From cd462a73fdae0fbac82a6e9846668150a8026c8d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 26 Mar 2025 17:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-03-26T17:00:19.995683+00:00 --- CVE-2010/CVE-2010-25xx/CVE-2010-2572.json | 4 +- CVE-2015/CVE-2015-59xx/CVE-2015-5955.json | 6 +- CVE-2018/CVE-2018-07xx/CVE-2018-0798.json | 32 +- CVE-2018/CVE-2018-08xx/CVE-2018-0802.json | 4 +- CVE-2021/CVE-2021-292xx/CVE-2021-29256.json | 4 +- CVE-2021/CVE-2021-315xx/CVE-2021-31573.json | 32 +- CVE-2021/CVE-2021-315xx/CVE-2021-31574.json | 32 +- CVE-2021/CVE-2021-315xx/CVE-2021-31575.json | 32 +- CVE-2021/CVE-2021-373xx/CVE-2021-37374.json | 32 +- CVE-2022/CVE-2022-25xx/CVE-2022-2546.json | 22 +- CVE-2022/CVE-2022-326xx/CVE-2022-32663.json | 32 +- CVE-2022/CVE-2022-386xx/CVE-2022-38657.json | 12 +- CVE-2022/CVE-2022-386xx/CVE-2022-38686.json | 32 +- CVE-2022/CVE-2022-427xx/CVE-2022-42783.json | 32 +- CVE-2022/CVE-2022-429xx/CVE-2022-42950.json | 32 +- CVE-2022/CVE-2022-429xx/CVE-2022-42951.json | 32 +- CVE-2022/CVE-2022-442xx/CVE-2022-44267.json | 32 +- CVE-2022/CVE-2022-442xx/CVE-2022-44268.json | 32 +- CVE-2022/CVE-2022-443xx/CVE-2022-44343.json | 32 +- CVE-2022/CVE-2022-444xx/CVE-2022-44448.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45496.json | 32 +- CVE-2022/CVE-2022-455xx/CVE-2022-45588.json | 32 +- CVE-2022/CVE-2022-470xx/CVE-2022-47070.json | 32 +- CVE-2022/CVE-2022-471xx/CVE-2022-47130.json | 36 +- CVE-2022/CVE-2022-471xx/CVE-2022-47131.json | 36 +- CVE-2022/CVE-2022-473xx/CVE-2022-47322.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47323.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47324.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47325.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47348.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47354.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47355.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47356.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47363.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47364.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47365.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47366.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47367.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47368.json | 32 +- CVE-2022/CVE-2022-473xx/CVE-2022-47369.json | 32 +- CVE-2022/CVE-2022-480xx/CVE-2022-48019.json | 32 +- CVE-2023/CVE-2023-206xx/CVE-2023-20602.json | 32 +- CVE-2023/CVE-2023-206xx/CVE-2023-20604.json | 32 +- CVE-2023/CVE-2023-206xx/CVE-2023-20605.json | 32 +- CVE-2023/CVE-2023-206xx/CVE-2023-20606.json | 32 +- CVE-2023/CVE-2023-212xx/CVE-2023-21237.json | 4 +- CVE-2023/CVE-2023-234xx/CVE-2023-23469.json | 12 +- CVE-2023/CVE-2023-241xx/CVE-2023-24148.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24149.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24150.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24151.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24152.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24153.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24154.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24155.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24156.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24157.json | 32 +- CVE-2023/CVE-2023-246xx/CVE-2023-24613.json | 32 +- CVE-2023/CVE-2023-249xx/CVE-2023-24997.json | 24 +- CVE-2023/CVE-2023-251xx/CVE-2023-25135.json | 32 +- CVE-2023/CVE-2023-251xx/CVE-2023-25139.json | 32 +- CVE-2024/CVE-2024-209xx/CVE-2024-20933.json | 14 +- CVE-2024/CVE-2024-209xx/CVE-2024-20952.json | 420 +++++++++++++++++- CVE-2024/CVE-2024-210xx/CVE-2024-21071.json | 16 +- CVE-2024/CVE-2024-211xx/CVE-2024-21130.json | 14 +- CVE-2024/CVE-2024-211xx/CVE-2024-21183.json | 14 +- CVE-2024/CVE-2024-222xx/CVE-2024-22273.json | 18 +- CVE-2024/CVE-2024-247xx/CVE-2024-24721.json | 14 +- CVE-2024/CVE-2024-26xx/CVE-2024-2626.json | 32 +- CVE-2024/CVE-2024-286xx/CVE-2024-28639.json | 34 +- CVE-2024/CVE-2024-288xx/CVE-2024-28872.json | 12 +- CVE-2024/CVE-2024-332xx/CVE-2024-33247.json | 34 +- CVE-2024/CVE-2024-333xx/CVE-2024-33382.json | 39 +- CVE-2024/CVE-2024-355xx/CVE-2024-35554.json | 27 +- CVE-2024/CVE-2024-384xx/CVE-2024-38468.json | 32 +- CVE-2024/CVE-2024-401xx/CVE-2024-40116.json | 27 +- CVE-2024/CVE-2024-405xx/CVE-2024-40544.json | 32 +- CVE-2024/CVE-2024-415xx/CVE-2024-41511.json | 14 +- CVE-2024/CVE-2024-415xx/CVE-2024-41564.json | 14 +- CVE-2024/CVE-2024-41xx/CVE-2024-4149.json | 22 +- CVE-2024/CVE-2024-426xx/CVE-2024-42616.json | 34 +- CVE-2024/CVE-2024-488xx/CVE-2024-48818.json | 43 +- CVE-2024/CVE-2024-550xx/CVE-2024-55028.json | 47 +- CVE-2024/CVE-2024-550xx/CVE-2024-55030.json | 47 +- CVE-2024/CVE-2024-78xx/CVE-2024-7806.json | 56 ++- CVE-2024/CVE-2024-80xx/CVE-2024-8021.json | 55 ++- CVE-2024/CVE-2024-80xx/CVE-2024-8026.json | 56 ++- CVE-2024/CVE-2024-80xx/CVE-2024-8053.json | 65 ++- CVE-2024/CVE-2024-80xx/CVE-2024-8062.json | 55 ++- CVE-2025/CVE-2025-14xx/CVE-2025-1413.json | 12 +- CVE-2025/CVE-2025-20xx/CVE-2025-2098.json | 82 ++++ CVE-2025/CVE-2025-222xx/CVE-2025-22283.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23459.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23460.json | 56 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23466.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23542.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23543.json | 56 +++ CVE-2025/CVE-2025-235xx/CVE-2025-23546.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23612.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23632.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23633.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23638.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23666.json | 56 +++ CVE-2025/CVE-2025-236xx/CVE-2025-23680.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23704.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23714.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23728.json | 56 +++ CVE-2025/CVE-2025-237xx/CVE-2025-23735.json | 56 +++ CVE-2025/CVE-2025-239xx/CVE-2025-23937.json | 56 +++ CVE-2025/CVE-2025-239xx/CVE-2025-23952.json | 56 +++ CVE-2025/CVE-2025-239xx/CVE-2025-23964.