c:587 kernel/locking/mutex.c:735) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) ? fib_sync_up (net/ipv4/fib_semantics.c:2167) ? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973) notifier_call_chain (kernel/notifier.c:85) call_netdevice_notifiers_info (net/core/dev.c:1996) __dev_notify_flags (net/core/dev.c:8993) ? __dev_change_flags (net/core/dev.c:8975) dev_change_flags (net/core/dev.c:9027) vlan_device_event (net/8021q/vlan.c:85 net/8021q/vlan.c:470) ? br_device_event (net/bridge/br.c:143) notifier_call_chain (kernel/notifier.c:85) call_netdevice_notifiers_info (net/core/dev.c:1996) dev_open (net/core/dev.c:1519 net/core/dev.c:1505) team_add_slave (drivers/net/team/team_core.c:1219 drivers/net/team/team_core.c:1977) ? __pfx_team_add_slave (drivers/net/team/team_core.c:1972) do_set_master (net/core/rtnetlink.c:2917) do_setlink.isra.0 (net/core/rtnetlink.c:3117) " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "5.4.291", + "matchCriteriaId": "B698C733-CC6F-49C5-A1FF-52429A59BA64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.235", + "matchCriteriaId": "545121FA-DE31-4154-9446-C2000FB4104D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.179", + "matchCriteriaId": "C708062C-4E1B-465F-AE6D-C09C46400875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.76", + "matchCriteriaId": "A6D70701-9CB6-4222-A957-00A419878993" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.13", + "matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a7794b9ca78c8e7d001c583bf05736169de3f20", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/184a564e6000b41582f160a5be9a9b5aabe22ac1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bb06f919fa5bec77ad9b6002525c3dcc5c1fd6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fff5da4ca2164bb4d0f1e6cd33f6eb8a0e73e50", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62ff1615815d565448c37cb8a7a2a076492ec471", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adff6ac889e16d97abd1e4543f533221127e978a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd099a2fa9be983ba0e90a57a59484fe9d520ba8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9bce1310c0e2a55888e3e08c9f69d8377b3a377", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json index b3fa5ca027f..60e6db1fb9b 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58073", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T16:15:53.833", - "lastModified": "2025-03-06T16:15:53.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:26:28.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: comprobar dpu_plane_atomic_print_state() para sspp v\u00e1lidos De manera similar a la protecci\u00f3n r_pipe sspp, agregue una verificaci\u00f3n para proteger las impresiones del estado de la tuber\u00eda para evitar la desreferencia de ptr NULL para los casos en que el estado se vuelca sin un atomic_check() correspondiente donde se asigna pipe->sspp. Patchwork: https://patchwork.freedesktop.org/patch/628404/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.2", + "matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/008af2074e4b91d34440102501b710c235a3b245", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/789384eb1437aed94155dc0eac8a8a6ba1baf578", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json index 49b16d71110..03717a07d1b 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58076", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T17:15:20.997", - "lastModified": "2025-03-13T13:15:46.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:26:52.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: gcc-sm6350: Add missing parent_map for two clocks If a clk_rcg2 has a parent, it should also have parent_map defined, otherwise we'll get a NULL pointer dereference when calling clk_set_rate like the following: [ 3.388105] Call trace: [ 3.390664] qcom_find_src_index+0x3c/0x70 (P) [ 3.395301] qcom_find_src_index+0x1c/0x70 (L) [ 3.399934] _freq_tbl_determine_rate+0x48/0x100 [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28 [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4 [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300 [ 3.455886] clk_set_rate+0x38/0x14c Agregue la propiedad parent_map para dos relojes donde falta y tambi\u00e9n desvincule parent_data para mantener juntos los parent_map y parent_data coincidentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.179", + "matchCriteriaId": "28728C80-480E-4D47-BEBE-EF9374FDE22D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "2DA5009C-C9B9-4A1D-9B96-78427E8F232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.78", + "matchCriteriaId": "0C58261F-EDFB-4A12-8CCD-F12101482030" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.14", + "matchCriteriaId": "033BB7EE-C9A2-45EA-BAC9-87BB9D951BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.3", + "matchCriteriaId": "0E92CEE3-1FC3-4AFC-A513-DEDBA7414F00" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08b77ed7cfaac62bba51ac7a0487409ec9fcbc84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/175af15551ed5aa6af16ff97aff75cfffb42da21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39336edd14a59dc086fb19957655e0f340bb28e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e567032233a240b903dc11c9f18eeb3faa10ffa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96fe1a7ee477d701cfc98ab9d3c730c35d966861", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b6fe13566bf5676b1e3b72d2a06d875733e93ee6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json index 728f86a2d14..da4917adcfa 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58080", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T17:15:21.473", - "lastModified": "2025-03-06T17:15:21.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:27:18.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: qcom: dispcc-sm6350: Add missing parent_map for a clock If a clk_rcg2 has a parent, it should also have parent_map defined, otherwise we'll get a NULL pointer dereference when calling clk_set_rate like the following: [ 3.388105] Call trace: [ 3.390664] qcom_find_src_index+0x3c/0x70 (P) [ 3.395301] qcom_find_src_index+0x1c/0x70 (L) [ 3.399934] _freq_tbl_determine_rate+0x48/0x100 [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28 [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4 [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300 [ 3.455886] clk_set_rate+0x38/0x14c Agregue la propiedad parent_map para el reloj donde falta y tambi\u00e9n desvincule parent_data para mantener juntos los parent_map y parent_data coincidentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.129", + "matchCriteriaId": "F97600FD-25BD-4A8A-A64D-C51ED328C14E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.78", + "matchCriteriaId": "0C58261F-EDFB-4A12-8CCD-F12101482030" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.14", + "matchCriteriaId": "033BB7EE-C9A2-45EA-BAC9-87BB9D951BCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.3", + "matchCriteriaId": "0E92CEE3-1FC3-4AFC-A513-DEDBA7414F00" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2dba8d5d423fa5f6f3a687aa6e0da5808f69091b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ad28517385e2821e8e43388d6a0b3e1ba0bc3ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3daca9050857220726732ad9d4a8512069386f46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1f15808adfd77268eac7fefce5378ad9fedbfba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4cdb196f182d2fbe336c968228be00d8c3fed05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json index b496f93e185..9de0f58290f 100644 --- a/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58081", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T17:15:21.577", - "lastModified": "2025-03-06T17:15:21.577", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:27:38.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: mmp2: llamar a pm_genpd_init() solo despu\u00e9s de que se establece genpd.name La configuraci\u00f3n del nombre del dispositivo de la estructura genpd con dev_set_name() ocurre dentro de pm_genpd_init(). Si permanece NULL, las cosas pueden explotar m\u00e1s tarde, como al crear la jerarqu\u00eda devfs para el dominio de energ\u00eda: No se puede gestionar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se lee ... Rastreo de llamadas: start_creating+0x90/0x138 start_creating from debugfs_create_dir+0x20/0x178 debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144 genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90 genpd_debug_init from do_one_initcall+0x5c/0x244 do_one_initcall from kernel_init_freeable+0x19c/0x1f4 kernel_init_freeable from kernel_init+0x1c/0x12c kernel_init from ret_from_fork+0x14/0x28 Bisecting rastrea este fallo hasta el commit 899f44531fe6 (\"pmdomain: core: Agregar bandera GENPD_FLAG_DEV_NAME_FW\"), que intercambia el uso de genpd->name con dev_name(&genpd->dev) en genpd_debug_add.part()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.10", + "versionEndExcluding": "6.12.14", + "matchCriteriaId": "60E0F633-DD61-45FD-93DF-45D73D3E33F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.3", + "matchCriteriaId": "0E92CEE3-1FC3-4AFC-A513-DEDBA7414F00" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/763517124e27b07fa300b486d7d13c5d563a215e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e24b15d4704dcb73920c3d18a6157abd18df08c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eca01d5911fb34218d10a58d8d9534b758c8fd0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json index 7abbab3b89f..498a2e538cf 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6606", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.727", - "lastModified": "2025-01-09T22:15:29.577", + "lastModified": "2025-03-25T14:15:26.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El c\u00f3digo del portapapeles no pudo verificar el \u00edndice en un acceso a la matriz. Esto podr\u00eda haber dado lugar a una lectura fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox < 128." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json index 574df22d5d7..b64748babb6 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9193", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:11.437", - "lastModified": "2025-02-28T09:15:11.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T13:12:04.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,55 @@ "value": "CWE-98" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:whmpress:whmcs:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.3", + "matchCriteriaId": "A709BAEF-BA0D-4E43-A247-95931E1328EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:whmpress:whmcs:6.3:rev0:*:*:*:wordpress:*:*", + "matchCriteriaId": "E140F243-BE94-4354-B69C-78C601732386" + } + ] + } + ] } ], "references": [ { "url": "https://whmpress.com/docs/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f3b0e75-d2f0-48b7-ba33-75c4e998030e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json index 3b7fdf28f2a..d0f616318dd 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0285.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0285", "sourceIdentifier": "cret@cert.org", "published": "2025-03-03T17:15:13.430", - "lastModified": "2025-03-12T17:15:42.817", + "lastModified": "2025-03-25T14:15:27.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Paragon Partition Manager versi\u00f3n 7.9.1 contiene una vulnerabilidad de mapeo de memoria de kernel arbitraria dentro de biontdrv.sys que es causada por una falla en la validaci\u00f3n adecuada de la longitud de los datos suministrados por el usuario, lo que puede permitir a un atacante realizar ataques de escalada de privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys", diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json index d54d241b475..e74fd9ae224 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0927.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0927", "sourceIdentifier": "security@ubuntu.com", "published": "2025-03-23T15:15:12.537", - "lastModified": "2025-03-23T15:15:12.537", - "vulnStatus": "Received", + "lastModified": "2025-03-25T14:15:27.397", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Attila Sz\u00e1sz discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code." + }, + { + "lang": "es", + "value": "Attila Sz\u00e1sz descubri\u00f3 que la implementaci\u00f3n del sistema de archivos HFS+ en el kernel de Linux conten\u00eda una vulnerabilidad de desbordamiento de pila. Un atacante podr\u00eda usar una imagen del sistema de archivos especialmente manipulada que, al montarse, podr\u00eda causar una denegaci\u00f3n de servicio (fallo del sistema) o posiblemente ejecutar c\u00f3digo arbitrario." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://ubuntu.com/security/notices/USN-7276-1", "source": "security@ubuntu.com" + }, + { + "url": "https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1445.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1445.json new file mode 100644 index 00000000000..80bdfe1b40f --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1445.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-1445", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:40.347", + "lastModified": "2025-03-25T13:15:40.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability exists in RTU IEC 61850 client and server functionality that could impact the availability if renegotiation of an open IEC61850 TLS connection takes place in specific timing situations, when IEC61850 communication is active.\n\nPrecondition is that IEC61850 as client or server are configured using TLS on RTU500 device. It affects the CMU the IEC61850 stack is configured on." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-820" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000207&languageCode=en&Preview=true", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1798.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1798.json index 3a4995d9c3e..9eb45badf55 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1798.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1798.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1798", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-25T06:15:40.480", - "lastModified": "2025-03-25T06:15:40.480", + "lastModified": "2025-03-25T14:15:27.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The does not sanitise and escape some parameters when outputting them back in a page, allowing unauthenticated users the ability to perform stored Cross-Site Scripting attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/c5c30191-857c-419c-9096-d1fe14d34eaa/", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json index 1f6605dcab9..bbd4d8e8967 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1932.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1932", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.053", - "lastModified": "2025-03-12T17:15:48.497", + "lastModified": "2025-03-25T14:15:27.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un comparador incoherente en xslt/txNodeSorter podr\u00eda haber dado lugar a un acceso fuera de los l\u00edmites potencialmente explotable. Solo afecta a la versi\u00f3n 122 y posteriores. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944313", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json index 6891c222e7a..403f6bb6964 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1933", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.170", - "lastModified": "2025-03-12T17:15:48.730", + "lastModified": "2025-03-25T14:15:27.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En las CPU de 64 bits, cuando el JIT compila los valores de retorno de WASM i32, estos pueden tomar bits de la memoria restante. Esto puede provocar que se los trate como un tipo diferente. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004", diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json index e8cc68f1c66..2c2fd7b585c 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1935", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.390", - "lastModified": "2025-03-12T17:15:49.147", + "lastModified": "2025-03-25T14:15:28.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una p\u00e1gina web podr\u00eda enga\u00f1ar a un usuario para que configure ese sitio como el controlador predeterminado para un protocolo de URL personalizado. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661", diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20632.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20632.json index 7a7a4c44fee..5219d67f452 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20632.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20632.json @@ -2,7 +2,7 @@ "id": "CVE-2025-20632", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:08.177", - "lastModified": "2025-02-18T19:15:24.460", + "lastModified": "2025-03-25T14:15:28.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el controlador de punto de acceso WLAN, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00397139; ID de problema: MSV-2188." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21704.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21704.json index 88369ca0f89..138659593cd 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21704.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21704.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21704", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-22T10:15:11.263", - "lastModified": "2025-03-13T13:15:48.910", + "lastModified": "2025-03-25T13:15:40.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -48,6 +48,10 @@ { "url": "https://git.kernel.org/stable/c/f64079bef6a8a7823358c3f352ea29a617844636", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://project-zero.issues.chromium.org/issues/395107243", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json index d8fbab6802c..9441b3b6de3 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21833", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-06T17:15:23.293", - "lastModified": "2025-03-06T17:15:23.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-25T14:27:52.