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24690.json | 56 +++ CVE-2025/CVE-2025-248xx/CVE-2025-24808.json | 6 +- CVE-2025/CVE-2025-249xx/CVE-2025-24972.json | 56 +++ CVE-2025/CVE-2025-251xx/CVE-2025-25134.json | 56 +++ CVE-2025/CVE-2025-253xx/CVE-2025-25373.json | 47 +- CVE-2025/CVE-2025-265xx/CVE-2025-26536.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26537.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26541.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26542.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26544.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26546.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26559.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26560.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26564.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26565.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26566.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26573.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26575.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26576.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26579.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26581.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26583.json | 56 +++ CVE-2025/CVE-2025-265xx/CVE-2025-26584.json | 56 +++ CVE-2025/CVE-2025-267xx/CVE-2025-26739.json | 56 +++ CVE-2025/CVE-2025-267xx/CVE-2025-26747.json | 56 +++ CVE-2025/CVE-2025-268xx/CVE-2025-26869.json | 56 +++ CVE-2025/CVE-2025-269xx/CVE-2025-26922.json | 56 +++ CVE-2025/CVE-2025-269xx/CVE-2025-26923.json | 56 +++ CVE-2025/CVE-2025-269xx/CVE-2025-26929.json | 56 +++ CVE-2025/CVE-2025-269xx/CVE-2025-26941.json | 56 +++ CVE-2025/CVE-2025-269xx/CVE-2025-26986.json | 56 +++ CVE-2025/CVE-2025-26xx/CVE-2025-2652.json | 78 +++- CVE-2025/CVE-2025-26xx/CVE-2025-2691.json | 58 ++- CVE-2025/CVE-2025-270xx/CVE-2025-27014.json | 56 +++ CVE-2025/CVE-2025-270xx/CVE-2025-27015.json | 56 +++ CVE-2025/CVE-2025-272xx/CVE-2025-27267.json | 56 +++ CVE-2025/CVE-2025-274xx/CVE-2025-27404.json | 64 +++ CVE-2025/CVE-2025-274xx/CVE-2025-27405.json | 64 +++ CVE-2025/CVE-2025-274xx/CVE-2025-27406.json | 64 +++ CVE-2025/CVE-2025-275xx/CVE-2025-27553.json | 38 +- CVE-2025/CVE-2025-27xx/CVE-2025-2783.json | 25 ++ CVE-2025/CVE-2025-288xx/CVE-2025-28855.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28858.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28865.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28869.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28873.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28877.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28880.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28882.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28885.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28889.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28890.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28893.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28898.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28899.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28903.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28911.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28916.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28917.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28921.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28924.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28928.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28934.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28935.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28939.json | 56 +++ CVE-2025/CVE-2025-289xx/CVE-2025-28942.json | 56 +++ CVE-2025/CVE-2025-28xx/CVE-2025-2819.json | 56 +++ CVE-2025/CVE-2025-28xx/CVE-2025-2820.json | 56 +++ CVE-2025/CVE-2025-28xx/CVE-2025-2825.json | 52 +++ CVE-2025/CVE-2025-291xx/CVE-2025-29100.json | 47 +- CVE-2025/CVE-2025-291xx/CVE-2025-29135.json | 47 +- CVE-2025/CVE-2025-293xx/CVE-2025-29310.json | 43 +- CVE-2025/CVE-2025-293xx/CVE-2025-29311.json | 43 +- CVE-2025/CVE-2025-293xx/CVE-2025-29312.json | 47 +- CVE-2025/CVE-2025-293xx/CVE-2025-29315.json | 47 +- CVE-2025/CVE-2025-301xx/CVE-2025-30118.json | 39 +- CVE-2025/CVE-2025-305xx/CVE-2025-30524.json | 56 +++ README.md | 90 ++-- _state.csv | 450 ++++++++++++-------- 190 files changed, 8574 insertions(+), 400 deletions(-) create mode 100644 CVE-2025/CVE-2025-20xx/CVE-2025-2098.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22283.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23459.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23460.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23466.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23542.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23543.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23546.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23612.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23632.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23633.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23638.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23666.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23680.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23704.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23714.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23728.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23735.json create mode 100644 CVE-2025/CVE-2025-239xx/CVE-2025-23937.json create mode 100644 CVE-2025/CVE-2025-239xx/CVE-2025-23952.json create mode 100644 CVE-2025/CVE-2025-239xx/CVE-2025-23964.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24690.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24972.json create mode 100644 CVE-2025/CVE-2025-251xx/CVE-2025-25134.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26536.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26537.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26541.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26542.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26544.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26546.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26559.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26560.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26564.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26565.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26566.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26573.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26575.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26576.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26579.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26581.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26583.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26584.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26739.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26747.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26869.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26922.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26923.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26929.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26941.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26986.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27014.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27015.json create mode 100644 CVE-2025/CVE-2025-272xx/CVE-2025-27267.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27404.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27405.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27406.json create mode 100644 CVE-2025/CVE-2025-27xx/CVE-2025-2783.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28855.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28858.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28865.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28869.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28873.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28877.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28880.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28882.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28885.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28889.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28890.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28893.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28898.json create mode 100644 CVE-2025/CVE-2025-288xx/CVE-2025-28899.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28903.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28911.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28916.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28917.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28921.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28924.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28928.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28934.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28935.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28939.json create mode 100644 CVE-2025/CVE-2025-289xx/CVE-2025-28942.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2819.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2820.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2825.json create mode 100644 CVE-2025/CVE-2025-305xx/CVE-2025-30524.json diff --git a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json index 45f5837c795..258b4566186 100644 --- a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json +++ b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json @@ -2,8 +2,8 @@ "id": "CVE-2010-2572", "sourceIdentifier": "secure@microsoft.com", "published": "2010-11-10T03:00:01.850", - "lastModified": "2025-02-10T19:15:30.363", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-26T16:18:53.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-59xx/CVE-2015-5955.json b/CVE-2015/CVE-2015-59xx/CVE-2015-5955.json index 5c24f5fd60c..211f5a780bd 100644 --- a/CVE-2015/CVE-2015-59xx/CVE-2015-5955.json +++ b/CVE-2015/CVE-2015-59xx/CVE-2015-5955.json @@ -2,7 +2,7 @@ "id": "CVE-2015-5955", "sourceIdentifier": "cve@mitre.org", "published": "2015-10-29T20:59:06.883", - "lastModified": "2024-11-21T02:34:12.537", + "lastModified": "2025-03-26T16:44:36.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:iphone_os:*:*", + "criteria": "cpe:2.3:a:owncloud:owncloud_client:*:*:*:*:*:iphone_os:*:*", "versionEndExcluding": "3.4.4", - "matchCriteriaId": "F80677C4-616C-44A3-AA94-BB69E4717496" + "matchCriteriaId": "B914A929-EF98-4AFA-A328-7E7D20CCA6A6" } ] } diff --git a/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json b/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json index c211f411cd3..08d44ced87b 100644 --- a/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json +++ b/CVE-2018/CVE-2018-07xx/CVE-2018-0798.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0798", "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-10T01:29:00.713", - "lastModified": "2025-02-07T17:15:10.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-26T16:18:18.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", @@ -185,7 +183,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -193,7 +192,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -216,7 +216,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -224,7 +225,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { diff --git a/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json b/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json index 3e08c160b32..59f6cda0c6a 100644 --- a/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json +++ b/CVE-2018/CVE-2018-08xx/CVE-2018-0802.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0802", "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-10T01:29:00.820", - "lastModified": "2025-02-07T17:15:10.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-26T16:16:43.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json b/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json index 2977c8ed347..74a6418f992 100644 --- a/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json +++ b/CVE-2021/CVE-2021-292xx/CVE-2021-29256.json @@ -2,8 +2,8 @@ "id": "CVE-2021-29256", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-24T18:15:08.033", - "lastModified": "2025-02-04T20:15:42.