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: evitar el uso de NULL despu\u00e9s de WARN_ON_ONCE Existe un WARN_ON_ONCE para detectar una situaci\u00f3n poco probable en la que domain_remove_dev_pasid no puede encontrar el `pasid`. En caso de que ocurra, debemos evitar el uso de un puntero NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.13.3", + "matchCriteriaId": "BE4E9494-C003-4567-B9CB-CF0C8429C517" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/60f030f7418d3f1d94f2fb207fe3080e1844630b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df96876be3b064aefc493f760e0639765d13ed0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22230.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22230.json new file mode 100644 index 00000000000..dc2223cda2d --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22230.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22230", + "sourceIdentifier": "security@vmware.com", + "published": "2025-03-25T14:15:28.440", + "lastModified": "2025-03-25T14:15:28.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control.\u00a0A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json index b3b4ab8ce74..e9d2a881aec 100644 --- a/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23201.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23201", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:08.880", - "lastModified": "2025-01-16T23:15:08.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-25T14:57:12.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.11.0", + "matchCriteriaId": "2AEF7E05-D916-4B7C-ADCF-6BAFAD37551A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/librenms/librenms/security/advisories/GHSA-g84x-g96g-rcjc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json index 72eff6438b2..60be7a5b425 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24135", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.247", - "lastModified": "2025-03-04T14:55:07.030", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-25T14:15:28.597", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json index 5a444b84d77..9deb1722d47 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2538.json @@ -2,13 +2,13 @@ "id": "CVE-2025-2538", "sourceIdentifier": "psirt@esri.com", "published": "2025-03-20T21:15:23.730", - "lastModified": "2025-03-24T20:15:18.580", + "lastModified": "2025-03-25T14:15:29.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A specific type of ArcGIS Enterprise deployment is vulnerable to a Password Recovery Exploitation vulnerability in Portal for ArcGIS\"." + "value": "Some deployments of Esri ArcGIS Enterprise are vulnerable to an improper authentication vulnerability." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26816.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26816.json index c18c045fdcb..2626666a32d 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26816.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26816.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26816", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-19T21:15:38.977", - "lastModified": "2025-03-20T21:15:23.273", + "lastModified": "2025-03-25T13:15:40.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], "references": [ { "url": "https://security.intrexx.com/en/security-advisories/ixsa-20250310-01/", diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json index ad3257c0b7c..e5e3254aaf0 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26852.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26852", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-20T20:15:32.497", - "lastModified": "2025-03-20T21:15:23.400", + "lastModified": "2025-03-25T13:15:40.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.descor.com/prodotti/infocad", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27631.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27631.json new file mode 100644 index 00000000000..4b9aae00bff --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27631.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27631", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:40.947", + "lastModified": "2025-03-25T13:15:40.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TRMTracker web application is vulnerable to LDAP injection attack potentially allowing an attacker to inject code into a query and execute remote commands that can read and update data on the website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-90" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000210&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27632.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27632.json new file mode 100644 index 00000000000..e2aff5e6b12 --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27632.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27632", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:41.090", + "lastModified": "2025-03-25T13:15:41.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Host Header Injection vulnerability in TRMTracker application may allow an attacker by modifying the host header value in an HTTP request to leverage multiple attack vectors, including defacing the site content through web-cache poisoning." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000210&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27633.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27633.json new file mode 100644 index 00000000000..4947a00c06f --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27633.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27633", + "sourceIdentifier": "cybersecurity@hitachienergy.com", + "published": "2025-03-25T13:15:41.223", + "lastModified": "2025-03-25T13:15:41.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TRMTracker web application is vulnerable to reflected Cross-site scripting attack. The application allows client-side code injection that might be used to compromise the confidentiality and integrity of the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000210&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@hitachienergy.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json index 0daca61bc86..bcbaa3bc930 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2709.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2709", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T20:15:19.133", - "lastModified": "2025-03-24T20:15:19.133", + "lastModified": "2025-03-25T14:15:29.380", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.517305", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Hebing123/cve/issues/84", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json index a4df6ff44ba..cdae7fdf429 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2710.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2710", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T21:15:18.547", - "lastModified": "2025-03-24T21:15:18.547", + "lastModified": "2025-03-25T14:15:29.517", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.517306", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Hebing123/cve/issues/85", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2711.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2711.json index 545fb4753a6..6352d9c313d 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2711.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2711.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2711", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T21:15:18.760", - "lastModified": "2025-03-24T21:15:18.760", + "lastModified": "2025-03-25T14:15:29.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.517309", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Hebing123/cve/issues/86", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2712.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2712.json index 9544803a73b..d2d992e0525 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2712.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2712.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2712", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T22:15:14.110", - "lastModified": "2025-03-24T22:15:14.110", + "lastModified": "2025-03-25T14:15:29.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?id.300733", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Hebing123/cve/issues/86", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2714.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2714.json index 00c16dd60f5..775a9f9062a 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2714.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2714.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2714", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T22:15:14.283", - "lastModified": "2025-03-24T22:15:14.283", + "lastModified": "2025-03-25T14:15:29.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?submit.517638", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.517638", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2715.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2715.json index ac7125912fb..e4879ab482b 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2715.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2715.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2715", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T23:15:13.440", - "lastModified": "2025-03-24T23:15:13.440", + "lastModified": "2025-03-25T14:15:29.990", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.519791", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/janssensjelle/published-pocs/blob/main/weberp-xss-confirm-dispatch.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2716.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2716.json index 5e24e09a2c0..5bcf98e1e38 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2716.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2716.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2716", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-24T23:15:13.610", - "lastModified": "2025-03-24T23:15:13.610", + "lastModified": "2025-03-25T14:15:30.120", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?submit.519900", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rookiiiiiiie/China-Mobile-Internet-of-Things-Co.-Ltd./blob/main/Issues.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2717.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2717.json index 27e3db04074..cc1fbc0efa2 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2717.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2717.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2717", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T00:15:15.290", - "lastModified": "2025-03-25T00:15:15.290", + "lastModified": "2025-03-25T14:15:30.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mono7s/Dir-823x/blob/main/diag_nslookup/diag_nslookup.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json index d896be4c3f7..1c2784d2656 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2725.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2725", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T03:15:16.097", - "lastModified": "2025-03-25T03:15:16.097", + "lastModified": "2025-03-25T14:15:30.710", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.520390", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ZIKH26/CVE-information/blob/master/H3C/Vulnerability%20Information_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json index 06392d72a05..59c0ec72ceb 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2731.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2731", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T04:15:18.943", - "lastModified": "2025-03-25T04:15:18.943", + "lastModified": "2025-03-25T14:15:31.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.520497", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json index 8ed1d51840d..a54703a52c4 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2732.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2732", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T04:15:20.793", - "lastModified": "2025-03-25T04:15:20.793", + "lastModified": "2025-03-25T14:15:31.303", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.520499", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_4.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2740.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2740.json index 3acb073b18b..3bf96de9a63 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2740.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2740.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2740", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T07:15:38.493", - "lastModified": "2025-03-25T07:15:38.493", + "lastModified": "2025-03-25T14:15:31.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.524733", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/guimo3/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2742.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2742.json index b9de49b7b64..19d4905f55d 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2742.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2742.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2742", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T07:15:38.700", - "lastModified": "2025-03-25T07:15:38.700", + "lastModified": "2025-03-25T14:15:31.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?submit.519691", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#5arbitrary-file-deletion-vulnerability---uploadpermanentmaterial", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2743.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2743.json index 36f478b9520..d7159080e5c 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2743.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2743.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2743", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-25T07:15:38.883", - "lastModified": "2025-03-25T07:15:38.883", + "lastModified": "2025-03-25T14:15:31.893", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?submit.519692", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#6arbitrary-file-deletion-vulnerability---uploadtemporarymaterial", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-292xx/CVE-2025-29226.json b/CVE-2025/CVE-2025-292xx/CVE-2025-29226.json index f1fd4f4a26b..0a18fdf8bdb 100644 --- a/CVE-2025/CVE-2025-292xx/CVE-2025-29226.json +++ b/CVE-2025/CVE-2025-292xx/CVE-2025-29226.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29226", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-21T17:15:39.583", - "lastModified": "2025-03-21T19:15:46.170", - "vulnStatus": "Received", + "lastModified": "2025-03-25T13:15:41.357", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter." + }, + { + "lang": "es", + "value": "En Linksys E5600 V1.1.0.26, el archivo \\usr\\share\\lua\\runtime.lua contiene una vulnerabilidad de inyecci\u00f3n de comandos en la funci\u00f3n runtime.pingTest a trav\u00e9s del par\u00e1metro pt[\"count\"]." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_pingTest_count/CI_pingTest_count.md", diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29635.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29635.json new file mode 100644 index 00000000000..a80ae6d6e37 --- /dev/null +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29635.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29635", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-25T14:15:29.043", + "lastModified": "2025-03-25T14:15:29.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mono7s/Dir-823x/blob/main/set_prohibiting/set_prohibiting.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29932.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29932.json new file mode 100644 index 00000000000..f375d3f0323 --- /dev/null +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29932.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29932", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-03-25T13:15:41.520", + "lastModified": "2025-03-25T13:15:41.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains GoLand before 2025.1 an XXE during debugging was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30091.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30091.json new file mode 100644 index 00000000000..fa9c20b4e01 --- /dev/null +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30091.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-30091", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-25T14:15:32.143", + "lastModified": "2025-03-25T14:15:32.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Tiny MoxieManager PHP before 4.0.0, remote code execution can occur in the installer command. This vulnerability allows unauthenticated attackers to inject and execute arbitrary code. Attacker-controlled data to InstallCommand can be inserted into config.php, and InstallCommand is available after an installation has completed." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxiemanager.com/changelog/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.moxiemanager.com/documentation/SEC-1063.php", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8f7e87f5b64..631cb739e43 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-25T13:00:20.348617+00:00 +2025-03-25T15:00:21.124020+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-25T12:59:40.957000+00:00 +2025-03-25T14:59:13.997000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286515 +286528 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `13` -- [CVE-2025-2109](CVE-2025/CVE-2025-21xx/CVE-2025-2109.json) (`2025-03-25T11:15:36.333`) +- [CVE-2022-1804](CVE-2022/CVE-2022-18xx/CVE-2022-1804.json) (`2025-03-25T13:15:38.703`) +- [CVE-2024-10037](CVE-2024/CVE-2024-100xx/CVE-2024-10037.json) (`2025-03-25T13:15:39.673`) +- [CVE-2024-11499](CVE-2024/CVE-2024-114xx/CVE-2024-11499.json) (`2025-03-25T13:15:39.890`) +- [CVE-2024-12169](CVE-2024/CVE-2024-121xx/CVE-2024-12169.json) (`2025-03-25T13:15:40.050`) +- [CVE-2024-42533](CVE-2024/CVE-2024-425xx/CVE-2024-42533.json) (`2025-03-25T14:15:25.750`) +- [CVE-2025-1445](CVE-2025/CVE-2025-14xx/CVE-2025-1445.json) (`2025-03-25T13:15:40.347`) +- [CVE-2025-22230](CVE-2025/CVE-2025-222xx/CVE-2025-22230.json) (`2025-03-25T14:15:28.440`) +- [CVE-2025-27631](CVE-2025/CVE-2025-276xx/CVE-2025-27631.json) (`2025-03-25T13:15:40.947`) +- [CVE-2025-27632](CVE-2025/CVE-2025-276xx/CVE-2025-27632.json) (`2025-03-25T13:15:41.090`) +- [CVE-2025-27633](CVE-2025/CVE-2025-276xx/CVE-2025-27633.json) (`2025-03-25T13:15:41.223`) +- [CVE-2025-29635](CVE-2025/CVE-2025-296xx/CVE-2025-29635.json) (`2025-03-25T14:15:29.043`) +- [CVE-2025-29932](CVE-2025/CVE-2025-299xx/CVE-2025-29932.json) (`2025-03-25T13:15:41.520`) +- [CVE-2025-30091](CVE-2025/CVE-2025-300xx/CVE-2025-30091.json) (`2025-03-25T14:15:32.143`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `130` -- [CVE-2025-20208](CVE-2025/CVE-2025-202xx/CVE-2025-20208.json) (`2025-03-25T12:59:40.957`) +- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-03-25T14:15:27.927`) +- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-25T14:15:28.063`) +- [CVE-2025-20632](CVE-2025/CVE-2025-206xx/CVE-2025-20632.json) (`2025-03-25T14:15:28.270`) +- [CVE-2025-21704](CVE-2025/CVE-2025-217xx/CVE-2025-21704.json) (`2025-03-25T13:15:40.507`) +- [CVE-2025-21833](CVE-2025/CVE-2025-218xx/CVE-2025-21833.json) (`2025-03-25T14:27:52.403`) +- [CVE-2025-23201](CVE-2025/CVE-2025-232xx/CVE-2025-23201.json) (`2025-03-25T14:57:12.250`) +- [CVE-2025-24135](CVE-2025/CVE-2025-241xx/CVE-2025-24135.json) (`2025-03-25T14:15:28.597`) +- [CVE-2025-2538](CVE-2025/CVE-2025-25xx/CVE-2025-2538.json) (`2025-03-25T14:15:29.270`) +- [CVE-2025-26816](CVE-2025/CVE-2025-268xx/CVE-2025-26816.json) (`2025-03-25T13:15:40.623`) +- [CVE-2025-26852](CVE-2025/CVE-2025-268xx/CVE-2025-26852.json) (`2025-03-25T13:15:40.793`) +- [CVE-2025-2709](CVE-2025/CVE-2025-27xx/CVE-2025-2709.json) (`2025-03-25T14:15:29.380`) +- [CVE-2025-2710](CVE-2025/CVE-2025-27xx/CVE-2025-2710.json) (`2025-03-25T14:15:29.517`) +- [CVE-2025-2711](CVE-2025/CVE-2025-27xx/CVE-2025-2711.json) (`2025-03-25T14:15:29.637`) +- [CVE-2025-2712](CVE-2025/CVE-2025-27xx/CVE-2025-2712.json) (`2025-03-25T14:15:29.753`) +- [CVE-2025-2714](CVE-2025/CVE-2025-27xx/CVE-2025-2714.json) (`2025-03-25T14:15:29.873`) +- [CVE-2025-2715](CVE-2025/CVE-2025-27xx/CVE-2025-2715.json) (`2025-03-25T14:15:29.990`) +- [CVE-2025-2716](CVE-2025/CVE-2025-27xx/CVE-2025-2716.json) (`2025-03-25T14:15:30.120`) +- [CVE-2025-2717](CVE-2025/CVE-2025-27xx/CVE-2025-2717.json) (`2025-03-25T14:15:30.240`) +- [CVE-2025-2725](CVE-2025/CVE-2025-27xx/CVE-2025-2725.json) (`2025-03-25T14:15:30.710`) +- [CVE-2025-2731](CVE-2025/CVE-2025-27xx/CVE-2025-2731.json) (`2025-03-25T14:15:31.170`) +- [CVE-2025-2732](CVE-2025/CVE-2025-27xx/CVE-2025-2732.json) (`2025-03-25T14:15:31.303`) +- [CVE-2025-2740](CVE-2025/CVE-2025-27xx/CVE-2025-2740.json) (`2025-03-25T14:15:31.640`) +- [CVE-2025-2742](CVE-2025/CVE-2025-27xx/CVE-2025-2742.json) (`2025-03-25T14:15:31.770`) +- [CVE-2025-2743](CVE-2025/CVE-2025-27xx/CVE-2025-2743.json) (`2025-03-25T14:15:31.893`) +- [CVE-2025-29226](CVE-2025/CVE-2025-292xx/CVE-2025-29226.json) (`2025-03-25T13:15:41.357`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e39588c40c5..ae675a99c3a 100644 --- a/_state.csv +++ b/_state.csv @@ -86231,8 +86231,8 @@ CVE-2016-2889,0,0,76f18ba457962ae2d8b9afa23ee955c1fd769b2dad32d1cfe4cc6ba70ececb CVE-2016-2894,0,0,e9935395ef86543a79916d9b9e9232c18d23c01262229df5ccaccb288f7dd140,2024-11-21T02:49:00.770000 CVE-2016-2901,0,0,b744d0bb1516eee0c71b82e12a43158e33d19199413ced330209fd598629f87c,2024-11-21T02:49:00.887000 CVE-2016-2908,0,0,15961645aa1b745e3e46c8bdb58118a0650352e5d5d51ae014fab453fd286869,2024-11-21T02:49:00.993000 -CVE-2016-2912,0,0,5c0d59ab89c2d7417f9814053481eb15f8aac35a0e879bc450f918a3839541b5,2024-11-21T02:49:01.117000 -CVE-2016-2914,0,0,5742128ed969f717826432daae532d2b7b5a1fd1b17a3e4af5c72e51a5b33ff1,2024-11-21T02:49:01.230000 +CVE-2016-2912,0,1,f4d5ba424f512e6500a250f6740223c1e9bf7e83d2dca9b740753d111a41c19c,2025-03-25T14:26:28.453000 +CVE-2016-2914,0,1,cfbfcc288963dac7ee4b3a12dfe2a6555df319cd3ebe725bcd3c115a630ffbf1,2025-03-25T14:26:28.453000 CVE-2016-2917,0,0,f447999bbc76e6c0bf4b65bd867b073e553e541290996417a50de59c2a979c63,2024-11-21T02:49:01.347000 CVE-2016-2922,0,0,0da2ec9259388c332d718b0980fb34ea0f4515da37260f3c3c632a7dc657bfb6,2024-11-21T02:49:01.457000 CVE-2016-2923,0,0,652a0d7334dfd34b8c2b79d1fd23b8f7123d182364b8ef563945bdb0ca648f9b,2024-11-21T02:49:01.597000 @@ -101165,7 +101165,7 @@ CVE-2017-17866,0,0,171b570be9905ab7cfacd3f182b90b1a7bd70a1811948c345fcd753a5a38d CVE-2017-17867,0,0,11b937ab3849d41b9a3e1a20ecf1dd1faa0342c83949844945ac1c3a96528240,2024-11-21T03:18:51.097000 CVE-2017-17868,0,0,860224266c307253409112d0b992b8e9523a9e4cc0c01cf8903eca92ca8ff568,2024-11-21T03:18:51.243000 CVE-2017-17869,0,0,6c64ddb856b9def87784dd3556d0512d876c41d19542b4c3851c21a3e1eb66af,2024-11-21T03:18:51.390000 -CVE-2017-1787,0,0,1a0b6e3f0599b1af533080ff8ca0bd5a4dad72c77face514c390ffff0fe3d62b,2024-11-21T03:22:21.710000 +CVE-2017-1787,0,1,b4269260099eb6126c610b06a8ba73cb5d8ec3e75387e7c28adc91dc02b99809,2025-03-25T14:26:28.453000 CVE-2017-17870,0,0,3f57008c5c3025c683ac6ff5f3038e75e805648c9ed613e4702d8895b327b9c1,2024-11-21T03:18:51.537000 CVE-2017-17871,0,0,703a97eecc5b28b0afdabbd9dd50aeb650c81a1203b62d793977417f4b351613,2024-11-21T03:18:51.693000 CVE-2017-17872,0,0,2c9c6ed16d103121052acae8f7c0c95d704cb4d58e96ce2abc92c5442d35b513,2024-11-21T03:18:51.847000 @@ -115786,7 +115786,7 @@ CVE-2018-15326,0,0,56e3278dcbb561580d585360554b5c3b862288620afb1496a59584b15caa3 CVE-2018-15327,0,0,37224af48e346ce1d6973775c31abbd0929ec411ba899e0cea6a852dbe3c7556,2024-11-21T03:50:34.270000 CVE-2018-15328,0,0,ef0c1fa251ac1626a4bee6be38a12ec98f4765b129123b69ca4a888e84004624,2024-11-21T03:50:34.407000 CVE-2018-15329,0,0,71665d99ef563217e0786d212c7d48fdc997a528d9e5cd42f1a813725ccca235,2024-11-21T03:50:34.563000 -CVE-2018-1533,0,0,5ef6e051a0de9703fbfe94ff34c162179c530bb68e0d0630cfbe1a2c898be8cf,2024-11-21T03:59:58.297000 +CVE-2018-1533,0,1,ade43073d9da98c50ef9ddfedd38d8d9bdf0da52670f883e02cfe79ae49b7e14,2025-03-25T14:26:28.453000 CVE-2018-15330,0,0,bc26c7f9a5b3c7283a597c249751bcb7aca5829dcfabfc2135c175d3fe71f9f5,2024-11-21T03:50:34.737000 CVE-2018-15331,0,0,ca386627cd8496921b7fdea367648d4caafb1c1fc565b1f28c59564a37d16448,2024-11-21T03:50:34.890000 CVE-2018-15332,0,0,e75a060bce14611a109b4e6fa49fe17710a797cd6723e73ef7368b3c06bf1214,2024-11-21T03:50:35.043000 @@ -115797,7 +115797,7 @@ CVE-2018-15336,0,0,9c35f444c2868db8af1375a84ece25614a1b9e5e4f0e4b58a4ad83f2c7f3b CVE-2018-15337,0,0,ae25a475cd06f204b89c4ad1b3b084efa4fe63baca40eb92c5bc7ea131444827,2023-11-07T02:53:05.810000 CVE-2018-15338,0,0,2432688757be348611b8eb176b6bf9e2f423ce95bba0423d791d49cc470ea176,2023-11-07T02:53:06.063000 CVE-2018-15339,0,0,9485aad9c3d5f3f03b323d1c213e1ae36a2bdb63152b2a27b7faa69197670598,2023-11-07T02:53:06.307000 -CVE-2018-1534,0,0,3e6acfaa7525575e9b6b51e2ad2ad2f20aa5019347d1863f3d7b24feccafc925,2024-11-21T03:59:58.410000 +CVE-2018-1534,0,1,003e9666773e1c8093f9c3d26c0bb986a4b0ba7d02f33837fb4eabaa078422bf,2025-03-25T14:26:28.453000 CVE-2018-15340,0,0,17162c2becccfd45885f64a75c29774847552b75efa60720ad76c4f259a6db6f,2023-11-07T02:53:06.560000 CVE-2018-15341,0,0,6f39ea9e0fe290f9978685bf3feb55b26a8e141015e6fc961a8df8dfafd245fc,2023-11-07T02:53:06.807000 CVE-2018-15342,0,0,9831f3b2aeeba41b7486687778a1d6cda36e94412f3f851fd5e4dd69fd4451e4,2023-11-07T02:53:07.087000 @@ -116943,7 +116943,7 @@ CVE-2018-16566,0,0,54c2b4b9bbd041f1d72747d11c12d75abece5f38ddb5c8520072b2c819659 CVE-2018-16567,0,0,5e29bbe4c73808642a40ecfd04d12ad0695b09bd25987cc032d0f8e52b2f3978,2023-11-07T02:53:50.627000 CVE-2018-16568,0,0,2b1b025de8f7dcc81e686e641e5b68b818674d2b9aaa2870b492575f77f26756,2023-11-07T02:53:50.880000 CVE-2018-16569,0,0,1261c5b97499f9f0f09a2787d79ce0f960bb7cfd0ba81722a9dfb0cc95dcba50,2023-11-07T02:53:51.120000 -CVE-2018-1657,0,0,93aafd9c92d3eedafd893b10378fd9e20dadbebf5a4a4e988ae4ee52c51cd547,2024-11-21T04:00:09.113000 +CVE-2018-1657,0,1,cd6fd4d6eb2bc08f478459ba076d9896c168e92c3c466943f6c75e677c153758,2025-03-25T14:26:28.453000 CVE-2018-16570,0,0,5fad1c4c0ebc0be05e98afb7e3873774af87fb63b19cc1f026a3df7ace44c62d,2023-11-07T02:53:51.360000 CVE-2018-16571,0,0,a247b88560505c64796925ffea015fef788180c7bac24ee6b116a6826d36a6b7,2023-11-07T02:53:51.617000 CVE-2018-16572,0,0,351a06d028bc0e830ea249117bd723034f208e5634b27ea8228ecabeb0867f7d,2023-11-07T02:53:51.857000 @@ -119328,7 +119328,7 @@ CVE-2018-19506,0,0,2ea606b6ee6f1dbc8053fe0cc7b0226d68d863fd81f8408927b724dbff046 CVE-2018-19507,0,0,58d1f024b8736faa5e1d3ad6c6f1cc1e01fe147c32539639bd387869fa082882,2024-11-21T03:58:03.217000 CVE-2018-19508,0,0,7248fb5486c493f6b3f6fd40a623e2ce27aa25a5bf724796082928abab5e2358,2024-11-21T03:58:03.383000 CVE-2018-19509,0,0,c1df1cf41ff9ab15bbb5a75d5287efcb3fd385ed0708055d2c23f3eb4d3ede71,2024-11-21T03:58:03.537000 -CVE-2018-1951,0,0,5aa1866be6cda04b61bb586f26b8536797686e65a03bb9dc6471d4a108c63fef,2024-11-21T04:00:39.260000 +CVE-2018-1951,0,1,031001bb05bb3b856729d479396fb020a10ada0cf8b51ea1894205998f03f5d3,2025-03-25T14:26:28.453000 CVE-2018-19510,0,0,ea283c41ef31ae4648225c926820869a99a1537fe02dbb1bc991f2de50de6e53,2024-11-21T03:58:03.693000 CVE-2018-19511,0,0,fc889511ea95059120273c0c15661fd8abee6cffc83d6ea618e66e74e2eb2db3,2024-11-21T03:58:03.863000 CVE-2018-19512,0,0,f4ed1adcd4b0f911ca5e4fed9e25c27712085e1fb0e2041cc2b5b5cf321d2c37,2024-11-21T03:58:04.027000 @@ -139809,7 +139809,7 @@ CVE-2019-4427,0,0,d188be1265e668214975dd6eecb0654c8c7442a5246a70873b9ba354d695bb CVE-2019-4428,0,0,f16d6bb3aa45cd0a87f55b32142b72c5a0ac550fdea8f900c963939f86e017aa,2024-11-21T04:43:35.830000 CVE-2019-4429,0,0,1a4883b03251353eee3aead26f4c9108a5a89f1bfe93d57887267386e50af06b,2024-11-21T04:43:35.947000 CVE-2019-4430,0,0,cbb3b60cb8f745cb7b23b47f784742b28cd595785be7145a18ef0116f71f8757,2024-11-21T04:43:36.067000 -CVE-2019-4431,0,0,ef5d720f21cded2acf5f46e35eaebcba0d53860c68b75c5982a7ef44b028343d,2024-11-21T04:43:36.180000 +CVE-2019-4431,0,1,9c434c453628e97d2a89bf91c35c6061236b37c9b7c76fc93f1232a7d90bda58,2025-03-25T14:26:28.453000 CVE-2019-4433,0,0,46ed2c2996b6eafca93bb598576aa16e37f6a21e0f1c78a30266b287e724c836,2024-11-21T04:43:36.297000 CVE-2019-4437,0,0,59cff4b41d8571ecc3b50b0266871b5f0148b4a55ee6e49d6dc09fa5a81b634b,2024-11-21T04:43:36.420000 CVE-2019-4439,0,0,6d99f4c5cc00e9f7a5faf6858a330a90be86aa5a1a289d58cf87d309b9519944,2024-11-21T04:43:36.540000 @@ -153828,7 +153828,7 @@ CVE-2020-23373,0,0,ed95f6883c9020ba20f58ea5ed2953056429f5cc89ca616baddbc57021583 CVE-2020-23374,0,0,41c64d027245d5760e9f742909427e53700585c6136d9359480945611a6d8a47,2024-11-21T05:13:48.020000 CVE-2020-23376,0,0,93992f78343dd8910c81b004ae2ad3ae891bccaecf9cf5c8e3b17e8c361bc8c9,2024-11-21T05:13:48.153000 CVE-2020-23426,0,0,f62b0e6a732a94edac59175929696cde44032328f771832d17ebff4ad24c8fb9,2024-11-21T05:13:48.287000 -CVE-2020-23438,0,0,6ed4f1576eadc8ff683b266f8c74b9c369a11bc1519da4aed52c2c0e10833294,2025-03-04T21:15:10.907000 +CVE-2020-23438,0,1,aa525010d704ea512e5f0509b49b62329e355ad2527e864f390a953c57402d4b,2025-03-25T13:02:34.147000 CVE-2020-23446,0,0,88c29f2746008a01e89a0c729df4d9a3bc7511c7606776d5c75fb09952cd46ef,2024-11-21T05:13:48.437000 CVE-2020-23447,0,0,be30263ff308de1c9539ba998de3bb8fac1bd9ca26faf8500d512518f9b6ec41,2024-11-21T05:13:48.580000 CVE-2020-23448,0,0,d45d7e57b1e4d75c3161a8ef8a6ed6a2836024eec5e66035a556c9012745fd01,2024-11-21T05:13:48.720000 @@ -160133,7 +160133,7 @@ CVE-2020-4310,0,0,451cea08daf7053b59c0de9dcbf83bf3321a6a70b10f4333ac1d7e5264e5e4 CVE-2020-4311,0,0,dac29d056aa665c787f726b4c7b112f2de29069ea08f40f86d8570a3131a6460,2024-11-21T05:32:34.253000 CVE-2020-4312,0,0,edced94be9b4727f16f9930e7b1e5edd268dfc962c2578fdcd9cd1bc2e62fc90,2024-11-21T05:32:34.357000 CVE-2020-4315,0,0,4368dca66555ee8b0fae881a1d8f8c1348262f476f39de232465d8bda8aa6aab,2024-11-21T05:32:34.480000 -CVE-2020-4316,0,0,c3cf902ba3a4de414c012f3b1f5895945d63ed0d14d9bcaab7604dcfdcfdc707,2024-11-21T05:32:34.610000 +CVE-2020-4316,0,1,733af47b4bfc41201c06f67100b437ff17f7b109048e4da2cb405a12329183c7,2025-03-25T14:51:52.527000 CVE-2020-4317,0,0,f741ebfd75597dd7559974a3bef6bfb38351dd4b5d4be2e0bf168f7c23bfb8d1,2024-11-21T05:32:34.730000 CVE-2020-4318,0,0,17e4e44c6862fea438ac7003f427d51ffbb2bbef868aa515cc90c24b83149055,2024-11-21T05:32:34.873000 CVE-2020-4319,0,0,ea1e48ebabce28f307d99a267ba77d892f67149dc126c2aaa101760bcec651ed,2024-11-21T05:32:35.023000 @@ -181431,11 +181431,11 @@ CVE-2021-3901,0,0,53fc29d49391bd0fe59fe6e3673a30e7553a65a2d194cdb206763d7afa6454 CVE-2021-39011,0,0,1ae5ffa4620cb5688de282e109120e806d73b0d219e0f59b3ec014744b72ecb5,2024-11-21T06:18:24.523000 CVE-2021-39013,0,0,4f36ca76274d569d8c07d348e39deedc5e2d65b8c5dc175ad4327d6b1650d701,2024-11-21T06:18:24.683000 CVE-2021-39014,0,0,626368f09a1ab3121a560960f569c443f492f88e8799daccacf120f5af63b954,2024-11-21T06:18:24.840000 -CVE-2021-39015,0,0,ecdb735715d86eced8c8172c71e2ef2acf77b83eafc02490fed4c0b1af4c4b72,2024-11-21T06:18:25.010000 -CVE-2021-39016,0,0,5634fdf441ed6f4b6f64f9220e77bb6924f798dee1cf66a76d0213a8b8083be1,2024-11-21T06:18:25.170000 -CVE-2021-39017,0,0,fd836b74c8029e19d1314aaf5667eef5c6b7357a85bac45fdd9da95e5754a4f9,2024-11-21T06:18:25.333000 -CVE-2021-39018,0,0,bfbd4e4ce9803296775b87d3c8dddf1db5a7a87fbc43d109bfc789fee88782d3,2024-11-21T06:18:25.480000 -CVE-2021-39019,0,0,3eb0ecf9033e415701b6f967123a6e3348f7cd4dd3a0288374765dfe9d62d6a5,2024-11-21T06:18:25.630000 +CVE-2021-39015,0,1,728479237fcb03efb4c31e1099ae5d8adadb214caef7637c4c8f24a391c8a9d2,2025-03-25T14:21:02.290000 +CVE-2021-39016,0,1,883a5a057d7c791419e77713ad24fa3c4d552f58a3e2aa4edcd4595bf31cbada,2025-03-25T14:21:02.290000 +CVE-2021-39017,0,1,b2a5c7047878bc39e8710445d1957c9bd00d7835fb7acfff7781fa9e0c54365b,2025-03-25T14:21:02.290000 +CVE-2021-39018,0,1,4b9fc2edc3b0c9464e8d2f62258c4a83f577b984e103723544f9a6a3c5dd8ea6,2025-03-25T14:21:02.290000 +CVE-2021-39019,0,1,6dbe60905033c0f4f857757b079681bb28f9ab7f7d36cb54dfd7a58b178d127f,2025-03-25T14:21:02.290000 CVE-2021-3902,0,0,2abba7e5564870967ac3c79169d977937f2fce222bf42c8a7a9f379809b810dd,2024-11-19T17:12:15.650000 CVE-2021-39020,0,0,5c2f39412976466bc843fb08c207496395b58b2c143c046554dbf18e4db314ad,2024-11-21T06:18:25.773000 CVE-2021-39021,0,0,70ef9c7652ecf07ebafb09337329b8f42c9bd582a4a9e2c40d44f959e1e46591,2024-11-21T06:18:25.923000 @@ -181445,7 +181445,7 @@ CVE-2021-39024,0,0,410b5e124f238a0b753e3f09619a9c36cffc630c0428369859fdb6c1f8ddf CVE-2021-39025,0,0,4cf75da56c51e9a87e54bab698fe68a1f113796efba6944f5f49234a0c4ee0ec,2024-11-21T06:18:26.540000 CVE-2021-39026,0,0,5e515f6f2a96306662d458fa30b3045a3a008f1cc8c9e111deec2a24ed0eb4c3,2024-11-21T06:18:26.697000 CVE-2021-39027,0,0,8fce151b41c38cd429076b3cfc7d24ca166368e54f6a34fc2f18f39e6ef16d27,2024-11-21T06:18:26.840000 -CVE-2021-39028,0,0,b209fd288357717ae68dc02cab33c69153cbb361346955b0b662cf13fb98daa9,2024-11-21T06:18:27.003000 +CVE-2021-39028,0,1,511c6e660783fb28d4aba7d1ecae1669bfc0eecbaae4b90fe10edd712b967b00,2025-03-25T14:21:02.290000 CVE-2021-3903,0,0,bde4f95763ad0038125010d4bd759dd9d4db41c41bb1dcf61b633d9288e05489,2024-11-21T06:22:44.410000 CVE-2021-39031,0,0,83726ebeab1a01190ab55bffd6df0595c44895ac6ee3a2e4e347c172922e55fd,2024-11-21T06:18:27.153000 CVE-2021-39032,0,0,ed45c8e3a9ff1723edddb49b254b63be9b932b2984ab7d814d068d685dcb7ed3,2024-11-21T06:18:27.293000 @@ -189643,6 +189643,7 @@ CVE-2022-1800,0,0,79f9a04aeb21b991bc4e1851082cf7e924d9df5ad8f36652e50d5bda82e452 CVE-2022-1801,0,0,98dd1429122121758ccf12588801da9e97f657407671b2f4ccfb5ccad7b44908,2024-11-21T06:41:30.023000 CVE-2022-1802,0,0,c4aae07cd0077a8e91fb6e92349b1bea94b95e3e4f850367fdb488cb335021c0,2024-11-21T06:41:30.143000 CVE-2022-1803,0,0,d2dcda11ad9a2356446a11fe6d8a22aad22d827cfc301c92759fa953672eeb12,2024-11-21T06:41:30.260000 +CVE-2022-1804,1,1,94b11d41038b7052771826531a77a8c9ce5afb90fd2dbd2f535013e9e11b331b,2025-03-25T13:15:38.703000 CVE-2022-1805,0,0,c08f3d88c6312d5d7d5edb443cb090fda612d67c191d474f020437840b925ece,2024-11-21T06:41:30.410000 CVE-2022-1806,0,0,ec8f6654dbc0b332e94873a5cf7aa9fb05769ca359f9de9af37328f30ddccf9d,2024-11-21T06:41:30.527000 CVE-2022-1807,0,0,05572a7dbaf585e25986742c9ab9a97844c79faee2ef9d4ffce2bef9209f79ec,2024-11-21T06:41:30.647000 @@ -190837,7 +190838,7 @@ CVE-2022-20936,0,0,f7a487922f30fd471c388a216801b568f14e46b0f16dbc74577fecf68d312 CVE-2022-20937,0,0,8f8a8aebeb57fea9346b79e1644cd568e76cfd5c410918c18fa2cba84ea746ab,2024-11-21T06:43:51.660000 CVE-2022-20938,0,0,ef03a9bbf803eb3d9fd2755c8b8926b5a165b2ebd7b8f9386d36b6f192f90bcb,2024-11-26T16:09:02.407000 CVE-2022-20939,0,0,de9648579f4ab9767cda42fb6e7734df88a1407c8fde8fcaa346ce8ae41cfdc7,2024-11-18T17:11:56.587000 -CVE-2022-2094,0,0,832ca67ca47cee3738be094f3e54677eebf824e1f4bc0473a083b03b9b076d89,2024-11-21T07:00:18.543000 +CVE-2022-2094,0,1,c93c9c78e8972b8581c8b6a67419bff3b7b3f45b77972e00e9da503eeffe9c89,2025-03-25T14:15:16.653000 CVE-2022-20940,0,0,bb19c78964be8c87dd56168526adb3dd2b6645202eea073ebfa0c415c187b2f4,2024-11-21T06:43:51.993000 CVE-2022-20941,0,0,df3a9dfefba3a52f14be43d466defe6a6739dbe15715de4aa411e64993160383,2024-11-26T16:09:02.407000 CVE-2022-20942,0,0,f99bbb6cb84d60fc57efb1037310b701e15a7b6fa8418ca8379d26a967298729,2024-11-21T06:43:52.233000 @@ -199035,7 +199036,7 @@ CVE-2022-30560,0,0,49c4b187b4450aa06b860559402aea9987eb64681ef1b93c06e1a9110d106 CVE-2022-30561,0,0,ef96eccaf4e4c867e4aebb90cd96f5bfa94ca6182940f4ce15a3bda129f89523,2024-11-21T07:02:56.363000 CVE-2022-30562,0,0,f38bf3370ab6ef355fdba42d03c7f174ce244eabf411eb36a7d7275350816087,2024-11-21T07:02:56.507000 CVE-2022-30563,0,0,1119e7caec7c42f64813ac09e9f236bee46abf70e14dc3bbbfd13039d1e89fba,2024-11-21T07:02:56.673000 -CVE-2022-30564,0,0,4a4ff180dd38f06286c6be9808eec5d171a8044f3ecc9a85e48303826aef449f,2024-11-21T07:02:56.830000 +CVE-2022-30564,0,1,17049cec7c4f5b765c73545c35191f9a031a556c86f1afc37cbce5f333816378,2025-03-25T14:15:17.410000 CVE-2022-3057,0,0,b5f032b18b593e1a7e82eeff66e07ca60ed8be19201b22de1059dfa36b94d4ad,2024-11-21T07:18:44.010000 CVE-2022-30570,0,0,1583f0b5a8122532d34c6d53a057f1df10c5ae989b9837fec31dda1af2a1ded4,2024-11-21T07:02:57.040000 CVE-2022-30571,0,0,5ecff65519188c2bb25596a23701c5da4d391d73274a66e51f308d57ba6d14d1,2024-11-21T07:02:57.187000 @@ -209288,7 +209289,7 @@ CVE-2022-43546,0,0,bbba8375c1f9a4635007f1ebcbb7f53a475e4d5ba30d105df1bd025a3a1b2 CVE-2022-43548,0,0,ca5c323c94c18d3cef563978c21d20ccc770b219ec6cf5c8ebc379f964e2e19a,2024-11-21T07:26:45.503000 CVE-2022-43549,0,0,fc55cc7c581f7ded8cd473abfacc0e451c191e019b7ba3a2b2fc8ad47c676325,2024-11-21T07:26:45.683000 CVE-2022-4355,0,0,5e7878efc3c3c9ae115655a63c6d19de25d08fb3d22a8c76a6af248bddda465b,2024-11-21T07:35:07.267000 -CVE-2022-43550,0,0,6297366eb5e84fdd8a3ba409a04124b8ab0b4587b7d2d41e7d4123eafd352a5a,2024-11-21T07:26:45.820000 +CVE-2022-43550,0,1,b7a6efdf2a5567122afd99564f523acc27dac16001ded3dc93bed95266f63d1a,2025-03-25T14:15:17.913000 CVE-2022-43551,0,0,7368dd5240fb017304d04bfb087424c1b980c0853a4e539b40d4418ba8f70eb6,2024-11-21T07:26:45.950000 