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-26T16:41:11.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-315xx/CVE-2021-31573.json b/CVE-2021/CVE-2021-315xx/CVE-2021-31573.json index 3f8acafa9e1..ef69a3cedad 100644 --- a/CVE-2021/CVE-2021-315xx/CVE-2021-31573.json +++ b/CVE-2021/CVE-2021-315xx/CVE-2021-31573.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31573", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T22:15:09.217", - "lastModified": "2024-11-21T06:05:55.817", + "lastModified": "2025-03-26T15:15:36.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-315xx/CVE-2021-31574.json b/CVE-2021/CVE-2021-315xx/CVE-2021-31574.json index 6542f78efe1..38e1c77ff9e 100644 --- a/CVE-2021/CVE-2021-315xx/CVE-2021-31574.json +++ b/CVE-2021/CVE-2021-315xx/CVE-2021-31574.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31574", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T22:15:09.270", - "lastModified": "2024-11-21T06:05:55.970", + "lastModified": "2025-03-26T15:15:37.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-315xx/CVE-2021-31575.json b/CVE-2021/CVE-2021-315xx/CVE-2021-31575.json index 3d29e42cefb..5d3ef7ac68a 100644 --- a/CVE-2021/CVE-2021-315xx/CVE-2021-31575.json +++ b/CVE-2021/CVE-2021-315xx/CVE-2021-31575.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31575", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T22:15:09.320", - "lastModified": "2024-11-21T06:05:56.093", + "lastModified": "2025-03-26T16:15:14.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-373xx/CVE-2021-37374.json b/CVE-2021/CVE-2021-373xx/CVE-2021-37374.json index d258ced5da1..1489d4acf8c 100644 --- a/CVE-2021/CVE-2021-373xx/CVE-2021-37374.json +++ b/CVE-2021/CVE-2021-373xx/CVE-2021-37374.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37374", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T18:15:12.710", - "lastModified": "2024-11-21T06:15:02.040", + "lastModified": "2025-03-26T15:15:38.067", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2546.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2546.json index f93e10bd229..c27a91ef224 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2546.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2546.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2546", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-02T09:15:08.403", - "lastModified": "2024-11-21T07:01:13.640", + "lastModified": "2025-03-26T15:15:38.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-326xx/CVE-2022-32663.json b/CVE-2022/CVE-2022-326xx/CVE-2022-32663.json index 82557d0d923..c967417e00b 100644 --- a/CVE-2022/CVE-2022-326xx/CVE-2022-32663.json +++ b/CVE-2022/CVE-2022-326xx/CVE-2022-32663.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32663", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T20:15:11.203", - "lastModified": "2024-11-21T07:06:50.210", + "lastModified": "2025-03-26T15:15:38.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38657.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38657.json index c3b85df91d4..742cb2c6ca0 100644 --- a/CVE-2022/CVE-2022-386xx/CVE-2022-38657.json +++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38657.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38657", "sourceIdentifier": "psirt@hcl.com", "published": "2023-02-12T04:15:14.977", - "lastModified": "2024-11-21T07:16:52.650", + "lastModified": "2025-03-26T15:15:39.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38686.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38686.json index 5cf7bd248f2..7821a71c33b 100644 --- a/CVE-2022/CVE-2022-386xx/CVE-2022-38686.json +++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38686.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38686", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:15.310", - "lastModified": "2024-11-21T07:16:56.437", + "lastModified": "2025-03-26T15:15:39.427", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42783.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42783.json index f611d804529..e4ee2ea9925 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42783.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42783.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42783", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:16.003", - "lastModified": "2024-11-21T07:25:19.997", + "lastModified": "2025-03-26T15:15:39.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42950.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42950.json index 3e04e8dac2d..01f78e2eb5d 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42950.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42950.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42950", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-06T21:15:09.300", - "lastModified": "2024-11-21T07:25:40.207", + "lastModified": "2025-03-26T15:15:39.937", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42951.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42951.json index 689d38f19b3..8d837475d85 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42951.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42951.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42951", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-06T21:15:09.357", - "lastModified": "2024-11-21T07:25:40.390", + "lastModified": "2025-03-26T15:15:40.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44267.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44267.json index 67e05c20177..0df0b3fa62e 100644 --- a/CVE-2022/CVE-2022-442xx/CVE-2022-44267.json +++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44267.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44267", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-06T21:15:09.417", - "lastModified": "2024-11-21T07:27:49.000", + "lastModified": "2025-03-26T15:15:40.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-404" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44268.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44268.json index a5d1fbbc899..8168fc130a1 100644 --- a/CVE-2022/CVE-2022-442xx/CVE-2022-44268.json +++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44268.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44268", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-06T21:15:09.473", - "lastModified": "2024-11-21T07:27:49.170", + "lastModified": "2025-03-26T15:15:40.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44343.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44343.json index a23d67ecbe6..cc1adf51e8c 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44343.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44343.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44343", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-06T14:15:09.050", - "lastModified": "2024-11-21T07:27:53.743", + "lastModified": "2025-03-26T15:15:40.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-444xx/CVE-2022-44448.json b/CVE-2022/CVE-2022-444xx/CVE-2022-44448.json index 37d50a8c44b..4be7f5c7114 100644 --- a/CVE-2022/CVE-2022-444xx/CVE-2022-44448.json +++ b/CVE-2022/CVE-2022-444xx/CVE-2022-44448.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44448", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:16.337", - "lastModified": "2024-11-21T07:28:02.607", + "lastModified": "2025-03-26T15:15:41.187", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45496.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45496.json index 4b1a77caf25..5160e7a7e40 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45496.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45496.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45496", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T21:15:10.560", - "lastModified": "2024-11-21T07:29:20.600", + "lastModified": "2025-03-26T16:15:15.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-455xx/CVE-2022-45588.json b/CVE-2022/CVE-2022-455xx/CVE-2022-45588.json index ffec4988399..7c6c3937981 100644 --- a/CVE-2022/CVE-2022-455xx/CVE-2022-45588.json +++ b/CVE-2022/CVE-2022-455xx/CVE-2022-45588.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45588", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T21:15:10.647", - "lastModified": "2024-11-21T07:29:27.947", + "lastModified": "2025-03-26T16:15:15.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47070.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47070.json index d2aabc50ae3..681ee647753 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47070.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47070.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47070", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T21:15:10.723", - "lastModified": "2024-11-21T07:31:27.630", + "lastModified": "2025-03-26T16:15:16.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47130.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47130.json index ef7ccf21c63..fe87f421de7 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47130.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47130.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47130", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T01:15:12.197", - "lastModified": "2024-11-21T07:31:33.110", + "lastModified": "2025-03-26T16:15:16.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ @@ -111,6 +141,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/OpenXP-Research/CVE-2022-47130", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47131.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47131.json index d78a3e8e59d..2675548599b 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47131.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47131.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47131", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T01:15:12.833", - "lastModified": "2024-11-21T07:31:33.287", + "lastModified": "2025-03-26T16:15:16.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ @@ -151,6 +181,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/OpenXP-Research/CVE-2022-47131", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47322.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47322.json index 06fc7918323..6b9cd743a89 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47322.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47322.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47322", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:16.937", - "lastModified": "2024-11-21T07:31:42.970", + "lastModified": "2025-03-26T15:15:41.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47323.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47323.json index 7e8965a6374..ecb665bdfb2 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47323.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47323.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47323", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:16.990", - "lastModified": "2024-11-21T07:31:43.093", + "lastModified": "2025-03-26T15:15:41.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47324.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47324.json index 998f8880054..e84cffa8e15 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47324.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47324.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47324", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:17.047", - "lastModified": "2024-11-21T07:31:43.207", + "lastModified": "2025-03-26T15:15:41.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47325.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47325.json index 634032fbef3..02995054bea 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47325.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47325.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47325", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:17.103", - "lastModified": "2024-11-21T07:31:43.323", + "lastModified": "2025-03-26T15:15:41.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47348.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47348.json index 230c2cf714c..463f4451973 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47348.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47348.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47348", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.070", - "lastModified": "2024-11-21T07:31:46.510", + "lastModified": "2025-03-26T15:15:42.