CVE-2022-43552,0,0,cc9e8efdcb8eb07f6bfe2d4ae6d703950385b335cf8cb243f65dc73ec4212b2a,2024-11-21T07:26:46.133000 CVE-2022-43553,0,0,7d3978fbb2946af4883654615b62f2576c2fe3623ef29cfecd44c3e89bc614ed,2024-11-21T07:26:46.373000 @@ -210014,7 +210015,7 @@ CVE-2022-44562,0,0,6f1b098efc05b0eb083c82ed11e3a40e5be0a5640364193869e1a56a7a5c9 CVE-2022-44563,0,0,d967b431a3d0e8a961895b1d81a6dc623f950ed328036531806905ef06aa1060,2024-11-21T07:28:08.190000 CVE-2022-44564,0,0,d273d7aa0d139aa488c81be92af68086a5b7650869f037984088041f1890b1f1,2024-11-21T07:28:08.303000 CVE-2022-44565,0,0,5ffe14ea0d238ca92b3fe1fae66e34547b849fdfda0b7aedc554ba3938673f5f,2024-11-21T07:28:08.407000 -CVE-2022-44566,0,0,0fb25341dc2372e316a3147efc1b92c35445a94d58499784f3d67a07cc5126a6,2024-11-21T07:28:08.547000 +CVE-2022-44566,0,1,2eed8665facadb3d63599dd2d267bfe06940ddffb544e612e23f4af5de14d146,2025-03-25T14:15:18.393000 CVE-2022-44567,0,0,c8510c37be51c9b2c38ded59d71cf764b5c8a711ed39c654189c1934536ae614,2024-11-21T07:28:08.680000 CVE-2022-44569,0,0,a516cdd31aae1bfc7efb4636a5f8a5f9d6461c4721c73c5d51bba3a8ca4bfa02,2024-11-21T07:28:08.797000 CVE-2022-4457,0,0,7f6ebcc0baa1f187f011058abcb5e79baa262e4f4ede3da3fb955a83874efd25,2024-11-21T07:35:18.203000 @@ -210984,7 +210985,7 @@ CVE-2022-45977,0,0,13a152d966630ca3bf8ab27fca264e2f5df75eed7daaa7ea09e9812a7cf2f CVE-2022-45979,0,0,29f1a05bed527d76f6abadef19bd038baeaa5012d5be2703a612315616020fa8,2024-11-21T07:30:02.283000 CVE-2022-4598,0,0,30d850eb20a135185c5b68aafbac5f46e3329159b950dd7a2f19dce2def78ed3,2024-11-21T07:35:34.227000 CVE-2022-45980,0,0,ec0da2daa3e3f554d7b901b4be8d96ed7dd60d46533069fd4cb58fe96e6fe17b,2024-11-21T07:30:02.440000 -CVE-2022-45982,0,0,70aa481ee4b6563497da3040092518bce21db4acbf51ac40e1c83ba492acb4e1,2024-11-21T07:30:02.610000 +CVE-2022-45982,0,1,8f067f2fd5a978242e58303d6111658c393270e3e771d645b2b90239b9ed0c72,2025-03-25T14:15:18.753000 CVE-2022-45988,0,0,2191f8bbbf8d239ddf30397145fdd13d40e62fec70edb8e22034a0f41c071432,2025-03-07T17:15:14.773000 CVE-2022-4599,0,0,b1c692040b7873a7c4127dfde8a6f89c63a5d457054525c409da9357855b74b5,2024-11-21T07:35:34.343000 CVE-2022-45990,0,0,49f36bdcf1672f4737437f303412dd6da7b773fc548eb726d92ff24d951e8986,2024-11-21T07:30:02.960000 @@ -211984,10 +211985,10 @@ CVE-2022-47412,0,0,eb54e970df31ba3d27bf094dbe064a32a355d3efed788ea2f1a567933e0e5 CVE-2022-47413,0,0,524ac94d6a775f4fc7f94ea855fbff2770cebc6b17542fec2641ddaf6b6ec805,2024-11-21T07:31:54.773000 CVE-2022-47414,0,0,c5c1ddf40f0357bfcc1d299fb9a905ee4fddd524e4fb4eed332e1da1b7e2cd10,2024-11-21T07:31:54.890000 CVE-2022-47415,0,0,659edf9aef3743f51dfcf39ed555017e095a2727ed2272f462c367b8fbfe1c57,2024-11-21T07:31:55.010000 -CVE-2022-47416,0,0,dcca8e9e567fa56b0239a86125c0d5f05f913f2cefd4ea87dfc0dba1fb303cf9,2024-11-21T07:31:55.120000 +CVE-2022-47416,0,1,16d38b7e3ccbdd7b9cd781d5fd34868dce464ff363430691ae1f3a2c2efd8790,2025-03-25T14:15:18.947000 CVE-2022-47417,0,0,e9590a1429ae639c60760c119ccf31f0506151f182d3524d07dd374ec44e4d85,2024-11-21T07:31:55.233000 CVE-2022-47418,0,0,ad04b8e236487406d7da7e9b0a6c058a3310dbdf73146e969f8522b17e55151d,2024-11-21T07:31:55.343000 -CVE-2022-47419,0,0,1c65f3f848eae32c7a73342630ae1227d26c3759020a3786e0dace6cb5834211,2024-11-21T07:31:55.463000 +CVE-2022-47419,0,1,652c5827708e3470caff9cd79c56fb438345e5cc638cb74d576f2b36c90b5775,2025-03-25T14:15:19.127000 CVE-2022-4742,0,0,1491043cb6a21788f39417e5b88d538c75aceb9066a01ba5288f56b2d473d043,2024-11-21T07:35:51.240000 CVE-2022-47420,0,0,87a79d3f23264dbb8f5da0ce2a264ca2bc6f43c7abe4f51b64741ba7cdf3baa8,2024-11-21T07:31:55.583000 CVE-2022-47421,0,0,4939cdcf469157aa0973d062f9b6b31d0b57e88fa457735dc3033b5d89b0d6ad,2024-11-21T07:31:55.750000 @@ -212485,7 +212486,7 @@ CVE-2022-48282,0,0,faac8c954d78b5ceb7c5ce11efc8ecb3c4678623d448b6402cf0eab59411b CVE-2022-48283,0,0,182b0c7b39d6bfcfce2462a72a2584378b317a2b7a0366549b6291e2e1e78698,2025-03-11T18:15:27.463000 CVE-2022-48284,0,0,31bd668b37b12ed3d37f65ca7ce4485a4e4c65e02cd0381ee305aa240e1512af,2025-03-11T18:15:27.670000 CVE-2022-48285,0,0,c08e282935699f33b318a1a543fc17db6162a164720fbafa0d53d7a01476fd31,2024-11-21T07:33:05.220000 -CVE-2022-48286,0,0,77447f216a75ff09875f502d3b5b8f406aecac089ebe16a6b1b5f93ee2e96a3d,2024-11-21T07:33:05.470000 +CVE-2022-48286,0,1,74f468fa808cb2d94871b8b3d96ca7be5d295dc926279466f1ba4a47b4c81ba2,2025-03-25T14:15:19.297000 CVE-2022-48287,0,0,2222bb1770a135592d0974bceeae522362202248ea581094629b020436366864,2025-03-24T21:15:14.347000 CVE-2022-48288,0,0,27de884f692db79cd4b97bd8b270cfa6fbc8a53dcd26290b7fdeb8ae040e641d,2025-03-24T21:15:14.543000 CVE-2022-48289,0,0,bb0f78e02471137353aab310719e4b9b86d67b1e487ac181808fba6a29948595,2025-03-24T21:15:14.700000 @@ -212495,11 +212496,11 @@ CVE-2022-48291,0,0,8898f1361b36f884e0d5e61d1f210ce1c6d76bbf224f42fe249a9b0dd9df6 CVE-2022-48292,0,0,3b689e92c64595e9d249ba9ee66690b1412063fde3b2c3a9313c0b2e53ba183e,2025-03-24T21:15:15.007000 CVE-2022-48293,0,0,749388017f1fbe9919eb0eca94488a79682040bfc2066bc4954bbeea8e29e659,2025-03-24T21:15:15.160000 CVE-2022-48294,0,0,d5e1301a1d6dbb34ffa715a179105f45451bb89fa749fc261d6f983f2cd6e7ad,2025-03-24T21:15:15.320000 -CVE-2022-48295,0,0,e3b81f5c9c0e8ef0ed87773df12439f421dee5a9b3f964b4f85a66d8542afc35,2024-11-21T07:33:06.643000 -CVE-2022-48296,0,0,6753d4fa601d46e3a299d27f387264f90747ef3de044b848f8f0f832d2ea1f09,2024-11-21T07:33:06.753000 -CVE-2022-48297,0,0,59373e10c59e8065a644d4cf238f12952e098b948208d2417fb1c9071ec27be5,2024-11-21T07:33:06.863000 -CVE-2022-48298,0,0,2ba316b8d367b321ce37ecc60e4988725151ae54d4cd122010e7daa864caaa66,2024-11-21T07:33:06.973000 -CVE-2022-48299,0,0,72a4da9d8962f63629a025067ed1cb6f65f6e87dfd089b05599041886637a677,2024-11-21T07:33:07.090000 +CVE-2022-48295,0,1,4a1d20412033def7373c4d2eec61344fe35a7f62d99d834265040977913659aa,2025-03-25T14:15:19.470000 +CVE-2022-48296,0,1,79cba2fb66d09045a2ea88212026f00e623a053ecfc050a6b0a1d5a8234bfdfa,2025-03-25T14:15:19.630000 +CVE-2022-48297,0,1,9264d0ef67476c0db4c0ed33c4959ab15a687d74367b7a40f7e763222cd9db87,2025-03-25T14:15:19.790000 +CVE-2022-48298,0,1,6285d6ed2d9a25d0b3d6620d5b915ac8869fa4eee9421002e1ebddc6e0737040,2025-03-25T14:15:19.950000 +CVE-2022-48299,0,1,8c5a0d2b9bf542afdafe8339512f3abbb97ee73fa1f297ab47a4d4dd689df83c,2025-03-25T14:15:20.123000 CVE-2022-4830,0,0,12658cd6b6ffbcd22db77a170be79d07a2c3d3c7035194bc1c81b72021245224,2024-11-21T07:36:01.807000 CVE-2022-48300,0,0,68b27ae46c5a1b653b78748c906ce35b14b41d4024811dd4e426156a847dc039,2025-03-24T21:15:15.473000 CVE-2022-48301,0,0,43413c08af045380c7771c2e1b9b9656942d4cc9df33bd10b6b03d3a4fdc0cfd,2025-03-24T21:15:15.633000 @@ -213497,7 +213498,7 @@ CVE-2022-49288,0,0,35f81ad6278d73cc4f1615f35a7b7f1945bbd8c634a57fcdea9f574090a57 CVE-2022-49289,0,0,0500a720e0e52021b7174ee90f803145babeda7efe950ae97ad3a5272fb1f9e1,2025-02-26T07:01:05.757000 CVE-2022-4929,0,0,44429f972431c9add0abbd71f7b863649b7649f353d704d77271ec361956d7aa,2024-11-21T07:36:16.417000 CVE-2022-49290,0,0,58514a42c251f31b220bf80d9fd071ab2263f87d800418bb2fdb09818309b5ec,2025-02-26T07:01:05.853000 -CVE-2022-49291,0,0,ebd30a9f57341fc454add3783a037c79840564a4918fe7b7d64ec41c524bf2c6,2025-02-27T18:15:25.323000 +CVE-2022-49291,0,1,cd4050a930fa0529befc40f3869b9635a8a0bbfce0d443cc82308b05156cce4f,2025-03-25T14:49:23.147000 CVE-2022-49292,0,0,da31cd76534e44b212e4c35fe66b3a5c707bbfce6f55562f1d81273028ba74ec,2025-02-26T07:01:06.047000 CVE-2022-49293,0,0,c871046027f6fb106bd0ca30ceae4d566888e6a43410eccaa04f8b4c07ec0c8a,2025-02-26T07:01:06.140000 CVE-2022-49294,0,0,fa9a2616e3b5b2c3e9593229c6110d258d8a2758dbd9cc7ee667f63c6b6d7fa9,2025-02-26T07:01:06.237000 @@ -213537,7 +213538,7 @@ CVE-2022-49324,0,0,312f44f8af814f73cb3c8922a516163c8f62302b7efb6be6896e78769f3b6 CVE-2022-49325,0,0,8e4448ade57ef3d4e97c2054783a8008b327325c8e5dda9360ef1442a07ec18b,2025-02-26T07:01:09.323000 CVE-2022-49326,0,0,b0e308a591e3b905d5754d57ef716c14c8cc6c532b6fa9b018e54f4e091ad496,2025-03-13T21:50:26.567000 CVE-2022-49327,0,0,739f1d1d938efe9a1b3671b37dbb8b8882b3448baac6e039fc77ac16cba0ad26,2025-03-13T21:50:54.760000 -CVE-2022-49328,0,0,0b884a9365ff164cfd637f6e7abaaca9211d1f831a96249d4b729886ee7ef4ad,2025-02-27T19:15:43.047000 +CVE-2022-49328,0,1,0e3f0c27efcd523554dc1276b9f339903a7629e5ee613c941a4e5a9311b2c433,2025-03-25T14:50:40.570000 CVE-2022-49329,0,0,2315b4e5597f65e33a8f30d1d33fdf4b6debdf820dbd0a5446f09bb51ce8d343,2025-03-13T21:51:21.200000 CVE-2022-4933,0,0,d122e5bd0202c57480b45e5b80ba8ba9aee30fe0686b6e4b51d4527b501848e9,2024-11-21T07:36:16.890000 CVE-2022-49330,0,0,59ed85d19e597f4fe4f9eac55e31319f3cd9e3a68fd47b2cb1f6ebbef79ef06b,2025-02-26T07:01:09.797000 @@ -213560,7 +213561,7 @@ CVE-2022-49345,0,0,d6a577d50be897ab4cc326d2cedced55a6d0fc9e52a8bad6d8abdd58aacf2 CVE-2022-49346,0,0,88f198e253ee0cb63c00727cc1eca4fbf50a0981e7033514e1dc6f27a78d4d0a,2025-02-26T07:01:11.340000 CVE-2022-49347,0,0,875f447f25fe0b22da262ad577f87160659c778e431e53313746017d81dc0ba5,2025-02-26T07:01:11.433000 CVE-2022-49348,0,0,6c2cb9b9c185d7e6582ef01658d9e891cd3a6d7fa7a7ce81fa9f0fda7b37d7dc,2025-02-26T07:01:11.533000 -CVE-2022-49349,0,0,7356245cc392f31a71ae00206847e8a8422cda887b7d8f94ab3a5783f58460e2,2025-02-27T19:15:43.190000 +CVE-2022-49349,0,1,1aa0d1d0eb3b79e2c845a874dc5fe1db90a2fe64fbb452307be608b1f11cea9e,2025-03-25T14:51:05.100000 CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000 CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000 CVE-2022-49351,0,0,4eeeeeae654c20056896eb2e71d7e4730ecc4073202cdfbf3de859230d859c83,2025-02-26T07:01:11.823000 @@ -213571,11 +213572,11 @@ CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728f CVE-2022-49356,0,0,69a79f3405e3fcc6bbe03cb0dc1ec5148dce71753a0254d1854098f2f95da1aa,2025-02-26T07:01:12.300000 CVE-2022-49357,0,0,4c05a89d1fb039be9907925130b399696bea0bfb8e04a1ad5943d062299034dc,2025-02-26T07:01:12.390000 CVE-2022-49358,0,0,eb2bedc766be807bfe5e1d6137513f8a69c144d5c49d62f43ffcff34ddbd61a8,2025-02-26T07:01:12.487000 -CVE-2022-49359,0,0,0d8334382c1c3bff2efe1945a030f087f109397856ef1244e0c380f0c42736e6,2025-02-27T19:15:43.347000 +CVE-2022-49359,0,1,04430deef42b56e25489bf53e5d3b3ee6d132eb035d8bb0c1c1ef4039fdfd9b6,2025-03-25T14:51:30.127000 CVE-2022-4936,0,0,65f80b05cad36259fef0938d250fce71f92bdab50ccfcffc0c93e77961d09f04,2024-11-21T07:36:17.243000 CVE-2022-49360,0,0,58f3ba0214b9f1a09e065f063c4fa146ef93da07e466a19b24783e6e58458bc1,2025-02-26T07:01:12.677000 CVE-2022-49361,0,0,6de22060ff6180a654b5816dec787b12181feaacec850414380b3679a1d56061,2025-02-26T07:01:12.770000 -CVE-2022-49362,0,0,2cc67e9d3c99766ee48708af702c3b1329f3903828ec9d6717b690c765f83c25,2025-02-27T19:15:43.487000 +CVE-2022-49362,0,1,b1021a8d9aea557c300f83c9e637ecbc137f5a3deb611d0609bb06b40c7f6e26,2025-03-25T14:51:55.130000 CVE-2022-49363,0,0,6e8694933c5611870046e45012eae7390bb9b1b83cdcdd51716ace57dc279e0c,2025-02-26T07:01:12.953000 CVE-2022-49364,0,0,2f69d299a1a99a96a5ca8c2029234e8effb0c54e7032f7150bbcbf55f1987595,2025-02-26T07:01:13.043000 CVE-2022-49365,0,0,ae9e7f1df27dd9fc9e90d460df483cde08179a492f7f8c57ac9c36296597844b,2025-02-26T07:01:13.140000 @@ -213591,7 +213592,7 @@ CVE-2022-49373,0,0,3780b5825b2c9176f6cfa89b6402171904943aef708e2b37dfe5af7da4291 CVE-2022-49374,0,0,83fd5580fe21671cdeaad9ecb908ab41681d8f3e18388382f539095e40ea9f90,2025-02-26T07:01:14.060000 CVE-2022-49375,0,0,d2548a9f7254b6861c8567c1a796b6c7429066a4af2de305fe0e13ed88bead95,2025-02-26T07:01:14.160000 CVE-2022-49376,0,0,0ad74252a5e7fb081b421fe396c463aece1d37b3b75cd50b7080eed00cd2ce03,2025-02-26T07:01:14.260000 -CVE-2022-49377,0,0,2d20654476ca3dc123226883ce090bcb3b63bab01cfb717ba2ef5d7a0503cdb2,2025-02-27T19:15:43.623000 +CVE-2022-49377,0,1,0ed88dc2c619cbd9f18d11bd22b149981299ef188e23199aa4249d54447b5351,2025-03-25T14:58:01.213000 CVE-2022-49378,0,0,1aa04c73a795153edcbb7db52c7df062b7a4f83333b34714dfe5271a1684cdef,2025-02-26T07:01:14.450000 CVE-2022-49379,0,0,1f36875562cd4c8261746a84975fe6f41f22ec67d40acc751f5f2fbb072dc364,2025-02-26T07:01:14.543000 CVE-2022-4938,0,0,2332c28f2266da2838561d3fa8517b8e02799844e68fbf6d1d4046cef0e62add,2024-11-21T07:36:17.473000 @@ -213600,13 +213601,13 @@ CVE-2022-49381,0,0,72b2275412f5e3302b54542ff3ff83acdf6493917c312a5d99fef9710ae33 CVE-2022-49382,0,0,a6a26eecab20f4e36cc52b3d2ca9ffa63cc0e211679b2edf84a4d82d86eb6ed7,2025-02-26T07:01:14.823000 CVE-2022-49383,0,0,9335dc06cf7cc2f7be35120f1a7cd7fd49bad8b59bd4f8fb43c8dc15aebc4d00,2025-02-26T07:01:14.917000 CVE-2022-49384,0,0,4ddea2fb81eb6cb7de6e1baf1d2dd2f42ff61f3b8f06edbc98e503565c0c27ae,2025-02-26T07:01:15.007000 -CVE-2022-49385,0,0,9bdb0fb04c08912d734299e2eff20e94832bc744bcfa69873b66dd598018de10,2025-02-27T18:15:25.503000 +CVE-2022-49385,0,1,b8261720d54d6033da7d4dc736962925ebe246a5a8a53b6f12745b5484843ded,2025-03-25T14:58:25.690000 CVE-2022-49386,0,0,2f0ee3296b202941a8871de54fad7cf75a70ef695b900674c51f259523906474,2025-02-26T07:01:15.233000 CVE-2022-49387,0,0,d7275715539f49a21b5e2f331cbda3931d276a387ec21fec6daa002977db5e19,2025-02-26T07:01:15.343000 -CVE-2022-49388,0,0,556a95b3579f2fd4da4413b5b89bffe4750ead0c095a07eafb7f31e7910208c3,2025-02-27T18:15:25.670000 +CVE-2022-49388,0,1,d9670e809c90b8c707dd4fa28da331d72f4fb327b026d7fca3ea6d19865ab23b,2025-03-25T14:59:13.997000 CVE-2022-49389,0,0,f4ad182411d1e42871b2a12b90a0ae97c6fc8115524b31ec6579a449e92c7be1,2025-02-26T07:01:15.527000 CVE-2022-4939,0,0,0cba4e037d925063e40978b79f96a48c7a5c9c275420fe2dbac9dff13a084ba3,2024-11-21T07:36:17.580000 -CVE-2022-49390,0,0,84cc7e0f7b30604c954d488e38d629cdb8db7dedff6833bc98e94774f9f12c8d,2025-02-27T18:15:25.843000 +CVE-2022-49390,0,1,ea18d7315e22ebc6a3fe1a12f7ebb21ef5baf8856277bb5e7695b6f7f1426956,2025-03-25T13:48:09.850000 CVE-2022-49391,0,0,9b35f53261bb8a2db2c987049b5cd98789e961beccce772f7188d21fdd099795,2025-02-26T07:01:15.713000 CVE-2022-49392,0,0,96e3812f166d3d90d947396f435396226d0c38e19ae7cc6c26dc5d8466a78ee9,2025-02-26T07:01:15.803000 CVE-2022-49393,0,0,e43a79bf37c48f2aca3ee6b39664f16c4b39bb71f77da85e0a93d3333c94dea8,2025-02-26T07:01:15.890000 @@ -213629,7 +213630,7 @@ CVE-2022-49408,0,0,3100cccb646f153314f61edeb7d118780ee54ded81c962ce5a6921ec4d36d CVE-2022-49409,0,0,3a950fbc64da2692edff68767b6c6abac72091f6e85997f1aa6e95042b2d70f9,2025-02-26T07:01:17.420000 CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000 CVE-2022-49410,0,0,d676b62acba28e76fb4d3fe840d95d1ed87208de26d2278f0d0d1aaeb9c8911d,2025-02-26T07:01:17.517000 -CVE-2022-49411,0,0,9a87687b3917e12a5da60325ede95267e6847db22ab27942e0104f4544b3485c,2025-03-05T22:15:34.580000 +CVE-2022-49411,0,1,2b5ce5715259713da2a41ab77c5286503ef5377899a5c8c8887f3d26b2333df2,2025-03-25T13:42:10.430000 CVE-2022-49412,0,0,afccb4edffaf71a111d69ecc331b520c3202dd241aaecb825e5679aa06f4e7e5,2025-03-24T19:52:31.537000 CVE-2022-49413,0,0,b2779eac2a49f8913753d7cd747a23e073f48c0c2dc073ff2425a07a12ae4534,2025-03-24T19:52:50.113000 CVE-2022-49414,0,0,8820062db3ea39821c9aa0ace703558bdb256184ea252d2e82f5d341ac3de12b,2025-02-26T07:01:17.890000 @@ -213940,11 +213941,11 @@ CVE-2022-49692,0,0,81246a5e89053a1584a40609e03ae9d2786cd569683a3035e8e9855de213e CVE-2022-49693,0,0,bd65c6a1df6c13deb687f737009ef0b92bf28a214ae9e96592a338c3f0647943,2025-03-11T21:57:03.753000 CVE-2022-49694,0,0,642efac77118499066501c0a6b93577dca9fdeb6d192ef52bd368d8c503afd76,2025-03-24T19:27:40.550000 CVE-2022-49695,0,0,b07846f61902b93be9f082ef7431214818189b98b3336f4e59518b80fbdb84e4,2025-03-24T19:28:39.110000 -CVE-2022-49696,0,0,13c6acfb389458ab17980bd68e50b3f5c8640aa38cb94a56819f534417c61b51,2025-02-27T19:15:46.720000 +CVE-2022-49696,0,1,47236e19f20989f574307a099753fd3887496d745dd2a9e43f0463c7b38fb4e7,2025-03-25T13:39:35.560000 CVE-2022-49697,0,0,02756b3694e3b3165ce30926ea27f97d84664505b613b5fb909ac8eb93365a44,2025-02-26T07:01:44.450000 CVE-2022-49698,0,0,cb713e4c612b50761168ae4f9fbfbd5ca4b999123ebd34ca35c73c132850ff01,2025-02-26T07:01:44.547000 CVE-2022-49699,0,0,74a12a87ea7cb25d04ff50a75661a290f4304ec748240508585b351759e115be,2025-02-26T07:01:44.640000 -CVE-2022-49700,0,0,efad8d133bf6f2cdbc1c25ab3f0505ebc83dc3e301c3fd1f1301ec08e31ba806,2025-02-27T19:15:46.863000 +CVE-2022-49700,0,1,f81e730f72b4db1b6be9f8f9154a9364e03af24da35b36d6da1e4325321703c6,2025-03-25T13:37:51.227000 CVE-2022-49701,0,0,94a5d266d21f2a774d31b738ec822cc6310eb20a37e912688a09938927f52c2a,2025-02-26T07:01:44.930000 CVE-2022-49702,0,0,b20cc6bb54ac756cd5f43c3acfaa839d28ab5aa608fe98eb3fd51398e23f5806,2025-02-26T07:01:45.827000 CVE-2022-49703,0,0,edce6e623b57c401cd49c90a9d34138d9322f094a971b80009ddb91d0eadad0e,2025-03-11T22:28:03.087000 @@ -214709,7 +214710,7 @@ CVE-2023-0747,0,0,1e248255e2101b039029c30fbbd0d921037cd0ef03b16d6e28114692eff1a9 CVE-2023-0748,0,0,d85dc0876c69bc5a73a6f512c4282d285dfceb3d05d7a924e6efa744c8afb705,2024-11-21T07:37:44.903000 CVE-2023-0749,0,0,df686fe762fec07d3e4b256093948fdda492e130a8746ca91cf993294c7ed74c,2025-02-27T21:15:16.913000 CVE-2023-0750,0,0,bd56c4f48e1993aa266b5767a1ff4a4d3b2b66b50aaa7d205de33085276163a9,2024-11-21T07:37:45.130000 -CVE-2023-0751,0,0,7808d8eda55bad42e3f9eb76359f3a85d3729c89d77692f66f931778728e71ab,2024-11-21T07:37:45.253000 +CVE-2023-0751,0,1,6c94ce1395f130a6a87a7774e9470192cf1cf503864ca54d7093675ed470c820,2025-03-25T14:15:20.480000 CVE-2023-0754,0,0,0e71dcec4c75d0141e4d73ba2b1479b3733b405c117560204e48df93d18bc60b,2024-11-21T07:37:45.373000 CVE-2023-0755,0,0,8f5055b82d2c022b299d2ecbb60dc90a8c190388deeb75461d6022b01f86e451,2024-11-21T07:37:45.493000 CVE-2023-0756,0,0,2efa527a1677d9adc2e811277986b15ef78f1643a8ff7da1dea2472c4b19795d,2024-11-21T07:37:45.617000 @@ -218407,7 +218408,7 @@ CVE-2023-22794,0,0,c3c3ce9c077494c15fee01d809acf8a7024e2fb44baa344cb94b4dc022659 CVE-2023-22795,0,0,5968349cce601ebafc7ddcef4cbbdf2bb1acacc3f7d2c52052f3a49c305082b2,2024-11-21T07:45:26.440000 CVE-2023-22796,0,0,fedbb98a77193b6c6858e3befa5aab42449eb4aef4b5d9df8d455ad055478ebe,2024-11-21T07:45:26.560000 CVE-2023-22797,0,0,0d1453212e295c457b300e8ebef85304bee4077d0b9efa83b7fd635066a4ef49,2025-03-24T20:15:16.253000 -CVE-2023-22798,0,0,313bd7730b2e3c87bdd3a715eb0f2956875ba6612ea903abd1961043c001f59c,2024-11-21T07:45:26.777000 +CVE-2023-22798,0,1,069c1cd3b361c3f0c93b3a278d42748f46f1e4fffe9f379e94305bd32642780e,2025-03-25T14:15:20.660000 CVE-2023-22799,0,0,78fb56f734ebdfebf811f5eaa2ef3843f6efefb2853394b4eb4fe691b53edf6a,2024-11-21T07:45:26.893000 CVE-2023-2280,0,0,abc6f54db09362f6864a5bf620ff2590daf413a99b0fd90a4a9bac1ece2fbe40,2024-11-21T07:58:17.990000 CVE-2023-22803,0,0,06ef874da0f206f3e16dbcae02b1d280a4901ad4b13206e4ac627ab71d28e3a0,2024-11-21T07:45:27.017000 @@ -222725,7 +222726,7 @@ CVE-2023-28203,0,0,591cb96994d240fa00e2971d85f791ad719376bc98a6ae6c4102f306e7c94 CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000 CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000 CVE-2023-28206,0,0,6e5dc3d4a2a2958b6ddb1a15a9f93ff5b3964265ec2bafe35327d70da05b7e31,2025-02-28T14:57:44.363000 -CVE-2023-28207,0,0,34c0843382c7427b3b32961bbad687115f8079933d7c1dac19f0bc60f5b82011,2025-03-24T15:09:20.773000 +CVE-2023-28207,0,1,a1fab6698fff87fca47c3daae39e8114979c9109db482e99c2fcc225fb52310f,2025-03-25T13:15:39.417000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000 @@ -241160,7 +241161,7 @@ CVE-2023-52534,0,0,f37e50d7149e08730fd9fe7b8b8fc06c4115123a747760e53b659858db2ba CVE-2023-52535,0,0,5b5dcc460313aef0f915ae2f03151c386d496381278b48c4b17ddbed983e120e,2024-11-21T08:39:59.317000 CVE-2023-52536,0,0,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000 CVE-2023-52537,0,0,0b81b8faecc5b3b429daa2e35d1d5e9369cdd470ad411fb58783c0e1ca20ec19,2025-03-13T15:46:12.237000 -CVE-2023-52538,0,0,2c529ddcb5c07976f08e68e06bcacbed7be1277277df1ae9ac509847cfc79237,2025-03-13T15:45:54.530000 +CVE-2023-52538,0,1,a86305412726c46ca7dddc1f7d37992782d572456198e8bb110a5d78d4ad3249,2025-03-25T14:15:21.010000 CVE-2023-52539,0,0,6950b611f146aafb1dd69a09ff368c86a7a1b68838becebe6fa1f2a6a1b33357,2025-03-13T15:45:09.077000 CVE-2023-5254,0,0,3d8c29978f6800ebb58594bf362c10ef5c6c2cad50b6606299b48138c0adda36,2024-11-21T08:41:22.973000 CVE-2023-52540,0,0,a090b1c1af9c1dd578ae10371b38d872026dc18aa6353ff056f933a568be5d59,2024-12-09T14:12:49.007000 @@ -244393,6 +244394,7 @@ CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd37 CVE-2024-10033,0,0,0c8427dfa6c4f6cb04a52dc9de842c0eb3ecfae4564e013d1fe25a6ba0ed9e1b,2024-10-30T18:50:04.137000 CVE-2024-10034,0,0,fee5f4d590b4e5beb00e9934c42c6280bba1fc3aff670550fc1233d40ab51d97,2024-11-22T06:15:17.377000 CVE-2024-10035,0,0,d4e78815d20738c85da4173c6b54fef49969b2f0130ee8811a6da865810b94aa,2024-11-08T15:11:25.837000 +CVE-2024-10037,1,1,f1419d6f1b3d6fc010b4e8a589387427fe6b6686fec9b95b55e0f530c8f78a95,2025-03-25T13:15:39.673000 CVE-2024-10038,0,0,ebd3b63d92012ddaf16057a534e828f3dfcac6a3eb398c1c9f9e757273980dc7,2024-11-13T17:01:16.850000 CVE-2024-1004,0,0,7b6f5b47804b16387719a9bf9a5f5e1230f32238a62387586392ff4de375b23b,2024-11-21T08:49:34.290000 CVE-2024-10040,0,0,f83eb1bf0d191e6ff28c64987d9d925532ba47fbade95b4f2582be8beaa243b5,2024-11-01T18:26:23.450000 @@ -244444,7 +244446,7 @@ CVE-2024-10101,0,0,fec1f0c88678ca99198bb58f95f12b144e2edf82230ea1a8688c401204e64 CVE-2024-10102,0,0,14c3070178a8bce600d1f99f94f1a64563a91b8e8cd03146ddf491b3f5c1cddb,2025-01-07T17:15:17.017000 CVE-2024-10103,0,0,e854e5edfcf43e70adfea03c62a4fcbb787ffe431d5323bec06ca7656746d9ef,2024-11-19T21:57:32.967000 CVE-2024-10104,0,0,edcf9a609eefa3129230f441c58905f876237c83c0092e5bc98e317fac05c0fd,2024-11-15T19:35:04.683000 -CVE-2024-10105,0,0,fa535edfa158dea68b3807f38176985652b3f3305678af425182ca4c2790f136,2025-03-25T06:15:36.350000 +CVE-2024-10105,0,1,aaa29c68a314b24db616749193e7ba5a9c5f89bb8ff771fee56aeaaef214e22e,2025-03-25T14:15:21.207000 CVE-2024-10106,0,0,c19f37d23e68d7d6bfbd50fe1e1717e36bff712a011940130142f9c3bf1a02f1,2025-01-09T15:15:12.770000 CVE-2024-10108,0,0,57e3bdf5c93deb8dbbc7ad9bd9f5c8802e9586c3214ce14e9acc02b653026e84,2024-11-01T12:57:03.417000 CVE-2024-10109,0,0,105dbbfeedd295eeb224ef7cad4bd5e4ec0b1f0d8025b11cf8f181f8c439a6af,2025-03-20T10:15:14.737000 @@ -244807,7 +244809,7 @@ CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc5 CVE-2024-1047,0,0,82328ca99057999bf27dbdf41b38090d7c48c70493134f75719db526468bb996,2024-11-21T08:49:40.590000 CVE-2024-10470,0,0,1cb06287bf2d1e2eeabd6c4094bfda5d1a441fd4d9979abeb89d96fdc8185b80,2024-11-12T13:56:24.513000 CVE-2024-10471,0,0,e30bc9ee6fab4d44ac847b6f34a993b4eaa2e99ce0bdaeb0978e8ea3567a10bd,2024-11-26T15:15:31.083000 -CVE-2024-10472,0,0,5a9901d841e9fac4fd542f7db59abbd0ab4e7951224e8c292a1d1fd998c439fd,2025-03-25T06:15:37.750000 +CVE-2024-10472,0,1,5be1f14b4ed112ab136e09c020c038af40cb009bc78ec96a01a6bf8ea843523d,2025-03-25T14:15:21.510000 CVE-2024-10473,0,0,bf3c1f751720194f350ca93367122168de420fe2ef48da8c20175d99c985532f,2024-11-29T16:15:08.390000 CVE-2024-10474,0,0,7ad065f81d3c8110aa13ec82a68760dbf0ebf9b00877e85327bd8db7bb54a207,2025-03-13T20:15:16.680000 CVE-2024-10476,0,0,ccbc6b379994a21d78b8965635d687e54c0adefc0ef53dc4d8c64d7eb42ff1c7,2024-12-17T16:15:23.390000 @@ -244891,19 +244893,19 @@ CVE-2024-10550,0,0,80035bd1b47b12f24fbf39a5cbe44802d77c4e7d951de9c2d71be538cec19 CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000 CVE-2024-10552,0,0,2282677e40d1a39bd559ad7cbac5db69e43cb2c83a30cc89489feee3f26fdac0,2025-01-25T07:15:07.380000 CVE-2024-10553,0,0,bcb1f299f134c4c11b5d267ba4c70351f3ee7bd0b65b687ff780e6fd48f69a57,2025-03-20T10:15:17.513000 -CVE-2024-10554,0,0,58469553537a81643dc405367abdb7c599fa5f40d1c07703a4692f6af9ffa1e0,2025-03-25T06:15:37.847000 +CVE-2024-10554,0,1,c8cf6b3bc1f3cdba64dd6e7b5324783f3c6fef232fa93ee7c28a61536257c4bf,2025-03-25T14:15:21.650000 CVE-2024-10555,0,0,c0c41d706222adae224343df415ec56327197387e8b3f526c30bed44f76590a1,2024-12-20T17:15:07.037000 CVE-2024-10556,0,0,04893ef6555133c7fb4a065ad7ee40a556bb83716f5e6bb1e4354bd00fe9ad00,2024-11-01T20:51:35.617000 CVE-2024-10557,0,0,b747d74cc2db5316ba1b28eca3b4e6b47e90682d5ab526a26512f546950fed33,2024-11-01T20:48:56.980000 CVE-2024-10558,0,0,ad1847fc477a2fe4318758523abf754a4468336577af91283111954adc8d0880,2025-03-24T18:15:18.403000 CVE-2024-10559,0,0,c8d062140f2ef6eed0dfc622284881dacca3b7549dba8d59c8cf3df34e9d5f7f,2024-11-01T20:43:41.070000 CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000 -CVE-2024-10560,0,0,12d7a7f968658fb15ef6799f6cf5a1958885ae226a8969706db8ed4400cdef97,2025-03-25T06:15:37.947000 +CVE-2024-10560,0,1,79d61dcbc0e153ebb1edc7fa4d4548a848cb3b4ecd2d0f327dfe82a3903bd07e,2025-03-25T14:15:21.790000 CVE-2024-10561,0,0,8bc2c05db76aa376d335351430f1359bc8af3088a8d507bfe4a1e2db13ccce63,2024-11-01T20:42:12.303000 CVE-2024-10562,0,0,797cf6d554ba2a4f7d13cc51d352a15019c8c3fe24a53e57cef8fc7c31733023,2025-01-07T17:15:17.290000 CVE-2024-10563,0,0,4e593e37a3aa1652f5216139946bd89b7a3798f9797cb1cde919043c5c7de6a7,2025-02-26T15:15:20.480000 -CVE-2024-10565,0,0,fe9ffef28b8733b6d00b3694cdb761e3d544f0bdac89e500cae43920284c86bc,2025-03-25T06:15:38.053000 -CVE-2024-10566,0,0,5c75679ef7d2a0a80dd677dab461730c3bfbb6270b8befa8fa90ec75e392809e,2025-03-25T06:15:38.147000 +CVE-2024-10565,0,1,01431c6cd3db17af61fa7355fc22ba574d176a0e39f097ef7e6b7957757974e0,2025-03-25T14:15:21.930000 +CVE-2024-10566,0,1,da52fea0f43ed4643a7f899934647669dc2cc0d6458b577c91c2cbc3bcb82331,2025-03-25T14:15:22.070000 CVE-2024-10567,0,0,a04d3f3d999e2b2d50068629e658949590c474642a1d298fb74a13508e02b197,2024-12-04T09:15:04.177000 CVE-2024-10568,0,0,29a6369be6bdec3fac3a49600567225eff324bd19cbe3ade1e99b53075e8cfa9,2024-12-12T16:15:11.250000 CVE-2024-10569,0,0,ba58ab97f664e0a5466237383e79856c396838e4f78a1c850f8c146302ebdb81,2025-03-20T18:15:17.533000 @@ -244977,7 +244979,7 @@ CVE-2024-10630,0,0,2b78ea36784a2215af96a7d4fa9ced32a586fc0d350190c904bf49da64587 CVE-2024-10633,0,0,b64cd913918c140fe334bc0b3014f8ec940be53af9967d66db1f33e12d719dce,2025-01-26T06:15:23.137000 CVE-2024-10636,0,0,51d65a9a72ca10606ebab57795a091094c53b3e14bb9b9ea00131b43cbb9d73d,2025-01-26T06:15:23.293000 CVE-2024-10637,0,0,93d08933ba9c4ceaffb9a190c50c42965d9f07240a31bdb136bdb3d17454c3d0,2024-12-12T19:15:08.570000 -CVE-2024-10638,0,0,ff2e7b6174f25a1391591e0f3b4391f20395fa8562ccf417aa2979bdad02b8fa,2025-03-25T06:15:38.240000 +CVE-2024-10638,0,1,0358c37b34b65b25a99d5ba0cb7e4b982c14acebd7d4eacfa3e1619953fa9442,2025-03-25T14:15:22.227000 CVE-2024-1064,0,0,7b760eef6fec23e7e81fb51d838ef1bddf15caed76d88b6ad1d3e688cbbd4a4b,2024-11-21T08:49:42.843000 CVE-2024-10640,0,0,a398cd6d72329485656ef5fe95883039ee9518985823ed26e6c02ea5501d6402,2024-11-12T13:56:24.513000 CVE-2024-10644,0,0,24b1196d3a89910eef3bf89e7297c4850190ffc7a66fef42f48e110e352ea628,2025-02-11T16:15:38.360000 @@ -245017,7 +245019,7 @@ CVE-2024-10674,0,0,a7313216037c380fb9dfc5e5cbb480327712c6b02180efb4c5d327cb4a9f0 CVE-2024-10675,0,0,a1b72770f2f1c98f4646c50d1ca93c6027b9b9a70a1889383ddd8c1ffee1aaf0,2024-11-21T13:57:24.187000 CVE-2024-10676,0,0,6887bcf7e7ad4dff7b3acb5ccb4703ef99e151f3c3b6329edf86e56346e5bebb,2024-11-12T13:56:24.513000 CVE-2024-10678,0,0,2d4c7c0dbf73a0febb64fcb95cf96aa0969f22be17ad5704c54158d8b7b8b392,2024-12-16T19:15:05.907000 -CVE-2024-10679,0,0,2c3fb452a67d8b58e7ffc79cbfb322b772dc05f87354d4673f3f1b3d817ebdaa,2025-03-25T06:15:38.337000 +CVE-2024-10679,0,1,0d724c92971d5f81ced3b6d799a0dbe80494a10fcb644b4a450ec52ee0678730,2025-03-25T14:15:22.380000 CVE-2024-1068,0,0,19fff8aed0f63e6149ffcd4b412aacdd7ffcb6468d1d60a7391f61d942a540cd,2024-11-21T08:49:43.460000 CVE-2024-10681,0,0,b8f17934b6825994f779df09ece3578475b75ad6fb261f72f1afc8dc3363b0f0,2024-12-06T10:15:04.533000 CVE-2024-10682,0,0,a7e8df655c8e75ce2215a7ec3bf41218b640524758c0db7f945bc19c5ad286f0,2024-11-21T13:57:24.187000 @@ -245043,7 +245045,7 @@ CVE-2024-1070,0,0,d2d5327da37483d9112a2ed5ee1eab39e561b54de7db4ab8ba2ab1685a05f0 CVE-2024-10700,0,0,6e21092c58d5a0189215abc91703ecfd3a56e70a9b35a6e01c66ba8498d622c7,2024-11-05T20:15:39.427000 CVE-2024-10701,0,0,1d0694c0e2d68d88d968175d21922518098202cfa12ae9c9edd4847dbb861160,2024-11-05T16:52:44.937000 CVE-2024-10702,0,0,b5bae28ad49dc3fc514d7656713ba6f4bc898a4f9e05342602a4e18ebf911c80,2024-11-05T16:52:11.193000 -CVE-2024-10703,0,0,d5c6e419c3496fd9ba809a8b42b4893799632de7e269b4121c726f6b67cb5f33,2025-03-25T06:15:38.440000 +CVE-2024-10703,0,1,2bc2053c674a7fe31ed46ee4cbe5844ff04a8d1fddf44350d54f56ff5cb0a22c,2025-03-25T14:15:22.513000 CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000 CVE-2024-10705,0,0,d9ed7dfbd93f39275a245485013f732374d0e600783f5361f2946a662c0533a1,2025-02-04T20:08:12.543000 CVE-2024-10706,0,0,3ec222f321cd144b9747414b2388ca8377b75fdd1ec931604f451b9a1a761bac,2024-12-20T17:15:07.260000 @@ -245212,7 +245214,7 @@ CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f881 CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000 CVE-2024-10863,0,0,fa750afffd0b392605cdbed30d48a9a358d17d11b122f96d8a7cdff9526b9044,2024-11-22T16:15:21.257000 CVE-2024-10866,0,0,13e110d5a19cfea89d073cb1ad5330e517869c323a871281199fd8e329b3e697,2025-01-07T08:15:23.060000 -CVE-2024-10867,0,0,4f96ebb3a8b7ef95ffe084d74b2c1ce585df8bc9ef6a92f8324efa89a76b9f9b,2025-01-31T05:15:09.803000 +CVE-2024-10867,0,1,996a7e0d95aa26d46ebdf5780d0ba8485cf9f378c2a752b5ec04280ae56c253e,2025-03-25T14:35:01.847000 CVE-2024-10868,0,0,596abebd416284f3193ea1ca5b889802ac9c927bb78e6530bbcb8067de4bbeb3,2025-01-23T16:58:10.220000 CVE-2024-10869,0,0,24e83078acb589a8bf17812dbc3140ca72ecc1dc51859fe588758bfcf79e45ac,2024-11-23T04:15:08.073000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 @@ -245606,8 +245608,8 @@ CVE-2024-11268,0,0,65d234ad05896fe7713da8af2e2cfd7055c2e949b8bf81d6b5e68616c5bf2 CVE-2024-1127,0,0,c4640fbf04c4e322d123f44268e28278823feab28cb6d3d042d40587ff1380dc,2025-01-15T18:22:10.127000 CVE-2024-11270,0,0,f913b393ed1680b42f1ef0da4b22b8b795701c7c65dc154e477c74e712bf5f69,2025-01-17T20:56:14.373000 CVE-2024-11271,0,0,6f64f81c0050f88212781d232ab52df3dc26095a2c8e61b8de7b71e76dbe7021,2025-01-17T20:49:14.347000 -CVE-2024-11272,0,0,fc0955030c27d2a43cc56bdecb8450c43f96eabe2a0e21471a173b1796f27f17,2025-03-25T06:15:38.530000 -CVE-2024-11273,0,0,181b81bcb5bbcbf2d70f6d8554fa7019bcd5f0312f3ee9d6f6ce2cb8bf92f140,2025-03-25T06:15:38.627000 +CVE-2024-11272,0,1,ecb4bf9d6fae8fa51a6554825fd97c082042ce0255ea15bf2afefe10ed951656,2025-03-25T14:15:22.660000 +CVE-2024-11273,0,1,7b1267a9732f7ea39105184246e62889a9c2a2b6090711bd51a9a0416c6dc86a,2025-03-25T14:15:22.820000 CVE-2024-11274,0,0,d1342831a6abeef5bb3515b5ff94eee0e3fe5805367e12756f20bd1f3e6994e5,2024-12-12T12:15:22.267000 CVE-2024-11275,0,0,d867fdb3089eb487aba710ee3a783df90afa48402af791b20254c6cf6b05da5e,2024-12-13T09:15:04.887000 CVE-2024-11276,0,0,812b69192092bc16930f9ab3876c16990ac594a09aff786923cf483c78cda3e7,2024-12-06T09:15:05.827000 @@ -245833,9 +245835,10 @@ CVE-2024-11495,0,0,9c4e4a6f33e735c288ef4e55e53a3e0727ff8f6642201545ed0c9f418349e CVE-2024-11496,0,0,43ea7dbd5a3dc8b24d5b87bfdc0e0bfa9c873f8eb1655750b06676344c313b9a,2025-01-07T05:15:13.480000 CVE-2024-11497,0,0,c2e0834380c74196958a755a567b5d6cc870a884fa1525057406ceb5be8e8f1d,2025-01-14T14:15:27.720000 CVE-2024-11498,0,0,84851bb97905888d6f795318663af36c64e8d0d26ed337ad244473b916cdc995,2024-11-25T14:15:06.607000 +CVE-2024-11499,1,1,ce0bc198b92e7c45c58a7e6b918124a7e9694439a1177308e59a54bb39ca7bcc,2025-03-25T13:15:39.890000 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 -CVE-2024-11503,0,0,98d56e0b780ef1d3f9a789415a77aa98047f154463af62f9767b6348537dbf58,2025-03-25T06:15:38.720000 +CVE-2024-11503,0,1,2c08eaad7a69a5b781443f876065ace8e65e0bf59f831785df35012e6aa22955,2025-03-25T14:15:23.033000 CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000 CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000 CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000 @@ -246453,7 +246456,7 @@ CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3 CVE-2024-12106,0,0,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000 CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05 CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000 -CVE-2024-12109,0,0,80061144706cf61e8470a0206af123fd8d5cea333f00a50d92f6d8c356cc568a,2025-03-25T06:15:38.823000 +CVE-2024-12109,0,1,aaca1536067826ee6f1d05fbfaeb394f03b407102c3737112f1be910a4984614,2025-03-25T14:15:23.170000 CVE-2024-1211,0,0,397f0a57816782a149057fa23cdd4cc111bc11210f8241f5a07dde7023689ae7,2025-01-31T00:15:08.863000 CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000 CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000 @@ -246508,6 +246511,7 @@ CVE-2024-12164,0,0,e252f13dd9720dcd4131988acbb14108c9d660bac4dc69fb3a06b127cc0ee CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000 CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000 CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 +CVE-2024-12169,1,1,72adb9e9ca672248ffb6c6a3818668f9c6ac1fefc0054165cf23bb81caf26550,2025-03-25T13:15:40.050000 CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000 CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 CVE-2024-12171,0,0,6256993d9f0f389a5120f8a5fcb51c966cc24463f22b2943402e672b9dead5b0,2025-02-24T17:05:34.500000 @@ -246926,7 +246930,7 @@ CVE-2024-12582,0,0,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3 CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,64396031b0ee032a447d54854bab6f2e56af0964fd90abb7b5a1c0b3a65a4983,2025-03-06T21:08:55.700000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 -CVE-2024-12586,0,0,6b5fea421ab4f9fb9a49e9284be2d6bf7111e5255852562f440c3349fa3e6bb8,2025-02-18T18:15:15.673000 +CVE-2024-12586,0,1,c3319a523f5e3408cab3fdcaca4983788754a30d73dce884eedee1f530d07494,2025-03-25T14:15:23.370000 CVE-2024-12587,0,0,7960172962a4bd5df694844fdf178521cdb4dbd17b76b544453367f416394602,2025-01-13T20:15:27.283000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-12589,0,0,7ad5492ddd024eede39bbb1251c1c8a2b27260dba2d843435f3e7524cc245349,2025-03-12T07:15:34.883000 @@ -247018,7 +247022,7 @@ CVE-2024-12673,0,0,6603575e988b44f3308c1293a43da00655a2ecdf79cc88f6b2c82f7e3e90a CVE-2024-12677,0,0,d1efaa17e781e31ea771349d014054f75f551937a56374dcd16deadd2515de05,2024-12-20T17:15:07.757000 CVE-2024-12678,0,0,28e0a51eba0e228488d0a1909669e7638d8e1e56059290aeac6b07f40c822b06,2024-12-20T02:15:05.500000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 -CVE-2024-12682,0,0,8494194da60e65c98c353c44218f4643597221a4a96adc7c2b1596526730dfcc,2025-03-25T06:15:38.993000 +CVE-2024-12682,0,1,e5511998daf1abd6a39bf27eaf9f791d710bb58f2141c8b5d3e7bee4a6bf152a,2025-03-25T14:15:23.513000 CVE-2024-12686,0,0,bc7085a7cc711dee04afd760430282157b038f1630a1b2d3bd28bf3218575d59,2025-01-14T16:10:03.853000 CVE-2024-12687,0,0,b2e0aff8032206df27d2787862276f9c578719d6e5179dde8f9d7c8502642941,2024-12-16T20:15:09.777000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 @@ -247084,7 +247088,7 @@ CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000 CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000 CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000 -CVE-2024-12769,0,0,1945b62f80dcb98f987892731180d927dc43cbabfbd2f30369a7687212822fa1,2025-03-25T06:15:39.120000 +CVE-2024-12769,0,1,76460970ce03ebf9c2a0d279043d5d529facc631382c1b7585f55dbe964c2438,2025-03-25T14:15:23.663000 CVE-2024-1277,0,0,1a185a3e5546740a0eacb8b77e1cad6738d582479b658b08c14e8d4535b09c19,2025-03-04T12:34:06.490000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12772,0,0,8885759c66ec723e12e6c54e880e5ddbcb692b68d7c1dbb731c21615023a6d40,2025-03-20T15:15:40.773000 @@ -247423,13 +247427,13 @@ CVE-2024-13114,0,0,0294bf3cffe33550cb4e4f68d18089dfac8f013192677ef679fc2a8b508cb CVE-2024-13115,0,0,13b8199069b20efe9868960868ade8b98a30fac2dac411b23e0856355daac94f,2025-02-04T19:15:30.240000 CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43dee6,2025-02-03T15:15:16.290000 CVE-2024-13117,0,0,48c4c1a0deaa83ed5f11e564cf33aba28b1ea8edfb18de9dc2dbe1b856b27247,2025-02-03T15:15:16.440000 -CVE-2024-13118,0,0,ae7b8a38e2e694b18f3ab2c99be3dcb9362b469f7748ff78f2dccff36b47485b,2025-03-25T06:15:39.213000 +CVE-2024-13118,0,1,53e42bbd73a35c2f17dadf7530143a6ab3959627a01827e8ddd850d8621e1de7,2025-03-25T14:15:23.797000 CVE-2024-13119,0,0,73826a06c11021e3ab53b915522c9178a0e342dd2d9e6f744a28454c1427d96c,2025-02-13T15:15:17.360000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 CVE-2024-13120,0,0,bf28b53c2d93a12739a8ec95b1d7d2d5cd7dd1e5003751f3f3cff0db287ff89c,2025-03-22T15:15:36.820000 CVE-2024-13121,0,0,eea054139dc60b1a73e646e7a0792d046eb2c33404d8501622a8bb165162f3ee,2025-02-19T22:15:22.250000 -CVE-2024-13122,0,0,ab811085512dc11b99bbede635ae415acd3f9a246958baf2e4fbe5b3b14b2734,2025-03-25T06:15:39.310000 -CVE-2024-13123,0,0,ed05006dc6f63d943b46622b40d562e56465faf2ddb96d4f239ce1ea96d24623,2025-03-25T06:15:39.410000 +CVE-2024-13122,0,1,66340d1b00d54e5da47e2bcb880e0120b9ed9c40c7c2479041e840750caa79b8,2025-03-25T14:15:23.943000 +CVE-2024-13123,0,1,f695f3ec131aee30d1a05fd5b2c871e881e22cbb5a245a1806aa590af892da05,2025-03-25T14:15:24.083000 CVE-2024-13124,0,0,ea4c2220c7d6318b73b613eda5bdab02d5b315085d9ea970489d43e4a96e2502,2025-03-24T18:15:18.530000 CVE-2024-13125,0,0,bcf9d3da81b0bd561483ac7c7c16f4aea5f6f77159bd25d7d228b3f63d6a7f5c,2025-02-19T22:15:22.390000 CVE-2024-13126,0,0,2954b0c6d56f081558db1c9d9552b1f2529defcf3528faffaea30c48e2a49418,2025-03-17T19:15:21.573000 @@ -247519,7 +247523,7 @@ CVE-2024-13212,0,0,f9886a097d66bdcd8c2d2926c02793bf40e15e2c1503dfbfe7ffed8e8a4ba CVE-2024-13213,0,0,7bb683b6c3f6a9fe11ffaa1b8cfd88dcf276b140239714fc2214812b4502e015,2025-01-09T04:15:12.453000 CVE-2024-13215,0,0,17507f2f85733790cb9f937f15c22b6e61ece58878b7af9bb53a95a8347aa1ca,2025-01-23T17:35:41.723000 CVE-2024-13216,0,0,8e20e17dfd694aa546f801508f99d3bd9309e38995daac8ba087dc79f8652c64,2025-01-31T06:15:28.267000 -CVE-2024-13217,0,0,3a3c24f97597d1c3cf8a1bf0073f588162213b4e5c971ae2852258120a40a580,2025-02-27T12:15:34.857000 +CVE-2024-13217,0,1,e2f1576470a403c4c322eaf84f49407b9b0e9fe8f3b8ac7d9a07e62cb25ef208,2025-03-25T13:29:59.130000 CVE-2024-13218,0,0,736a417e7ed45050eae9deb79d9652565957633e7f9fc080af183435381c7945,2025-03-14T17:15:41.140000 CVE-2024-13219,0,0,a03a53f4e8ee76aae1f68ea77b3d02d84a8b663ce18b5d410a5e09c6d7e9e3fe,2025-01-31T16:15:31.617000 CVE-2024-1322,0,0,6d01a44e4ccc96742bbde907457ae18a669aea26c3c00f3c945d2c4b2b833c47,2025-02-28T03:12:58.057000 @@ -254512,7 +254516,7 @@ CVE-2024-27181,0,0,b3d8f9ae033fe9425e96e2c32b25b9c40ba572e087bbcb02731b032d54736 CVE-2024-27182,0,0,2017951a0f0922b81637c60640e07bff6b09063f0b1392a856dafbccad14ffaa,2024-11-21T09:04:02.687000 CVE-2024-27183,0,0,832fdf79a8def3249a6b9ec26fee3a547084dfed64fd833ff9e403ee0f10d59e,2025-03-17T19:15:21.993000 CVE-2024-27184,0,0,56cfe9bf521c4025fc7306d696dd38c052e35ed39b34be3a4055d8fcad089df4,2024-11-04T21:35:04.690000 -CVE-2024-27185,0,0,723ceb7b514f0bd13d1bc6375c31557473f4e4b614137bc02ec2085478150de9,2025-01-09T20:15:37.793000 +CVE-2024-27185,0,1,ca0e455490f2dc3b991cfbeded1699ac838f572373ba9e6ddcacce05f9f1344f,2025-03-25T14:15:24.320000 CVE-2024-27186,0,0,ae316f60dd5ce68834a87df30f4055f6e057bad53ab873077b981d58b9ac0490,2024-11-21T16:15:23.160000 CVE-2024-27187,0,0,0dc9e51a6ca3f52150fb21e09ca86bd8b992a3d999fcfe948147eedaf1db6f24,2024-08-21T12:30:33.697000 CVE-2024-27188,0,0,653e51cffcf48aae05ef34580c8b5687a22a4f6fa27435eb10884b261903827c,2024-11-21T09:04:03.573000 @@ -254702,7 +254706,7 @@ CVE-2024-27372,0,0,621599e53192201f551db4f70ca35d6c0b853a6c343afe58c1e9470010877 CVE-2024-27373,0,0,ceba21d43e363c6c980b36187034da24b0a1be2387cad08070f9a5fc161450d1,2024-11-21T09:04:27.833000 CVE-2024-27374,0,0,4173112a3ed9b901d6c448a0e14eb221001a984bbe6728eeef584341e04ee426,2024-11-21T09:04:28.457000 CVE-2024-27375,0,0,f0ed3241b866daa7729fdd809f4ba677b4ae6fa7afe1b126ff4be9b1150ad96b,2024-11-21T09:04:28.630000 -CVE-2024-27376,0,0,4933dc44dfb96c4e538596b4e2e9cd536be7813adb068cff5b23389f1bcc3ec8,2024-11-21T09:04:28.803000 +CVE-2024-27376,0,1,01673b2ab8b4f7f5f22e7c6d2323c03b738e578a1e44d1e96153e4e6758d9966,2025-03-25T14:15:24.477000 CVE-2024-27377,0,0,3d2ce6efe62522bb5f433d63f14f5fb65cb6bc72f8fba22cfb2b1a9c8904063c,2024-11-21T09:04:28.990000 CVE-2024-27378,0,0,bfd5270ce48452ed73717e4e4b2a251e12bd9ec85330700b7bfd1796201b72e3,2025-03-13T15:15:41.797000 CVE-2024-27379,0,0,3cd7a3bc568502beed867940be9efaab8a2476bbffd4d9c34135b745bfc52a2b,2024-11-21T09:04:29.327000 @@ -256186,7 +256190,7 @@ CVE-2024-29489,0,0,07f5b3a5e4c9d9dd4bd17cfda9a58f8a163c6a3150e80753fbcf5f8a1d2c0 CVE-2024-2949,0,0,4a1f4abe23dfd4e028a67e00b4ef5ce88073040da2406ee70f9c853e95103e1f,2025-02-27T16:04:06.400000 CVE-2024-29499,0,0,bd4ce64f6211e7fc23490fa7c7f55cdf17a8ef0d6b6835f5123192a44428f6cd,2024-11-21T09:08:05.103000 CVE-2024-2950,0,0,6c732f11d25816f1c75f46d2081caf08b5cb418b13e0a16209425d05325dc7db,2025-02-27T19:49:41.217000 -CVE-2024-29500,0,0,ad46c577f881754394a64146f58971e607b60852c9a92a6949948e14750a53a0,2025-02-21T17:15:11.583000 +CVE-2024-29500,0,1,41a04fd459a9fd95e3c2c5183a871f1c3e1fe37ce5bd3d9ab12e1fd69aa90a2d,2025-03-25T14:15:24.673000 CVE-2024-29502,0,0,8b281ceab8400deda3cbd9fc2a92390088e4502010861b3ce65f71a4a35dd1ba,2025-02-10T23:15:13.337000 CVE-2024-29504,0,0,53fc663b9e6d96ca964c735e36e903d675794b657641161dbc25730d9236f310,2024-11-21T09:08:05.703000 CVE-2024-29506,0,0,33bf7b54456a7e4cb2ab4766502f70f6f853d9cd67666f22c7f233033f9462b7,2024-11-21T09:08:05.937000 @@ -260243,7 +260247,7 @@ CVE-2024-34736,0,0,796d4e22dedbbf6a45bf78b4b61b6b991a6074c75d5a0d88ca4d35b7a87b1 CVE-2024-34737,0,0,593f66ce741ff2e6b0ae794a6711b3f436177aea1f4a0a005ee528acb1b244a1,2024-12-17T18:41:50.840000 CVE-2024-34738,0,0,cf0d6c58eb2d4a8ada03cf1a221c3fa149b66694d246d5dccae107506f39615f,2024-12-17T18:28:08.640000 CVE-2024-34739,0,0,8fb4f12073e54bb2723e3ea345604ea5584e2d381df7e0bcac8b4c358bb3655e,2024-12-17T18:16:32.117000 -CVE-2024-3474,0,0,2b818f058c761f1a92f64dae6b5594af9f18404b97c77606cc8a499521a8b868,2025-03-21T16:31:23.820000 +CVE-2024-3474,0,1,c78afcd997fa147bb973f9fbcf37b2da40c0849cbb273a51f2c3839da72c1563,2025-03-25T14:15:25.040000 CVE-2024-34740,0,0,a5f2c349da4be145680340c70c9823862fd6a3b292d16ad7f4acec7e04082d76,2024-12-17T17:55:29.123000 CVE-2024-34741,0,0,a200ff859f75cbb740f0c4700156237f5570a0c5a7e335eb045f98ab4ecf9930,2024-12-17T17:50:40.650000 CVE-2024-34742,0,0,9fb58a874ed531eae6b8f87bbca2a07dd0fc59db4798ac22215d023539652d17,2024-11-25T18:15:11.980000 @@ -260736,7 +260740,7 @@ CVE-2024-35515,0,0,e3f924f4834b5eb1ebfdf779ac27355de9183c05a6013914f0dcda3fd063b CVE-2024-35517,0,0,c7cdf02c1970c9c2176ddeedd956f713abdccc5615fc0ba85b7883c202e8aed0,2025-03-13T17:15:31.850000 CVE-2024-35518,0,0,b826aac3ee72e2b410a01eb210317baebeddd1ee70d58b26a9ae0083f1308473,2025-03-19T15:15:46.960000 CVE-2024-35519,0,0,d996ed05980655c5e66281da4afe0595370eee243c27f5ea4e81f512d40b8995,2025-03-17T16:15:21.827000 -CVE-2024-3552,0,0,5a891e6b590ead1943d1c08be3fb48a5cfa3c2082a832a9c98395fe2dbc16369,2024-11-21T09:29:51.677000 +CVE-2024-3552,0,1,ae9098b4947eda24d02c7ff0d5d186e8a40e49e5637abb8a8daea664a381ce20,2025-03-25T14:15:25.203000 CVE-2024-35520,0,0,7a7140eb6223b1e15a30b238cf928c4beb91633fbb52e20d4cf0ea71e9a80fa2,2024-10-16T17:14:31.443000 CVE-2024-35522,0,0,6930d234855fb8d5df8877247f1aefb38d626b28ef4e93b23190d5f8f37d693c,2025-03-13T17:15:32.013000 CVE-2024-35526,0,0,de3a832d01072d880b0e7f865e64ed7d95d3fed5f854bbcc2e5b8cb7231ebca2,2024-11-21T09:20:23.833000 @@ -260759,7 +260763,7 @@ CVE-2024-35554,0,0,a1d15cd013ee838bf9a7b676f532739f099be4f4add4d06322737677fed89 CVE-2024-35555,0,0,061be82ca6af357571f6ca2a78c4c2cad966fb4294440c1d63450145978c6e2c,2024-11-21T09:20:26.400000 CVE-2024-35556,0,0,8e886b3b0c0997fb8cd84b67dd9723579be606470e840b8497648081a27f714f,2024-11-21T09:20:26.620000 CVE-2024-35557,0,0,c469785e80af147960006495f555045a818b3a5f4863cf77e434cd6b8d5df7e3,2024-11-21T09:20:26.837000 -CVE-2024-35558,0,0,20f9cd1017fa324bdd1233e972ff084976427d24fe882e5ef4993ee1d5f0c9e4,2024-11-21T09:20:27.063000 +CVE-2024-35558,0,1,1d72ea1927743de8c686a68cc03b62f65dac22c0947bd0e5f10d5cff13f6fa5b,2025-03-25T14:15:24.853000 CVE-2024-35559,0,0,c67240b45c6269d724e78b4a38d4344e157a98e9b16fb2b2b310963c3704c122,2024-11-21T09:20:27.287000 CVE-2024-3556,0,0,9787ca18b88896ee1584412198f4dc04ba2a937adc3d7411830de60cf4601cb2,2024-04-09T22:15:07.470000 CVE-2024-35560,0,0,3def308b7b68ba4164794ceeb5ce4ddbf7e8db03a0a489169b66051d442e1fc8,2024-11-21T09:20:27.523000 @@ -264517,7 +264521,7 @@ CVE-2024-40091,0,0,c7e81cf1029e578a7ac6849154e7e72da9a1cadf7991dc5eaae2f3eb8895c CVE-2024-40094,0,0,9a4220a74ad0b1776bf22dd7bb76fc7ba6de66481703ba851cc70627616c9162,2024-11-21T09:30:56.560000 CVE-2024-40096,0,0,ddfa7ca435136672d3d80814997a8a213710af7ec0743a77fda4cc9742ddfaca,2024-10-28T21:35:13.063000 CVE-2024-4010,0,0,b2655e072ab00a228b71480ea498558720a36f13c57a177b1ae0d28e9c534e3d,2024-11-21T09:42:01.707000 -CVE-2024-40101,0,0,355b9ec657d6f8a1f8cad190fa98964350b973decabb7bfd489247376469dace,2024-11-21T09:30:56.960000 +CVE-2024-40101,0,1,5bdb2e8f2571881865018ae9258456ef3354760d07b9ba22859fe6143cbad809,2025-03-25T14:15:25.373000 CVE-2024-4011,0,0,023a65dd1f5eb72b47a28389dd0798106b90c6451db9a08d936ec1bf45bba714,2024-11-21T09:42:01.843000 CVE-2024-40110,0,0,b8e6266ff01e4f6fccf032090a514bfd36067c1dd2b23a05c2e6f0558c80bcae,2024-11-21T09:30:57.123000 CVE-2024-40111,0,0,80cd14bf03baf8d7fa3686700a06fa7ff2a7a3bff428d9889f26d90e74833388,2024-08-26T17:35:05.733000 @@ -264794,7 +264798,7 @@ CVE-2024-40720,0,0,6c7335f3ec9ac7bd8222bda85c182b464e119f96e99643f60e0931b297272 CVE-2024-40721,0,0,04d3deef80abd54f7f4477d9c0faf0f1f9a7f0600c965082444e01356eca4725,2024-08-09T14:36:58.623000 CVE-2024-40722,0,0,f62d136b4f0e99fd3eab3f64a0b0e04d56bb2206766f5f21c5bf16b123cd6961,2024-08-09T14:39:28.157000 CVE-2024-40723,0,0,30015edc119862caa1cc5493aaab517dc86a1e4e1a5c5b86c7955f175c9f8657,2024-08-09T14:44:01.907000 -CVE-2024-40724,0,0,bcf4e70534cdf1b69707a9763e97281fa1044ac981d02ba04cff562057770fd9,2024-11-21T09:31:29.927000 +CVE-2024-40724,0,1,284a5b0ef2d929a375ef1a284e28a698c5e5b630e8647988cfba9d3f01ca5fac,2025-03-25T14:15:25.580000 CVE-2024-40725,0,0,c96b031fc7c3d7bff0d8f56da13789b39ff273abc22e1b14f1272e588a2bbba1,2025-03-14T18:15:29.340000 CVE-2024-40726,0,0,4843d1bb1994b294cc46b7a194184e6bf9e7ddcb4b5e4c8d788753a0c85403fa,2024-11-21T09:31:30.227000 CVE-2024-40727,0,0,9c063dad326ab28a6f5b0ac90bf2bd85839a9b145e8b846143ff47c04618575b,2024-11-21T09:31:30.453000 @@ -266285,6 +266289,7 @@ CVE-2024-42520,0,0,8efdfa32af414d36b5f0e9904b69a768bde856f36d5b8c9699ca2d90a3457 CVE-2024-42523,0,0,a429cb15d4b9f1d02d6635c52caa08de599d191dd724acfaa766c9a840a40d88,2024-08-23T18:35:03.563000 CVE-2024-4253,0,0,94f4b3b971528e4ade536015da597207aaaf4be67cbabc06ad7ccc58d403869b,2024-11-21T09:42:28.853000 CVE-2024-42531,0,0,dee363810c3f884b9e52bf48805ed945d0e08be218d502bf2e77c2be65ab6dd7,2024-08-29T13:15:06.843000 +CVE-2024-42533,1,1,d93af98bd34790f74ea4ddaa6d7ad61ea26a16ad535012bcf3946a15d04eabbb,2025-03-25T14:15:25.750000 CVE-2024-4254,0,0,cb88358b130f030f77213035150f0a3206c9ad042bb90c677d9a86e794d08ee5,2024-11-21T09:42:28.977000 CVE-2024-42543,0,0,f6637359fb2f6c8a3d2d0d387176758eab2b2701ce44069b95463d9ff2f7d540,2024-08-13T19:35:10.380000 CVE-2024-42545,0,0,d172d8a823bde183c3543978070be96bafd631427b628a6c80305af465923b74,2024-08-13T15:35:16.993000 @@ -267655,7 +267660,7 @@ CVE-2024-44164,0,0,e86a35c7ad8719784b673b9acc97e8ed193d204bc8ddd64044edeafa59794 CVE-2024-44165,0,0,caa8bf62c1972985301ea3656aa469a7620ff2e793499fcfc471e211c6369bdd,2024-09-26T13:53:09.203000 CVE-2024-44166,0,0,2b8e263cc3e0605707daf36ad12f49f82fdadacd3e4ffd7a2d8f65dea7edb08b,2024-09-26T13:47:16.947000 CVE-2024-44167,0,0,297d7afd3b86f6b741cb5649b6cf7845f5ce4bfd81c2bf5af3ae9b55a65f1ae9,2024-12-11T03:08:00.267000 -CVE-2024-44168,0,0,9a050449cb50c4e933f2a00a362683bbb320d68baf32cf737335fcfcb602b4b9,2024-09-26T13:56:00.007000 +CVE-2024-44168,0,1,230c5b2fa46e9d38e79a3cdd6fb5d140fe1f88e1c539782ea4d79c817f360999,2025-03-25T14:15:25.867000 CVE-2024-44169,0,0,8e659cce58d9a53d0497d3730dec7575b8a3d2351d4de051efdd53f958a4ec2f,2024-12-11T03:05:17.060000 CVE-2024-4417,0,0,4e3d6204cd6966eb0d27497c2863f9921840677a5ed28df1c16d852d537c8a4f,2024-11-21T09:42:47.380000 CVE-2024-44170,0,0,4d2a800695872f7abc00b41c3e1d9ae1548d65569627bdeeb9ef0e31c2a1724b,2024-09-30T19:48:51.767000 @@ -267989,7 +267994,7 @@ CVE-2024-4489,0,0,4a6239b5b0aee873857d1503baba553bb76b91f5782dbe433a69a6d5052ad5 CVE-2024-44893,0,0,52016ee271f9a468ab127b7483a02b0060ad410b06f3e4feae0c7bc73e48b640,2024-09-10T20:35:15.200000 CVE-2024-4490,0,0,054509a6c9ec9ae62206574875759d320b58cae59eaf518e949bc43d1c0d9aa1,2024-11-21T09:42:55.980000 CVE-2024-44902,0,0,e85f35417823134dd49df22ef9112c798d5d49353e9fbe9fff57bcd79d25fd46,2024-09-20T14:55:38.087000 -CVE-2024-44903,0,0,8b6d1e9b1a1ddf11fbdb51af707fadc67c0f0db0ae793bc8cb1b9a034e8c469d,2025-03-25T06:15:39.790000 +CVE-2024-44903,0,1,7629586f26e78528e8ff29c6165fa170f96de3163a182de2ef1af024a240b648,2025-03-25T14:15:26.030000 CVE-2024-4491,0,0,44f6ea2b3bdb2c2b126d1862dbc937b1bfc717788d8a3e14a2b3625f881bdcf2,2025-01-27T18:35:34.717000 CVE-2024-44910,0,0,38fbad809f698f01a9df6d19a6055b3a9fb72a271102958d71ec64768cb72bc7,2025-03-19T15:15:50.533000 CVE-2024-44911,0,0,a47f0b0150a6be1a0101ad824f46e66874b22e4c7b06327f4fda077e35518543,2025-03-18T21:15:29.927000 @@ -268633,7 +268638,7 @@ CVE-2024-45647,0,0,99690f8ec38bd0cb79a3ca6e5d0b11de3bd4c9f2564c73834cc738f80a3b4 CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000 CVE-2024-45650,0,0,4e5537e03b2a804010ec65f14134e876717537795080f933ff3b04a2def30a14,2025-01-31T15:15:13.350000 CVE-2024-45652,0,0,6254bd590ce03a9259b82c0dba15561aacbeb1df97e69b146f493975ca4a2427,2025-01-19T03:15:06.647000 -CVE-2024-45653,0,0,d85ef4529fcd9d4a07b146805b70d968bca9ab5b78b469a60f297dc45c5b5b18,2025-01-19T03:15:07.643000 +CVE-2024-45653,0,1,c3b79bdaf8e140f9c5e93d226594bc4972d93f8bf15945c55cb6855dbd3283ff,2025-03-25T14:27:46.903000 CVE-2024-45654,0,0,84e0b6e2caafc48baa1b35c20875028bfa1c53921b9ea64b0881773217e0e97d,2025-01-19T03:15:07.787000 CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000 CVE-2024-45657,0,0,7a5eef9b925442dc8d84e1f516344c5c80c75658a7c519c6cc81634b57ca69fa,2025-02-04T21:15:26.687000 @@ -270520,7 +270525,7 @@ CVE-2024-48292,0,0,7f8838e82390766bc039b0ef3c145c9a3b0d547a1c16ba215a4c6efa9a2b1 CVE-2024-48293,0,0,8a90ee64d8e0a4016d250a132997b503f4e4629ba1cda5993d263cd1dc28000c,2024-11-19T21:57:56.293000 CVE-2024-48294,0,0,b81e296c829bb2fe4de4a0412fb8c7880c02529a65b2eb4833c50f9d6d79d02e,2024-11-19T21:57:56.293000 CVE-2024-48307,0,0,c22be44a58172dc5d3cbbd2ec37d65d406965554da3ca5be5d01278c103946f3,2024-11-01T12:57:03.417000 -CVE-2024-48310,0,0,14c1055166cfe3c88b95dfb444dbeca36935ae1275213d0d3aa88b61d97c9d0f,2025-02-18T19:15:17.370000 +CVE-2024-48310,0,1,8a9828d1eed59c21bd6b4c9391faa9afe915a803a4599d5f035bfa76a293843d,2025-03-25T14:15:26.223000 CVE-2024-48311,0,0,7adcb6c5854b4d19d1b383e2c788236df358780ce416fa6f2145bfd33d1d4bbc,2024-11-01T12:57:03.417000 CVE-2024-48312,0,0,16be675ed6d7db1e9ea949b11ad7528da4ef74c3da828eaa8f911e1d7178e590,2024-11-06T18:17:17.287000 CVE-2024-48322,0,0,453a8d1cb35ea3f4b3a13e3127e90b37ffabae51ef64174d60c5422cdab445d0,2024-11-12T17:35:10.953000 @@ -271440,7 +271445,7 @@ CVE-2024-4972,0,0,43bdd225cdcbd9a9a4620ce805328bc918966049d5b1be691ed85664aa743f CVE-2024-49724,0,0,9ae8f770760a17b31b8d886f65225c34c4b6c821905cd65185b307a9aeaed466,2025-03-24T18:15:19.873000 CVE-2024-4973,0,0,0d4a4429ac22c60db3636e78dd6a1ce25bfdc7c23bbdbae2543d4549b2092bfc,2025-02-18T18:41:10.670000 CVE-2024-49732,0,0,2f3bad62e543cc266b717b07f7933b5c4085852c661fd300036e43f9f554b8fc,2025-03-13T21:15:42.357000 -CVE-2024-49733,0,0,a7cfd89aa6b68cd8e5485019a4fd0f48d39b9467d3009297e3ab752caafcab32,2025-03-14T18:15:30.047000 +CVE-2024-49733,0,1,e5a8d46eab6aabb1887475cde29755042b6c536be80c98f8b2f03e50cde907f7,2025-03-25T14:15:26.410000 CVE-2024-49734,0,0,cdd111b12619071856a1326fe0c6c12674ffb50135f36d1ee6933a11a3efdaaa,2025-03-24T17:15:19.163000 CVE-2024-49735,0,0,4a42f77bff5fa6c7e1580512fe48d52867e4b348b5d3fccd653163c61bd1e201,2025-03-19T21:15:36.973000 CVE-2024-49736,0,0,3b3a2c6cb10e6fae613aa48e82a8e82696a4d36c5f74133ef23f02c09f2b47c8,2025-03-24T16:15:19.087000 @@ -272706,7 +272711,7 @@ CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab019561701 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-51440,0,0,06e59d576ccec69ba7fffa18e55bdd3df09904f0f19824a66a13b2c049fe2fa3,2025-03-22T14:15:15.390000 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 -CVE-2024-51448,0,0,032e94545fead95f23d597ef159fb8acbd50177aa85402ef97c1165cbf90edfb,2025-01-18T15:15:08.183000 +CVE-2024-51448,0,1,9c85e25a3593d795cfaa1a4f8f397f47f499d066a14b358d588bc89b6b4b20a1,2025-03-25T14:06:48.877000 CVE-2024-5145,0,0,52db126efa8d68896c59b5edb3071e21d1f8ed443b2315a75a847fd83c525b2c,2025-02-10T13:57:18.723000 CVE-2024-51450,0,0,b24ea7b4369b0a65d966e21c7dc8a033d60cc44bff8cf30a91a024c498c7fa31,2025-02-06T01:15:09.420000 CVE-2024-51456,0,0,a0d606196dc218b9a4ee506d9b64f6a12a284590a8425558a5f9a7c3dfce10ba,2025-01-12T14:15:06.550000 @@ -275137,7 +275142,7 @@ CVE-2024-54558,0,0,ad8b0add0b02898d04357d1e74d21b1eb82ab896d6607a6544539e7915382 CVE-2024-54559,0,0,5b3db2b5fbbc6fab62e19eafc1c2fe17d400722766836a69c673a57a3ee7c207,2025-03-24T15:06:55.983000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-54560,0,0,9511cfdaacf00672eafd77240d00bd440f12a816c756aa2ba7e9974225003b17,2025-03-14T11:53:55.893000 -CVE-2024-54564,0,0,3260c82653ebdad696654c9260d2ba65935f64f5370e1e4a090f98379ada196c,2025-03-24T15:09:35.767000 +CVE-2024-54564,0,1,d0f6ab9f0754d2ff183b69ad47ba43ec91368bd66893df59b82b775d3378ed56,2025-03-25T13:15:40.190000 CVE-2024-54565,0,0,fa2d60e316a8de2849c6eee2d58b25a2ad9f441f5124f5bca2b6a00110378b5e,2025-03-24T15:05:07.310000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,d8284631bbe00d3a441653f9cf61b30da81f7d76a0692f5c0e63ef8da7f31c5c,2025-03-14T15:15:44.633000 @@ -276583,7 +276588,7 @@ CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c CVE-2024-57510,0,0,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44c17,2025-02-03T19:15:13.310000 CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000 CVE-2024-57514,0,0,dcad93c7b1ee740d3cfee690d5bf9ebaac5164de17811f6d5f3bf41b99f89a33,2025-01-29T16:15:43.533000 -CVE-2024-57519,0,0,5ce2c20dbed8ad0ab76e0535f6238f4836c0899bbc6fa1fb1e387f36626e1dcc,2025-02-18T19:15:22.163000 +CVE-2024-57519,0,1,dd5dbf0669a0d819156807d17c93066b57061c71de87f7447307177e1f4dc8b0,2025-03-25T14:15:26.557000 CVE-2024-5752,0,0,4279b49c1e8f69df93439002f6af091c9949f569d62ed33209701a1ff6b32e44,2025-03-20T10:15:32.733000 CVE-2024-57520,0,0,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff8203b,2025-02-06T16:15:40.833000 CVE-2024-57522,0,0,62cedd71e9c9f7f62ab7d3e3c8e02a30720af0bc647326dc6c3b6825f9619efd,2025-02-03T19:15:13.513000 @@ -276974,36 +276979,36 @@ CVE-2024-58051,0,0,fed77c633cecd438e98abb901c0bd8ac6d5bfb351c004d26c09359ffb04cc CVE-2024-58052,0,0,cfbc8cf32b40994e14c0572837ca66ca3133826b05bdc77897933734a206cd7d,2025-03-13T13:15:45.173000 CVE-2024-58053,0,0,f62d1d2922dcfae3136707d5fa229b629e6521f92cfa56d0948ecd1a29d1217b,2025-03-06T16:15:51.490000 CVE-2024-58054,0,0,abbdc235f1cf55d054d121bec1e4191af1040ea36213c937df0f5408c70aeeb4,2025-03-06T16:15:51.600000 -CVE-2024-58055,0,0,f3f5f3f00e5109f8819722e199512ce4242a4d9641c61f13cdabdd927c4dc560,2025-03-13T13:15:45.307000 +CVE-2024-58055,0,1,5de8edb7a3e23aba23d043a11b1260c5a6af65821b2c90fb55248d4115e45397,2025-03-25T14:34:54.660000 CVE-2024-58056,0,0,cd1a4263564e9dbdf4008e80afc539a4fac1450b195f5322f213d1b8c144bcfd,2025-03-06T16:15:51.837000 CVE-2024-58057,0,0,f3cd9440cd7e995036afcb2d792ed48a0003743d6354deefab7c06328af698e1,2025-03-06T16:15:51.940000 -CVE-2024-58058,0,0,c87754b80a849cd2d4bfa245b72b4bb04a0506753600ea268df935fd45cf9a8e,2025-03-13T13:15:45.433000 -CVE-2024-58059,0,0,7644a357b04756227fefad3cb4199760d38eacfbc27346285af1cd0086b9a8e6,2025-03-06T16:15:52.140000 +CVE-2024-58058,0,1,b6d6ff97819fcea0fa0bcdd43d2be949ca47b6d3c4753b6ae986eebc367daf40,2025-03-25T14:35:24.150000 +CVE-2024-58059,0,1,eebbf3e161285bb667a58ebbe9a52d4b206d81c8de267ca458e3aef403165a18,2025-03-25T14:35:53.557000 CVE-2024-5806,0,0,5ac9637d8c764ba881b38672e3b3265f75ae0c44c191480b6554928fc9eb1283,2025-01-16T16:57:19.660000 CVE-2024-58060,0,0,fba995a2e10d3cb17ff23aaf4c17b6553141574640e54c8a2803f2b7105d8a4f,2025-03-21T15:41:13.050000 CVE-2024-58061,0,0,face010c4f0c4030256d117a47b6f596b05331c64742eb8250d630ba5a731fbe,2025-03-06T16:15:52.390000 -CVE-2024-58062,0,0,10857a35a2e7a65d792236afcd8ef9df58a6c390db0c0123018f5c363ce4b78f,2025-03-06T16:15:52.490000 -CVE-2024-58063,0,0,b773146f43a3632dfdfc0467605c8e3b6a4403315d36e5a73f37129be09b82ab,2025-03-13T13:15:45.553000 -CVE-2024-58064,0,0,cf637524cede4f3acb2d2ec13360d2bc3f7fcd5e189129a737725ab165e41854,2025-03-06T16:15:52.733000 -CVE-2024-58065,0,0,bb30ed81f3dc0f8d92855e8cdb1b897c1bcf3984be5fc466f6679acb97ab687d,2025-03-06T16:15:52.830000 -CVE-2024-58066,0,0,adc44a4218301b0b74a63fc4ce8ba7f44422d6a1ee2600023ec0b9c7850a36a7,2025-03-06T16:15:52.997000 -CVE-2024-58067,0,0,41503ff417ce0e0e3b7534d2e141320c0cf017eab54bcf32294c13e9ebfc8653,2025-03-06T16:15:53.150000 -CVE-2024-58068,0,0,c42da0a89020263bf477e740ca49a27de558736bd376d3e52f8fd182058b5f9f,2025-03-06T16:15:53.257000 -CVE-2024-58069,0,0,c1f911d5f5e4830ce7461087a694afd06bf2cb4fbd7663d43eaf261dac78ca5b,2025-03-13T13:15:45.673000 +CVE-2024-58062,0,1,2c8d0d68b2ebd1ee71a9d49f7226198c3fed9e4d55fb0e3801e5d028b390a53f,2025-03-25T14:36:55.653000 +CVE-2024-58063,0,1,0ac58a3ffc9f8bf5c559a3e869d1e43e862ee25c36b9e03b6e622463db014a56,2025-03-25T14:37:12.963000 +CVE-2024-58064,0,1,15981d97080ad8c42eb08ed8b950783f237d9d784926731eae57134237905e6d,2025-03-25T14:37:32.823000 +CVE-2024-58065,0,1,fcea521e9b1e7505e6caa5177208264a07779a9ef7500c232c9029185f1468e2,2025-03-25T14:37:52.280000 +CVE-2024-58066,0,1,c6e3b768d006a4e502266d5440a1292003cf4ce5373a8e00bedbdf635b7584a3,2025-03-25T14:43:37.903000 +CVE-2024-58067,0,1,539fcaa5844135d8382de5294a58afb3d718ddb2522286dde14d2eb07f695970,2025-03-25T14:44:00.237000 +CVE-2024-58068,0,1,c4222890e8d1bb8a6fd55e01d09dd9d69c7567be1d440d26b5a5d79630a65f7d,2025-03-25T14:47:07.467000 +CVE-2024-58069,0,1,e74d8cad603e1620e828d4b3caac6e0ceb942144c73e5c456889b854714ef962,2025-03-25T14:48:40.760000 CVE-2024-5807,0,0,bcd7f1773756c308216942ed74fe8b63dad936ebebf2c4e22c08a44714f2e7fd,2024-11-21T09:48:22.057000 -CVE-2024-58070,0,0,efed08ac513ff4e47f20a10a1c26be9e030bee653d2c73e347ba88c3faea9a58,2025-03-06T16:15:53.480000 -CVE-2024-58071,0,0,b8c82659fe817a803e8bb291ea31f49c8812fccf4174826a5994a28a358662ad,2025-03-13T13:15:45.800000 +CVE-2024-58070,0,1,9c89d9904014e5d004d59e1f69fe53f6a2ec8e42ab0e66d5da1feebbb233b551,2025-03-25T14:21:57.697000 +CVE-2024-58071,0,1,aab391a33ed2ebaff184b9ec4086049e627ecb3ac5f43dfc6d2aa871d74b66dc,2025-03-25T14:22:11.633000 CVE-2024-58072,0,0,d52e0da3f5c91d03028994ae6c07bb11e0728d624ff7bdc5d9ccc3a65443e2c9,2025-03-13T13:15:45.920000 -CVE-2024-58073,0,0,f60df1b65936d64c079ffc0ebd8c5f398d172b0381aeeab409dbe905be248021,2025-03-06T16:15:53.833000 +CVE-2024-58073,0,1,eb683fa11db3d5ae68d3f6675819692177d4c529e62bda8352837736a5636fac,2025-03-25T14:26:28.240000 CVE-2024-58074,0,0,c2882c9b1642af94a6966e94b4db4f1dbe7d1e9afcf383c98c1b880460b03666,2025-03-06T16:15:53.943000 CVE-2024-58075,0,0,02ccfba812ec5be3736e2c44edd77c2858713f9c995acf80239dbfbabb0b0926,2025-03-06T16:15:54.040000 -CVE-2024-58076,0,0,2e588825566e02a9143a091c74c5bf4847d5aba4027504c9651db8e47b510333,2025-03-13T13:15:46.027000 +CVE-2024-58076,0,1,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a16d3,2025-03-25T14:26:52.030000 CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000 CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000 CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000 CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000 -CVE-2024-58080,0,0,49bf84e245c96570b9e4d3a360c8cadc3426f4da6b36b510bea64216a57c7fac,2025-03-06T17:15:21.473000 -CVE-2024-58081,0,0,9ec224ede68c3ab7b7cb063876b329098ace3b2537fde5db777adcffded98b62,2025-03-06T17:15:21.577000 +CVE-2024-58080,0,1,e3835bb895176f76b9629f1f45e7a50098fa6dc90a8d8933f702379f8bdec271,2025-03-25T14:27:18.737000 +CVE-2024-58081,0,1,d14fd97d756a1cf5956e0eb5be64ade4f19b40adbeb5fcfa6440435351f38eb0,2025-03-25T14:27:38.820000 CVE-2024-58082,0,0,2224c338aeba3c6f1f3d7b825286f63e7ba1be753f0574b81f01302121977acc,2025-03-06T17:15:21.677000 CVE-2024-58083,0,0,7b3a65475a27eb9b56e39775873dfd309b3746bb76685cabb3b9280ee1047291,2025-03-13T13:15:46.247000 CVE-2024-58084,0,0,8f7ad3c12b295803042a16453e625a8a79e3ed22480ce59f3f8f9118c6c2a339,2025-03-24T18:30:09.320000 @@ -277763,7 +277768,7 @@ CVE-2024-6602,0,0,7ca47d757f5d081738e2cf15a2942fbbf556274c8650f8201e44613a3579a3 CVE-2024-6603,0,0,760f3d98fa3bed6f0f0ae96e97442e84b3d0ed982826ef41db0fa65eda62edf0,2024-11-21T09:49:58.333000 CVE-2024-6604,0,0,afbf53f1aeaaa7ae60821ff25607d2ced6ba6b2fe6c55cbc9368caa727b6c7c6,2024-11-21T09:49:58.507000 CVE-2024-6605,0,0,579edbc9f2cb99aca4fe81c61874003b39a1a42565cfe20db942fac2dc4c4bc6,2024-11-21T09:49:58.683000 -CVE-2024-6606,0,0,ee3cbb096921939126befe4d9bfbab1af59ce5fe7b07a3c65e73219de8616eac,2025-01-09T22:15:29.577000 +CVE-2024-6606,0,1,e495989fb0ab422bf2aa6bc8ff2ee692f3a5174db7047840adc9f9a82ca5054d,2025-03-25T14:15:26.730000 CVE-2024-6607,0,0,7343f11f44361cdea77b5c968d0ccbefe8f2154574e33d367f1dc4307e1141f5,2024-11-21T09:49:59.050000 CVE-2024-6608,0,0,570a6556ac494a63e2255c2063b9200463cc3d756475eb0e6b05f26cfff82c87,2024-11-21T09:49:59.243000 CVE-2024-6609,0,0,f5e1d110d389906f3e5d7bfb74f9e22bdc269ad3c1301efc6fb7c885bbd30930,2025-03-13T15:15:50.820000 @@ -280131,7 +280136,7 @@ CVE-2024-9188,0,0,5dd6784f0ddf222dfed6f3f6f8ef1425cb794ae63276e1d1603c62bc0b0fa2 CVE-2024-9189,0,0,4e8c036fffae828e6f3882cbb1531defe39b113820187b885e346d496fe1295e,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a44,2024-11-05T17:06:41.363000 CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000 -CVE-2024-9193,0,0,e9fcabeca8c2a679cb4268e62dc1a9ef8ec799fb5d366ccb5b675730020983a2,2025-02-28T09:15:11.437000 +CVE-2024-9193,0,1,648e5464b98a77503bdfe7442b59562a4d749a3ba417957e44a982011088d3c6,2025-03-25T13:12:04.953000 CVE-2024-9194,0,0,1077144cc77b6254f33936a25ffd1f7bfdaa1a60153ac4b35fb53e4c8f3eb6e6,2024-11-21T17:15:27.480000 CVE-2024-9195,0,0,3896c7688afee0d055d50613ba3961dd431c6131602316aaeead6d2e12edbfa5,2025-03-11T15:49:13.197000 CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000 @@ -280991,7 +280996,7 @@ CVE-2025-0256,0,0,6d2f8ecb854253b9537e5474f340bfbfe8c72c3610ca9a2b4b15a333ada881 CVE-2025-0281,0,0,3eed2c9ac115be61f8948fe5ec86ee9cb61bbdd7dd3b065a4b62fe68aa7cd3a6,2025-03-20T10:15:52.153000 CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 -CVE-2025-0285,0,0,811ec51e3667a82b3d93b44cd859b47458af948668216b73e307b8a49d2c3c4b,2025-03-12T17:15:42.817000 +CVE-2025-0285,0,1,e848488c397ff0ea9e73e793eaf38abf8991ff99017cb12d9b250e0821a9165b,2025-03-25T14:15:27.230000 CVE-2025-0286,0,0,594b92147de822455f36381bb75d435e48d0c5da0ed4b72df873f6dcf52d4767,2025-03-04T16:15:36.167000 CVE-2025-0287,0,0,4dcb5dd88c8e60224b4c9a209ee5974c1a6c00db395b72c96cdce748b13a63dd,2025-03-05T14:15:36.253000 CVE-2025-0288,0,0,b06c8680f4544d9391abca12175a7add36aebf136bc0433be9559a886ca97099,2025-03-12T17:15:45.010000 @@ -281457,7 +281462,7 @@ CVE-2025-0918,0,0,4227989e3d35097382e4bc473e8d6b90f5c37e9be43ac707cd1a7bd79f7110 CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000 CVE-2025-0924,0,0,f098c8869b022dbda442e50477571fe8e89ac3ff2ff9ea7bd16e8bb1ca9eb537,2025-02-17T05:15:09.410000 CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 -CVE-2025-0927,0,0,2d59dece1e629405bb7c7b18cace8de0536c9e0828b7e1ad8db362918de16125,2025-03-23T15:15:12.537000 +CVE-2025-0927,0,1,5de83ba94f1afea049338754ce47e8aaa48b7e824550c8b45db4ea38acbd58c9,2025-03-25T14:15:27.397000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 CVE-2025-0934,0,0,435f4840918befd21a2a5141d511b1a79f3fc5ba70f4b6b5d6a0bdf42935fbde,2025-02-18T18:49:12.210000 @@ -281794,6 +281799,7 @@ CVE-2025-1434,0,0,a3866a08b633baa47e1218d0ddb17df7ba7c9c2875011d0577de1d45619f3f CVE-2025-1435,0,0,3d678d6656d20bd5b96aa1f5dc812b5bfdb1816c9aa05dbe2ea5cdc48474d52d,2025-03-05T09:15:10.267000 CVE-2025-1436,0,0,4fd0b2ae4e724dd49b85592d1f1318f63e647837cea49133222d911b8ad33afb,2025-03-14T17:15:50.623000 CVE-2025-1441,0,0,2d81c29ba90afc9b9a305ea2ed689bb369bca8be1da9da1458054db63323a34f,2025-02-28T19:51:28.980000 +CVE-2025-1445,1,1,6a5f20112b988cc2c3d237b320d17b66c82196c854c54237efd1d40ed57525d2,2025-03-25T13:15:40.347000 CVE-2025-1446,0,0,95901e0cac0119ec391ef035d23ba55e02dd62d2391e09d32f36b0377dc79fe8,2025-03-24T19:15:49.973000 CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000 @@ -281999,7 +282005,7 @@ CVE-2025-1791,0,0,b51ec6e3363933841ca9d89f35b1f043f0875f3be451d26be83ec61e44a029 CVE-2025-1795,0,0,733c5474719ba514128cb1d7a904c28895ad9709317e8c3f67851a90e83a7a8e,2025-02-28T21:15:27.570000 CVE-2025-1796,0,0,b56442463abaa60ded322137d2a828b4bcb342d5b444159eb490456b451e3ff7,2025-03-20T10:15:54.157000 CVE-2025-1797,0,0,21932d476b45bdfb45af7756ea9c313776c862e5d32503d17ac7b8ec47d6a277,2025-03-03T21:15:16.557000 -CVE-2025-1798,0,0,0c78e1d341027be6ccd8d4021d2e0d5679ff564937a01c36439de831d30fb1e4,2025-03-25T06:15:40.480000 +CVE-2025-1798,0,1,8fc1c3a6a44881118e75c1c9a95e7760feca529e426f9143b0553c82ffb8a3fd,2025-03-25T14:15:27.650000 CVE-2025-1799,0,0,ecb0d3b56d4b323c7219f9a8afa0b58675a5a7b2283b2f8ba1e01ad7d5346823,2025-03-03T21:15:16.707000 CVE-2025-1800,0,0,ccd6f4bbccefc45f48ec444e61873d1dbe21c83cff41f19d6933a1cac20729cd,2025-03-05T03:15:09.160000 CVE-2025-1801,0,0,a6bebf279dfd13940c53ee57820f3d2385eb4821c64d6b780ee1162086e6c089,2025-03-03T15:15:16.500000 @@ -282104,10 +282110,10 @@ CVE-2025-1925,0,0,3e8907474d671021f30053a1ffd66ae023a939cac3cf5a1804936aeffd5df0 CVE-2025-1926,0,0,053259318e8c088e0be087d38c64d0aaa1c161500e55de2a4152c1a78cf9cda4,2025-03-10T05:15:35.347000 CVE-2025-1930,0,0,ad50a296ebcdb4d3733b2b7ba83fcfa00c21ac62aa009da1c2f098278db76ea0,2025-03-05T17:15:13.583000 CVE-2025-1931,0,0,63c72fd0c96b4a7d10eb4abcf46116837e21336136fb63c85c4319928f991809,2025-03-05T00:15:36.227000 -CVE-2025-1932,0,0,ed354687f02488a6302327225f0ff5f33c4214a1c58717f0aeffe1183cea3aff,2025-03-12T17:15:48.497000 -CVE-2025-1933,0,0,8183cc66d308aa8b95061cd1ab28f5105e0222e1cef8c28f5628c577d0a150e7,2025-03-12T17:15:48.730000 +CVE-2025-1932,0,1,a0b62f433aa78cb2c386ab0ef966858190c507bd131ae60854c36cc766721847,2025-03-25T14:15:27.787000 +CVE-2025-1933,0,1,b19e57d5f4532b3ba1a97a5303c5110e494334af7b67faa33a9c80bbd914ca32,2025-03-25T14:15:27.927000 CVE-2025-1934,0,0,2c04054caddc1b710bc68bf6aa2b524e421c5cf9c73956841bc26ccdf00de034,2025-03-12T17:15:48.940000 -CVE-2025-1935,0,0,cca64ac223fce38cf509ee3443114d065c5f8645a1ee542dd00a7139432b1583,2025-03-12T17:15:49.147000 +CVE-2025-1935,0,1,c99008e411c894001e3170f96cc853fdabf1a7a770f7d74eedfbe2e4545727c9,2025-03-25T14:15:28.063000 CVE-2025-1936,0,0,90a43b25ca863d4427451a9d5ba23e300477541aead201e38fb04606578e771d,2025-03-05T00:15:36.913000 CVE-2025-1937,0,0,3d4cd1fadbe4eb26bdcd91022f6043cf3d83b522e53bf6f97ae78d35e0b68f16,2025-03-12T22:15:34.743000 CVE-2025-1938,0,0,bb92331e2a34eac4cfd62e355701ce91e26c2aae22a34cf432a769ae3d5a68b9,2025-03-05T00:15:37.097000 @@ -282227,7 +282233,7 @@ CVE-2025-20204,0,0,e2329a8c28cf5009e8a52cfcdda91fee2624e7d144e716f9c9385179bd8eb CVE-2025-20205,0,0,66723e04ee64d8f2ce9c062ef81145ef5093d18d03a4e1c8ebd198732ad0d765,2025-02-05T17:15:26.243000 CVE-2025-20206,0,0,9a82394590b91b4aed7223068e34dd2e6c890c30b29f73231c2aa9f9587d8fd0,2025-03-05T17:15:14.450000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 -CVE-2025-20208,0,1,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000 +CVE-2025-20208,0,0,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000 CVE-2025-20209,0,0,4f4c32814d7dcbfb1c0d5b0b327e7b0d12d1af05e296ec31cb57e819245692dd,2025-03-12T16:15:22.507000 CVE-2025-2021,0,0,b13735d9c542aa65b08a85f72fbfdcdfb1b0532352d4c8d687e904e745828852,2025-03-11T21:15:53.613000 CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 @@ -282275,7 +282281,7 @@ CVE-2025-20626,0,0,b1427ec48095de804e13d264589b43c5c43def702cc0cb9ff2afa9edac7de CVE-2025-2063,0,0,038d4246ae8fa0373a417af84af0377292e57baedd6c7ae2e98ea265bc6bb50b,2025-03-07T04:15:10.060000 CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000 CVE-2025-20631,0,0,d1d5df018e56adee1accdee89d5dff63d796948598a30b9f9cb6091df5fa5695,2025-03-19T15:15:53.607000 -CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000 +CVE-2025-20632,0,1,11c42fd50947418ba3c26376459ce26ccd8e2371e096da1db78c0aa459ef439c,2025-03-25T14:15:28.270000 CVE-2025-20633,0,0,6bb11c096882f0fa2e53be93f073398b5914dda7109516b88148255d86708332,2025-03-18T19:15:47.673000 CVE-2025-20634,0,0,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000 @@ -282382,7 +282388,7 @@ CVE-2025-21084,0,0,af34ba3562290d89d6e1fadbcb1efbf04888823c3570480deec642a909378 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 CVE-2025-21089,0,0,376a98b84b381726ba88c6087957cb55f869f110cd69de435e1dd837da0605d8,2025-03-06T18:07:19.917000 -CVE-2025-2109,1,1,4329e3dd8d62a5086f4a51d8f1eb7573b81675b80ee9fda99a4841dece4cf6e4,2025-03-25T11:15:36.333000 +CVE-2025-2109,0,0,4329e3dd8d62a5086f4a51d8f1eb7573b81675b80ee9fda99a4841dece4cf6e4,2025-03-25T11:15:36.333000 CVE-2025-21091,0,0,c802a7b25882d42a090b27badb1537fcdda8854c4d36451323648d734d1e16cc,2025-02-05T18:15:30.613000 CVE-2025-21092,0,0,03af17d12271d3564885d10071c53bea8826591d692686e1c0d8803603e1f7c8,2025-03-05T00:15:38.080000 CVE-2025-21095,0,0,c386ac503377b743afd9fcbb59e3f9db50d4310fdf761d76706a482de8cda7b5,2025-03-05T16:15:37.487000 @@ -282882,7 +282888,7 @@ CVE-2025-21700,0,0,740af1889eaeb047f839851ae435bc77c5b8e42d1225c06c7e16092297468 CVE-2025-21701,0,0,922178be1846dd3952f6e45178865e773785684f5f7fb9882b9261b28c524245,2025-03-13T13:15:48.443000 CVE-2025-21702,0,0,18461b5ee4666f1ff529fabc4965ea6d5112c59a179690540721d224d63b18a3,2025-03-13T13:15:48.563000 CVE-2025-21703,0,0,5070c09eae6493034270bba27d16eb0e9eebdf573ab14554e4ace7c3c0b6d64a,2025-03-24T17:38:41.197000 -CVE-2025-21704,0,0,f257d81ffae48dd10ca3e3fa6841450befe322de16c23932eff80370af0c280c,2025-03-13T13:15:48.910000 +CVE-2025-21704,0,1,09289447f5db7974090fffc6723797fe1082d6c715e9b090f0b495ba2279b11f,2025-03-25T13:15:40.507000 CVE-2025-21705,0,0,1b24466c4fcbeb3153e4ccbbe0804757b355304b517da4f2d6fa85bf296bedcb,2025-02-27T02:15:14.137000 CVE-2025-21706,0,0,f3378bca6611e287e62df39933cf1d21e33557d4d00ba79e50a89e8e614995d7,2025-02-27T02:15:14.237000 CVE-2025-21707,0,0,b9a0ead8603132ae8c9b4545a9ad4ef804e9617616abc14068f03d0615379a18,2025-03-13T13:15:49.053000 @@ -283016,7 +283022,7 @@ CVE-2025-21829,0,0,c77bfb5fa1275ce2b56fbb0c8ea49b744d7d9a53e4748c63e5668d8629a1c CVE-2025-21830,0,0,e2c402990930790ef40c127d1240f9e826e818fe73b899d794fe8f5a02079b4e,2025-03-13T13:15:56.810000 CVE-2025-21831,0,0,ab8b7c582d0d2cc6d550f1b831c7868722428f34b5e36f2e4acf84faf496a6aa,2025-03-06T17:15:23.060000 CVE-2025-21832,0,0,fed6fe59d97062f5e1252e39934b491eebe4c818fd6c864f0b5c3f5f36ee97ac,2025-03-06T17:15:23.177000 -CVE-2025-21833,0,0,b56bd0e446927915d3ce8431d7e4417dbaa89e7a6e11f727d3de9ac2b97e9230,2025-03-06T17:15:23.293000 +CVE-2025-21833,0,1,f3631d4ba210783895f4aed731c10baa09c0d680eb08a36a1fe7f30a25e2db7a,2025-03-25T14:27:52.403000 CVE-2025-21834,0,0,1e6b8432c77d931987285782658cd742dcc4a49264d50c106a0f0aae4b4e131d,2025-03-06T17:15:23.397000 CVE-2025-21835,0,0,c58c5f929e0655d37f886cc30a77e6d1467e0948ac3e697a7b50ea8931fd8697,2025-03-13T13:15:56.920000 CVE-2025-21836,0,0,34217c969e2aa9bf8f6318c68d0784234386bba3fee162185f6d3ec3873cdddf,2025-03-07T09:15:16.600000 @@ -283127,6 +283133,7 @@ CVE-2025-22224,0,0,8a77aae7700a2228886ae679a0216a335ecf02ecf88fef5838f7708a2afdd CVE-2025-22225,0,0,9e556bc7c3e33618b4b1fd67c232b5ec5342c22fd8db1a86d6c7512033ee8606,2025-03-05T16:21:26.263000 CVE-2025-22226,0,0,d8b6281876fd003f404f7031a16d8be8c66b83496a9c80b329f6cf341e4f4e88,2025-03-05T16:22:52.433000 CVE-2025-22228,0,0,fa7f165a4b7ea7a15cc95ee04c8cc8a48940b5c217d39b7a5efd68469d6e9030,2025-03-20T18:15:18.663000 +CVE-2025-22230,1,1,5fea9de78a9122e06edd2a2c0799d846d33289a0c27ce21e67412c9288187cce,2025-03-25T14:15:28.440000 CVE-2025-2224,0,0,ebc752fe7d5654a487fcfde37364de2b579345e7692fd1d14ff5c231fb13c45b,2025-03-25T06:15:41.327000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 @@ -283706,7 +283713,7 @@ CVE-2025-23198,0,0,cb7a5d11d31eb19b62e17084fecc295bc2441ea045d6d29032f75331dd24a CVE-2025-23199,0,0,d910598ff2a50585be18814fd2f6c32e14186c5df3f3aa91b63de177bf7328a9,2025-01-16T23:15:08.567000 CVE-2025-2320,0,0,54ae946db1d94a75f9dee3622c14a5b8a38a4658dc5f404d7fbaa5736fae5223,2025-03-14T22:15:11.747000 CVE-2025-23200,0,0,fef801f37b31bb40dc547a24ecc4c12516a0819671510edee1a9fe1ff3d2414a,2025-01-16T23:15:08.720000 -CVE-2025-23201,0,0,7265d811e473c20c21cb10ed390a750958c0f65f398af7015d83722d58e94e0f,2025-01-16T23:15:08.880000 +CVE-2025-23201,0,1,4d8c8be7d792ec95ab743052e2d6709ed532d05183a33bd3169c195787cd72a5,2025-03-25T14:57:12.250000 CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83bb0,2025-01-17T21:15:11.713000 CVE-2025-23204,0,0,852563d4629aa8d2f2c033762b9d2f2c48787d0793c09ac0c2cd01bbaa7239d7,2025-03-24T17:15:20.417000 CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000 @@ -284459,7 +284466,7 @@ CVE-2025-24129,0,0,f1e90fe08a69d64c55e11da92a9b3bc28db0dd31ae84f052c11f85bf5bf81 CVE-2025-24130,0,0,384a88a260917bb751e4469f9934ffe6157561048ae6a61b6433fe2d0b4730be,2025-03-18T19:15:48.507000 CVE-2025-24131,0,0,f5265dbc1bdd5800bab16b0ab9c1cc4d098fa33c0562961926c50521af2412fb,2025-02-05T16:15:42.357000 CVE-2025-24134,0,0,fda516d606ad65995b42b7ab165a21b96f17b14a8998f4a9dc5169cf0d4f2ca0,2025-03-13T19:15:51.817000 -CVE-2025-24135,0,0,9868b7d98ec6921f52c4e208e308bf123d82a09ae8df5eca530d3d297ac21164,2025-03-04T14:55:07.030000 +CVE-2025-24135,0,1,400de855e8d59054ada2fe318e85fccb8d1818189e69497bec00e803785b95ce,2025-03-25T14:15:28.597000 CVE-2025-24136,0,0,99cbf9af0701a5c7d99024811eeebb1ea5477be0a4beb1c13eeebd005ca7fe71,2025-02-04T22:15:42.370000 CVE-2025-24137,0,0,2d3d5c7b6a51a869b70700b9af5a54fe93bedd0582213bf757075bc9c9d97f53,2025-03-24T15:02:51.760000 CVE-2025-24138,0,0,b1c888d38c8e1ee0f007d2fe88801baa4a2fe37d1280ee7561b021bc1f31cad5,2025-03-24T17:15:20.690000 @@ -285169,7 +285176,7 @@ CVE-2025-25361,0,0,9f115844287b15ce6dc125807b19b8e446ec3f37878f01ccb8db0422e8bb7 