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-129" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47354.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47354.json index d5255d55381..723fcf268a6 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47354.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47354.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47354", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.123", - "lastModified": "2024-11-21T07:31:48.797", + "lastModified": "2025-03-26T15:15:42.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47355.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47355.json index 86a344edc54..942b69b0595 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47355.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47355.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47355", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.173", - "lastModified": "2024-11-21T07:31:48.903", + "lastModified": "2025-03-26T15:15:42.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47356.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47356.json index 48dd1e31c1d..6782b926703 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47356.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47356.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47356", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.223", - "lastModified": "2024-11-21T07:31:49.020", + "lastModified": "2025-03-26T15:15:42.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47363.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47363.json index 6eebd90b98a..9c724f957d8 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47363.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47363.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47363", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.533", - "lastModified": "2024-11-21T07:31:49.873", + "lastModified": "2025-03-26T15:15:42.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 3.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47364.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47364.json index 9e07bbbf6d8..6d6570fa54d 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47364.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47364.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47364", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.583", - "lastModified": "2024-11-21T07:31:49.983", + "lastModified": "2025-03-26T15:15:43.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 3.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47365.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47365.json index 35b2e822a4a..8216d50b155 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47365.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47365.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47365", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.633", - "lastModified": "2024-11-21T07:31:50.097", + "lastModified": "2025-03-26T15:15:43.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47366.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47366.json index e01b1eb3af7..83e1757ae60 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47366.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47366.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47366", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.687", - "lastModified": "2024-11-21T07:31:50.203", + "lastModified": "2025-03-26T15:15:43.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47367.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47367.json index 2f7d775085f..2e807f1c446 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47367.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47367.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47367", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.740", - "lastModified": "2024-11-21T07:31:50.317", + "lastModified": "2025-03-26T15:15:43.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47368.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47368.json index 3d5d75c628d..e4693d22231 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47368.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47368.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47368", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.790", - "lastModified": "2024-11-21T07:31:50.430", + "lastModified": "2025-03-26T15:15:43.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 3.7 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47369.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47369.json index 88b0aa01545..ac2a2b8b300 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47369.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47369.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47369", "sourceIdentifier": "security@unisoc.com", "published": "2023-02-12T04:15:18.840", - "lastModified": "2024-11-21T07:31:50.543", + "lastModified": "2025-03-26T15:15:43.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 3.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48019.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48019.json index 18047885f9b..e6b20d7f3ef 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48019.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48019.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48019", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-06T15:15:10.090", - "lastModified": "2024-11-21T07:32:43.317", + "lastModified": "2025-03-26T16:15:17.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20602.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20602.json index 0ea4414bbdb..528ad11e2a7 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20602.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20602.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20602", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T20:15:14.440", - "lastModified": "2024-11-21T07:41:12.393", + "lastModified": "2025-03-26T15:15:44.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20604.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20604.json index 0e59936662a..35b0b6b6694 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20604.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20604.