CVE-2025-25362,0,0,c8d9b00ad653f3fefb15ba0fdb75a1597ea822f23192e332e875ad1563a7f537,2025-03-06T15:15:17.277000 CVE-2025-25363,0,0,2ff7284dab4cf6e7dac449878bc4c3befcaefea48f9623fa86a7928dded159ae,2025-03-19T19:15:44.390000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 -CVE-2025-2538,0,0,c65127f0ce17ca65223c16f06479a5b3d27b306ad8780c7524c2831e0e825e05,2025-03-24T20:15:18.580000 +CVE-2025-2538,0,1,f2c0784ab082ec7998020fccbee47813e4a5143320b7cba59c05b6b8071d6104,2025-03-25T14:15:29.270000 CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000 CVE-2025-25382,0,0,9492b1b6b1185f3ade35d8ec9feb68e32bd4db56e46753ca3a20faa7b8d0f3c9,2025-03-20T21:15:23.030000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 @@ -285714,13 +285721,13 @@ CVE-2025-26796,0,0,b75ca789edaf2db40a83c7e39a3f34d24eef54f2ef7ca40bedf7bca90f834 CVE-2025-2680,0,0,5b2d82e1da8d4f5b5849755dc0c1154d4196889828cbec1024ab3bf93e06c00a,2025-03-24T03:15:15.727000 CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 CVE-2025-2681,0,0,78ee3ddf825d238c6f883ba830d0eb70659b8c1893a974fe40f8558dd8fa6674,2025-03-24T17:37:02.203000 -CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000 +CVE-2025-26816,0,1,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 CVE-2025-2682,0,0,47cce8dbd8886c4724e583ef44f66736045d1a063560eba1a04dab7e1c857ed5,2025-03-24T04:15:14.643000 CVE-2025-2683,0,0,a759cb622c186e5ad7f30a0bb59fac5800c590e753e145696b1b93fbab75a2b8,2025-03-24T17:28:23.250000 CVE-2025-2684,0,0,ef7fe32b633d58e8842d7273a41eaa92267e238e2f87fb8a09c71c6bcb6395c6,2025-03-24T17:18:54.283000 CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000 -CVE-2025-26852,0,0,bcd9e710927b567dc35974dca2db0f81a7d52c57667c4798aaca61a45ae98cbf,2025-03-20T21:15:23.400000 +CVE-2025-26852,0,1,2707ef116e0a8759e131a6023189e00959d2ed7f9f20771b9754d1022251ac18,2025-03-25T13:15:40.793000 CVE-2025-26853,0,0,6b301532c9f4b450159f96198c19fbcde47cc6cc13f1c0fca54f5cb5b2c817ef,2025-03-20T21:15:23.550000 CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000 CVE-2025-2686,0,0,a76c164685b9183ddc211fba13468fcb67d255bf9600859ed63ab700bebcf6b6,2025-03-24T06:15:13.127000 @@ -285834,7 +285841,7 @@ CVE-2025-2708,0,0,5b2b76d3feafdc2f6b0b67133d14261e617693a49ddc5202884101725d5002 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 -CVE-2025-2709,0,0,89b945bd25ca8b23ec93891cc2a4948b200753e69e956d8e5f122ceb611b6cda,2025-03-24T20:15:19.133000 +CVE-2025-2709,0,1,ea0e140efac6996f074d99e727a195c925643f5fa5a6a933506912096a0c20a8,2025-03-25T14:15:29.380000 CVE-2025-27090,0,0,d649018651979639a7b1c8acf0eda3f6b93b0e44c8b2420240cdfb846024fd0b,2025-02-27T20:30:33.563000 CVE-2025-27091,0,0,76930f38a3a2f053bdab75441f1f504cf886ff8b7358adb8f0d250a110f1e7f3,2025-02-27T20:28:14.007000 CVE-2025-27092,0,0,9aed7fdfc4c9e1280fc67359d9f3b896d01b5eabc18d15f22f08d950559385bb,2025-02-27T20:28:50.730000 @@ -285843,7 +285850,7 @@ CVE-2025-27096,0,0,b035fc053249cd7e8871d424805bbce3d771ae3f64c764848dba544b57235 CVE-2025-27097,0,0,e199953469681b5e92cc2168d6b4e4da9b471d9694c80dd2a45e6436dbabbaba,2025-02-27T20:27:24.720000 CVE-2025-27098,0,0,873fcb90264f4e04a047cee2cfc6d823db0b6142c91033a12829dbc6dd942122,2025-02-27T20:27:05.270000 CVE-2025-27099,0,0,e0a8674e5982bed778d53380d1b5e133811de7e5fe1cff344a8cdd4483cf2db8,2025-03-03T17:15:15.533000 -CVE-2025-2710,0,0,898208b353aa87a357bdb408d5166ea03cc3d6d99b012ba95b112d805b6c5360,2025-03-24T21:15:18.547000 +CVE-2025-2710,0,1,9554dc77958f04918ea34141c18c28697fc39a166429edff49a76f2b4ca51059,2025-03-25T14:15:29.517000 CVE-2025-27100,0,0,e8e728a94b37df8d941f1021ffd1ce6798ea17728dd5164f5aca39df84532b59,2025-02-21T00:15:09.250000 CVE-2025-27101,0,0,ab8565243e455f0a24cdc3e6e0cd68e02ad81f50ec958a31940a9a3c43faa226,2025-03-12T14:15:16.203000 CVE-2025-27102,0,0,7c19e3d6a91184161366ebf21dd808a88591e7be0083fe1cf331cbb01ccf51f0,2025-03-17T14:15:21.867000 @@ -285854,19 +285861,19 @@ CVE-2025-27106,0,0,26fc58d1f4f645e7be82b82db6f2be52da1c463bb7a3665e75777e66b3edd CVE-2025-27107,0,0,a1a97d9a660e3f24707a3ff578e113d8779dd299f6bc294a67e8cef7c00bec68,2025-03-13T17:15:37.073000 CVE-2025-27108,0,0,087efe502aed999e9ff83fb0385dbc4c8e4004d6f753776fc130d0ed10e72098,2025-02-27T20:26:40.313000 CVE-2025-27109,0,0,10c8f8672c8f3a12b915e1b3ec725c9d1ebfee260a221a5368748fc4851dc756,2025-02-24T17:15:14.850000 -CVE-2025-2711,0,0,32ad6785d735b92d6a73155e750c879937dd3dae3e5defd757e7b13674604a7f,2025-03-24T21:15:18.760000 +CVE-2025-2711,0,1,947c41d075869e2569c9962540cb2ca6832cf66ca69b987bdc2b64b3c686112b,2025-03-25T14:15:29.637000 CVE-2025-27110,0,0,94c21b54338fd64c1140d4cb28fcddebaff47e20a24ceda30c37b569c00a7737,2025-02-28T14:36:15.510000 CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3de1,2025-03-04T16:15:40.487000 CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000 CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000 -CVE-2025-2712,0,0,9d5db40d40336ca4f830cf753315f1555c403cbba39a52d0066a90754d87afc1,2025-03-24T22:15:14.110000 +CVE-2025-2712,0,1,f906df2badd956149289d057cb4f203aa36e95d2e9aacaec3e4f366f20ee9c37,2025-03-25T14:15:29.753000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000 CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216889,2025-03-10T19:15:40.770000 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 CVE-2025-27138,0,0,f93a81e98c7f0619090bb60c8631ae4325675fe349d6a0f2cc3e5a5561612019,2025-03-21T15:22:28.790000 CVE-2025-27139,0,0,b35d01c363d768feea22a1a4baf4d96af8539b18da2c1e17aac951b9b3709d79,2025-02-28T13:55:46.533000 -CVE-2025-2714,0,0,6716fe9a06311c319155fd3e63ba77a0aaef968a5f6e9a91b6982f5ed99cb73b,2025-03-24T22:15:14.283000 +CVE-2025-2714,0,1,68dbbb6966e8e0e5a0689f2ae21578bea0a088db8b132c85a1ae03f3ca9efd45,2025-03-25T14:15:29.873000 CVE-2025-27140,0,0,fc1e0ec308089fd541d5158018c00bc169df7e00ec8cc3330ecb17a15d6f21a7,2025-02-28T16:35:12.980000 CVE-2025-27141,0,0,a447ac927713f36258c6b25c5f083c429dfe0fb04b42a5d1767a162b87028124,2025-02-28T16:24:18.650000 CVE-2025-27142,0,0,1bb5f40990adb8c35f5889afc7c3575d307334e192075d779b188f2171513971,2025-02-28T13:50:54.373000 @@ -285875,7 +285882,7 @@ CVE-2025-27144,0,0,7b7ab9cc6cc8170173ae9d52939463b9ea29a5775bc47236dbba73f17e364 CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75c2c,2025-02-25T14:15:31.567000 CVE-2025-27146,0,0,c51f91ac720f699534057bee0b51fc55efae6c1d6306e8587f645f59e515f2c0,2025-03-04T20:43:22.367000 CVE-2025-27148,0,0,a02be6d0e91bf8eda3626965312087a36b8be8d291da209d00439f9926ccce17,2025-02-25T21:15:18.073000 -CVE-2025-2715,0,0,2bdf42c7b5a27fadbd1267921b05b6d33d2a031056c1861f6b0bdc991b465db9,2025-03-24T23:15:13.440000 +CVE-2025-2715,0,1,9fbab4bf285673c3bd84c5ef820947a80456df9292192a15248cca703d946a4a,2025-03-25T14:15:29.990000 CVE-2025-27150,0,0,84e05225efa8e3530bf3e9b4d6d8cc0590f0913d7edd820f58c7a162101240ec,2025-03-04T17:15:18.663000 CVE-2025-27152,0,0,0648b2f50e1454bf7df312f45bec2e233def1fe7ff128aed2d0f80c1402a5bdd,2025-03-07T20:15:38.560000 CVE-2025-27154,0,0,dacf6cef3721a4218d4e6810dd59da982acbb3d6686247b093e3a212d3c26ee6,2025-02-27T15:15:41.937000 @@ -285884,7 +285891,7 @@ CVE-2025-27156,0,0,33b6d9723415e694fa28b1d8626d7c8b8845f954a5d4bd5c78c2f38f267b7 CVE-2025-27157,0,0,82eb8d36063536d774ee636a24e368a87d8a8dd12b6203e709015057d075f7b0,2025-02-27T17:15:16.867000 CVE-2025-27158,0,0,d1cd1a509e4380ac053575a440fbded03978bb2bd5b3edb2236033d95baf1a19,2025-03-12T14:15:16.323000 CVE-2025-27159,0,0,8217ebe12ea2c3dbd8bab2582584a688ba7b3015368442dcd8cf66336a91bb6c,2025-03-11T18:15:33.687000 -CVE-2025-2716,0,0,9d58171bd2ab1fbc67d6282d69b012423a1b4768f4c959b07137379998f0ecf3,2025-03-24T23:15:13.610000 +CVE-2025-2716,0,1,7c83dd72ee7cbf331fcde74270b770b8b1167a2bd7891d430733d6e0bacae739,2025-03-25T14:15:30.120000 CVE-2025-27160,0,0,e37b68c31776e0f8712479d97b16910fd728f24c1478eb91327855ab6a2f35a4,2025-03-11T18:15:33.840000 CVE-2025-27161,0,0,a60eb19ed2f6b60f78dfbab1422935ea6ece4313f76de265e43e2b0642961508,2025-03-11T18:15:33.993000 CVE-2025-27162,0,0,c8a873ec2f347494d3d41f4d6681990bc645e58bd3c39e33b011e4992144181a,2025-03-11T18:15:34.150000 @@ -285894,7 +285901,7 @@ CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e4 CVE-2025-27167,0,0,482f29e987878fe25988a572ce45a267c50ddf32167f67d5c354d3bbaff05d77,2025-03-11T18:15:34.730000 CVE-2025-27168,0,0,807af9ba36e5529c822db751bf81df9cf34521f5f9d52647f44b26e4df0d5dd0,2025-03-11T18:15:34.893000 CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000 -CVE-2025-2717,0,0,051ebc69239c216c26039064c6a5698f394035d0a7c8a5755e26fdbf6b047a14,2025-03-25T00:15:15.290000 +CVE-2025-2717,0,1,31a34997e7dd571c908b248918b4297238710eb6bc8ec8df3a822b48bebb0d18,2025-03-25T14:15:30.240000 CVE-2025-27170,0,0,b96e4ffaebc56916f484b466d583f7d3b36625d540473ebe18865b2b793f41b3,2025-03-11T18:15:35.227000 CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000 CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000 @@ -285916,7 +285923,7 @@ CVE-2025-27220,0,0,e5fae4b98ca62e096f6d20d7f99647f190b45376624f11e0f6dbd661df523 CVE-2025-27221,0,0,bd575e135810e32dc670f036e8c3abfa23275c9e4b932c5ac7961776f844fa1e,2025-03-05T14:58:05.300000 CVE-2025-2723,0,0,ed753499280c645fa6f1a235aeba7e07f3958889468946e04e659509b275063d,2025-03-25T01:15:11.800000 CVE-2025-2724,0,0,08b38d7f577ee625ae270e836cb51d9f824fabfa0c3299bc7373b4e2003b6876,2025-03-25T02:15:14.143000 -CVE-2025-2725,0,0,3080e55e60e384bdb113db7c2dd0a2156d635983015b28f3dedc99f65aa13291,2025-03-25T03:15:16.097000 +CVE-2025-2725,0,1,9ea485b2936b184f24cafa4a0ff806c0f1a640968c9cc24d863203f28f3620c0,2025-03-25T14:15:30.710000 CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000 CVE-2025-27254,0,0,1326449cb688d3d742c54aa7c26671bc1a30e863cdbd3bd942083e3395c678b9,2025-03-12T12:15:14.767000 CVE-2025-27255,0,0,e778f08cf23683afc5d4a9e46aba9493b6f8173a4bc86a191d0135a1893c7fc7,2025-03-12T12:15:14.907000 @@ -285957,14 +285964,14 @@ CVE-2025-27304,0,0,9d2160199dafe840e771986f204c061835c7ed7add0f4ae4cf8c99555b7a3 CVE-2025-27305,0,0,bf074d91fed5e21564acaf77c0028ab2d84637020401d70d2a04e7068101daf4,2025-02-24T15:15:16.387000 CVE-2025-27306,0,0,80702ad22c275e37a0cbac8c8257049e2cc59528c7889d8099c083916777eab3,2025-02-24T15:15:16.523000 CVE-2025-27307,0,0,51f2191ce96fb79adb3f67c48699c360eaca5adb32f81b1526864b04b25e65bf,2025-02-24T15:15:16.653000 -CVE-2025-2731,0,0,d32cd005a2b1c3bbb67173911d609870a03f4f146f263dc7f24f41bf1319e6e0,2025-03-25T04:15:18.943000 +CVE-2025-2731,0,1,7dbd6edb6683ab1267796a2625cb5690ee0f6e15abc3d563d045f81479ed2b7c,2025-03-25T14:15:31.170000 CVE-2025-27311,0,0,887daf3ca5e659c3544c21201f804fbc1bf8b2cd8c00da7ecaf2899ee756ead7,2025-02-24T15:15:16.783000 CVE-2025-27312,0,0,b581bf2145bb64186de8cfc506dddf34a2209eb697269956dc9c4e9722d7a127,2025-02-24T15:15:16.917000 CVE-2025-27315,0,0,6e14eabdb3c0e89a0edb103c9452c91b7720a99d50fe2048c64c3b2ac69e2725,2025-02-24T15:15:17.047000 CVE-2025-27316,0,0,78a664ed18e2a3f09c84cff8eafbb3e667c271b347b6c49cb4057c71b6fb2f84,2025-02-24T15:15:17.193000 CVE-2025-27317,0,0,6890f6ed99867285ecccef44abce2bb31cd702302b365d74843fb1b631d8a7e0,2025-02-24T15:15:17.353000 CVE-2025-27318,0,0,01062c1cc7b69a94a4b00c3bba687232094c6f37680977c56572c43c965cbcbe,2025-02-24T15:15:17.487000 -CVE-2025-2732,0,0,ed61792835eebe9a24df73a503895eec433e0254ad1b571cacbd11f683b7e63a,2025-03-25T04:15:20.793000 +CVE-2025-2732,0,1,94845e51a0e281b29a17f36be811b5019c5f78bca15772362d7452943f85e2f7,2025-03-25T14:15:31.303000 CVE-2025-27320,0,0,8ddde046a5073fb57db51ac32c278ea72fd103a7b6698e137a1a5af8558b1579,2025-02-24T15:15:17.620000 CVE-2025-27321,0,0,57e789f06d16f73e5a359b61adef9f6f0ec207245e4ca47b20a61f61292b4b5b,2025-02-24T15:15:17.753000 CVE-2025-27323,0,0,6b3c8bfca9a52e8e86879d19ce880fdf9f7a54b902cbc68d3d2a6df3d91b39a9,2025-02-24T15:15:17.887000 @@ -286010,7 +286017,7 @@ CVE-2025-27396,0,0,eadc58c9c625c288d8817b5497a9be2ced63972085e268f74b6cfbad20e39 CVE-2025-27397,0,0,956a25b040033d89cdbeac3073d670e6783aa568f3a9850c3446f06c3a9a7f0e,2025-03-11T10:15:19.083000 CVE-2025-27398,0,0,4873fb1d9330833240d0c3956ffddabe528327a366ea9eaa669a80b91d791657,2025-03-11T10:15:19.247000 CVE-2025-27399,0,0,78ad55c708db0eacfc60a4739f25b01ac5122592f5e6277695a1cd74fcb32c63,2025-02-27T18:15:30.380000 -CVE-2025-2740,0,0,a65d825df0f856d453b396956fc58926fb8411794a6ec56f0fc9fa779fdacd94,2025-03-25T07:15:38.493000 +CVE-2025-2740,0,1,49ef49ebacc203e1fee6be5534250dd09ae34e45de1ee5d8bd74acbeda1d5d15,2025-03-25T14:15:31.640000 CVE-2025-27400,0,0,3420eb7304b08f9fb1c25aec87192bc56067f699b82d2cfeb510bc8097e34509,2025-02-28T16:15:40.237000 CVE-2025-27401,0,0,f4a40e6f24af923d22cbd4869ba6e62f802add03358279293f26a3440d2f2d83,2025-03-04T17:15:19.547000 CVE-2025-27402,0,0,ef47d48bfaf1f7969fb8808de0077363418ad8a4d4aaaf238d494e9d3e9d6ba8,2025-03-04T17:15:19.703000 @@ -286027,7 +286034,7 @@ CVE-2025-27416,0,0,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193d CVE-2025-27417,0,0,cdcf8fc02cc79b9a0b20b04560621cd31c16ef1455c76722ca7ab3938e8044e5,2025-03-04T17:15:19.857000 CVE-2025-27418,0,0,41f3eb54bc8960a9271d089bac74e54194694ac4af5959c0bca02edfdd330c78,2025-03-04T17:15:19.967000 CVE-2025-27419,0,0,d7b7cf11d35eeb3fa0afbc8e178d471065b3eebc40c5e5d6f63fef0c0db9e934,2025-03-07T20:42:56.750000 -CVE-2025-2742,0,0,284fcfd66c80d738a6875f6d02882f2ae3048813b142771792d58d289cd290c3,2025-03-25T07:15:38.700000 +CVE-2025-2742,0,1,5ff8fb7119ac54d198fd35a7ffe6b4a00c0df2283d231c02f4017eeda8baea08,2025-03-25T14:15:31.770000 CVE-2025-27420,0,0,b3c5167d23216466badc66bb683feb7a3d63f11b0877f522ded65752258de9d9,2025-03-04T17:15:20.137000 CVE-2025-27421,0,0,d05fea08a71a3936a2f096f07356bdc55c206f7da4ad4a6502a071cb1952b476,2025-03-03T17:15:15.630000 CVE-2025-27422,0,0,cce8795dfe16ac096ec644088df76a3fc7ab0f6058c93abaa8f18c6deb644b95,2025-03-03T17:15:15.787000 @@ -286035,7 +286042,7 @@ CVE-2025-27423,0,0,76136ac7a97f6b3b77c306faa15fa09b7bae261cd8dfd81b49033906f60d3 CVE-2025-27424,0,0,5e5449f71c6f33c3acb1ec312a6d712650821e7af73edb97a00595ed47249653,2025-03-04T16:15:40.647000 CVE-2025-27425,0,0,eefa8de598cb14b10db9fda893507ccbe08d3f46d7345c6568f153f085ae9419,2025-03-04T16:15:40.797000 CVE-2025-27426,0,0,265e1042156a6e72609e420079ebda71f3f2436cf1969deb71bd21f2f87de83e,2025-03-04T16:15:40.933000 -CVE-2025-2743,0,0,1c9cbed5f86c19a6e2b17c68433c96fa150391f82237627f4925b2890cd09cff,2025-03-25T07:15:38.883000 +CVE-2025-2743,0,1,1112e9d8b56e1b17153f840c8582b041edc02496563fa9bef6d278b86d6a0fdb,2025-03-25T14:15:31.893000 CVE-2025-27430,0,0,c8635f0b92dae7bf8e99c5e4e8dabb23fa1cb6267b38122c26d97fb0aff537e6,2025-03-11T01:15:36.157000 CVE-2025-27431,0,0,85033e3af4b6365958fcf162dc58009a9515212b38e9ac59600dfcd228492344,2025-03-11T01:15:36.310000 CVE-2025-27432,0,0,0097aad049d9f686ea71d8a6054e6d326f3e360a2d590fa8120819d74b49d0b1,2025-03-11T01:15:36.467000 @@ -286108,6 +286115,9 @@ CVE-2025-27622,0,0,e1ae4e4be1d65cdd010a61423d287f61eee65b8bc22902c856e40f0e4963e CVE-2025-27623,0,0,971732dcbffe6942130f281161641575c57aec05747e6a7cc0997239bd8a6f05,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,da36f8fffe4978877022da178b05a4a5b4cfcf82b463e1a963f507b7d88cc625,2025-03-06T17:15:23.797000 CVE-2025-27625,0,0,7a7d16075ac02e2e4fa9607392e4b1922b338fef72722c2b646c0aacb79f0b5e,2025-03-06T17:15:23.960000 +CVE-2025-27631,1,1,00e594dd221957fdc16ef28cb5dfa9decc0de3d8a5ae49bf58ae048b39e5524e,2025-03-25T13:15:40.947000 +CVE-2025-27632,1,1,b13eb7d0fcd9f729e979ace45ecb0a894e3733433401a2df4ee0892e9f6bf6cd,2025-03-25T13:15:41.090000 +CVE-2025-27633,1,1,1e91223f4919f0c58e891564e46b8ac5b14d51139eb6087f0ce9fec2c3469751,2025-03-25T13:15:41.223000 CVE-2025-27636,0,0,01d5ca04dc9864059707b72db492cf0d0c0bbf81770970147e11edb684eb5bcb,2025-03-17T15:15:44.750000 CVE-2025-27637,0,0,00dcd75d469e1cdd070357ebfa418b226d483cc6e1d8291f82f85ebe0beed72d,2025-03-05T16:15:40.713000 CVE-2025-27638,0,0,9ce50ff389088231aa971b9d41abf85dcd24d2f2c68974d7a5072e30632aa74a,2025-03-05T17:15:16.853000 @@ -286296,7 +286306,7 @@ CVE-2025-29215,0,0,d7967cfafaaab4c96e33cb99a42f39aeebf06b089d1ce0b15f4f18191f135 CVE-2025-29217,0,0,014bb574f61dae8a2fe24e49956818e83535660eab284aa66ac9d596835fdadc,2025-03-21T18:15:37.310000 CVE-2025-29218,0,0,980928f807adadcb2b66d7ea5b7cc9d305d69145f8a2d7a230fc149695fd02d9,2025-03-21T18:15:37.503000 CVE-2025-29223,0,0,7555094e5b60a0745e0e04a7876b612aa71f8d1e09c815cad674c8881a3a31fa,2025-03-21T19:15:46.007000 -CVE-2025-29226,0,0,d6cd1baab5dcc30ef6ce3b45ff65d107ce88083b9de1cf432d32241fd142a1cc,2025-03-21T19:15:46.170000 +CVE-2025-29226,0,1,598431993e1dea28d2a41edf1a133ff19583a46461026345d090d7abff0d6645,2025-03-25T13:15:41.357000 CVE-2025-29227,0,0,15031612a342f1663453dfb027586c6db2ea2f4e163dcc47110f16a263fdb927,2025-03-21T19:15:46.310000 CVE-2025-29230,0,0,82fd9baf0d57bfe253b1907c4d74fadd09e960a1c557455f486f92c59e6e235a,2025-03-21T18:15:38.943000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 @@ -286328,6 +286338,7 @@ CVE-2025-29427,0,0,fb06bea0565e418e672284053343d8d697fe811255662bb7ca45bb09b0b61 CVE-2025-29429,0,0,70b801f0ce3ad253bd955906d12fd5a9a96353ca58a8ec91330f8d171fed6952,2025-03-18T16:15:28.153000 CVE-2025-29430,0,0,22fb0e15e8eef268d2849d570bb306a1b0d379aaf00402379e7e1bf591abed65,2025-03-19T19:15:50.097000 CVE-2025-29431,0,0,31720ec0bc8cba4659c1c2d3999cf0913efe8183aa46190b4c6f3ec8b4bb5bc1,2025-03-19T19:15:50.223000 +CVE-2025-29635,1,1,225bee2f0b8245369234f5502dd96bb060fdc1fee26a4cb29e8e8b2f9873d4a4,2025-03-25T14:15:29.043000 CVE-2025-29640,0,0,684661940e38e3fbc4f2676adca19fd07a4b95839bb039ae44b7731f40899f4a,2025-03-24T18:15:23.613000 CVE-2025-29641,0,0,da834c0947f85989328576ecb3102fddbcebc6673f6bdf9795762806f49bd137,2025-03-24T18:15:23.773000 CVE-2025-29768,0,0,492de4cf9bc586f0c097ff358f0d6522edec16b3a3700b1c85d835d10d900b1f,2025-03-13T17:15:37.623000 @@ -286368,6 +286379,7 @@ CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4 CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000 CVE-2025-29927,0,0,326931490ffe364c6a5bf57ee56c72d130519e69a3e9f76987d9e7afa4b7cc3f,2025-03-23T22:15:13.217000 CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000 +CVE-2025-29932,1,1,53f0efdf01091cff461bff98b0acfceff82d6c29ce76a88fcb8941c3ef932c74,2025-03-25T13:15:41.520000 CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000 CVE-2025-29994,0,0,8b1d4c4db8a5bb026ac4bf9b653f3b25d05b3b75f8c87e310d6dd90fa8b8e6c7,2025-03-13T12:15:13.660000 CVE-2025-29995,0,0,4e499babdfbbb2f8f3e0d85f41baf447f5b6555ca95dd3dd082c2591d71bbc2e,2025-03-13T12:15:13.830000 @@ -286380,6 +286392,7 @@ CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 +CVE-2025-30091,1,1,0d540188c217e13cbab86f312091b78c4454abdb98317765473afcad7b8b387a,2025-03-25T14:15:32.143000 CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000