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20604", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T20:15:14.487", - "lastModified": "2024-11-21T07:41:12.533", + "lastModified": "2025-03-26T15:15:44.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20605.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20605.json index 63632f3501f..bb590d308f6 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20605.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20605.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20605", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T20:15:14.530", - "lastModified": "2024-11-21T07:41:12.673", + "lastModified": "2025-03-26T15:15:44.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20606.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20606.json index 9101bcb2900..1acc33e8737 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20606.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20606.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20606", "sourceIdentifier": "security@mediatek.com", "published": "2023-02-06T20:15:14.580", - "lastModified": "2024-11-21T07:41:12.833", + "lastModified": "2025-03-26T15:15:45.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json index 75ba4086eda..643c13dc67f 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21237", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:16.560", - "lastModified": "2024-11-21T07:42:27.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-26T16:32:44.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23469.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23469.json index 7d503b81053..3c059d34984 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23469.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23469.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23469", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-02-01T19:15:08.690", - "lastModified": "2024-11-21T07:46:15.757", + "lastModified": "2025-03-26T15:15:46.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-525" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24148.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24148.json index 299dab563f7..3f27f7d2eea 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24148.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24148.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24148", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:13.413", - "lastModified": "2024-11-21T07:47:29.233", + "lastModified": "2025-03-26T15:15:46.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24149.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24149.json index 28526681472..4ed669a46d9 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24149.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24149.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24149", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:13.650", - "lastModified": "2024-11-21T07:47:29.387", + "lastModified": "2025-03-26T16:15:17.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24150.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24150.json index 476f43793e0..aefe6ac203d 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24150.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24150.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24150", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:13.900", - "lastModified": "2024-11-21T07:47:29.540", + "lastModified": "2025-03-26T16:15:17.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24151.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24151.json index ef85cfde307..63fc5c37ddf 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24151.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24151.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24151", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:14.107", - "lastModified": "2024-11-21T07:47:29.677", + "lastModified": "2025-03-26T16:15:18.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24152.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24152.json index f5fcc603e89..fd4d0565d11 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24152.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24152.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24152", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:14.277", - "lastModified": "2024-11-21T07:47:29.820", + "lastModified": "2025-03-26T16:15:18.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24153.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24153.json index 222f396b45d..b4e1184724d 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24153.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24153.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24153", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:14.483", - "lastModified": "2024-11-21T07:47:29.963", + "lastModified": "2025-03-26T16:15:18.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24154.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24154.json index 9e68e81529f..28546f21703 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24154.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24154.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24154", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:14.667", - "lastModified": "2024-11-21T07:47:30.103", + "lastModified": "2025-03-26T16:15:18.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24155.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24155.json index 644a94d6c7f..7ac724e3ccd 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24155.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24155.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24155", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:14.837", - "lastModified": "2024-11-21T07:47:30.243", + "lastModified": "2025-03-26T16:15:19.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24156.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24156.json index a6501ae72e6..68b6501b071 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24156.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24156.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24156", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:14.993", - "lastModified": "2024-11-21T07:47:30.380", + "lastModified": "2025-03-26T15:15:47.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24157.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24157.json index 1daafc9b644..953b825609b 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24157.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24157.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24157", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T16:15:15.157", - "lastModified": "2024-11-21T07:47:30.517", + "lastModified": "2025-03-26T15:15:47.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24613.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24613.json index 867217feb46..6df5d7af744 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24613.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24613.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24613", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T02:15:07.997", - "lastModified": "2024-11-21T07:48:14.463", + "lastModified": "2025-03-26T15:15:47.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24997.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24997.json index 1c50cb2e4c6..ab20b9b88aa 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24997.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24997.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24997", "sourceIdentifier": "security@apache.org", "published": "2023-02-01T15:15:08.943", - "lastModified": "2024-11-21T07:48:54.047", + "lastModified": "2025-03-26T15:15:47.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25135.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25135.json index 15143a525f9..d4bfcc3d20b 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25135.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25135.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25135", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T05:15:10.737", - "lastModified": "2024-11-21T07:49:10.733", + "lastModified": "2025-03-26T15:15:47.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25139.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25139.json index 70ee84b9e89..a04e1bff722 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25139.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25139.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25139", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-03T06:15:09.523", - "lastModified": "2024-11-21T07:49:11.073", + "lastModified": "2025-03-26T15:15:48.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json index 39238c46a77..d5def345381 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20933.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20933", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:47.903", - "lastModified": "2024-11-21T08:53:27.690", + "lastModified": "2025-03-26T16:15:19.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20952.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20952.json index fcb2a6f4f32..c35bdbec0cb 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20952.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20952", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-01-16T22:15:42.477", - "lastModified": "2024-11-21T08:53:29.903", - "vulnStatus": "Modified", + "lastModified": "2025-03-26T15:03:47.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,6 +66,422 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11", + "versionEndExcluding": "11.0.24", + "matchCriteriaId": "BE2E2756-6ECC-4205-BED6-1A7DAB6D1C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17", + "versionEndExcluding": "17.0.10", + "matchCriteriaId": "1BD9DA0F-9664-4C81-882F-68DBBC323F5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21", + "versionEndExcluding": "21.0.2", + "matchCriteriaId": "231952D6-6C9A-4C31-A338-1AA8C3D4F433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", + "matchCriteriaId": "70892D06-6E75-4425-BBF0-4B684EC62A1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", + "matchCriteriaId": "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", + "matchCriteriaId": "7417B2BB-9AC2-4AF4-A828-C89A0735AD92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", + "matchCriteriaId": "6A0A57B5-6F88-4288-9CDE-F6613FE068D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", + "matchCriteriaId": "67ED8559-C348-4932-B7CE-CB96976A30EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", + "matchCriteriaId": "40AC3D91-263F-4345-9FAA-0E573EA64590" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", + "matchCriteriaId": "DD92AFA9-81F8-48D4-B79A-E7F066F69A99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", + "matchCriteriaId": "2C4B2F24-A730-4818-90C8-A2D90C081F03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", + "matchCriteriaId": "464087F2-C285-4574-957E-CE0663F07DE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", + "matchCriteriaId": "3E9BB880-A4F6-4887-8BB9-47AA298753D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", + "matchCriteriaId": "18DCFF53-B298-4534-AB5C-8A5EF59C616F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", + "matchCriteriaId": "083419F8-FDDF-4E36-88F8-857DB317C1D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", + "matchCriteriaId": "D7A74F65-57E8-4C9A-BA96-5EF401504F13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", + "matchCriteriaId": "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", + "matchCriteriaId": "07812576-3C35-404C-A7D7-9BE9E3D76E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", + "matchCriteriaId": "00C52B1C-5447-4282-9667-9EBE0720B423" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", + "matchCriteriaId": "92BB9EB0-0C12-4E77-89EE-FB77097841B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", + "matchCriteriaId": "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", + "matchCriteriaId": "ABC0E7BB-F8B7-4369-9910-71240E4073A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", + "matchCriteriaId": "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", + "matchCriteriaId": "0AE30779-48FB-451E-8CE1-F469F93B8772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", + "matchCriteriaId": "60590FDE-7156-4314-A012-AA38BD2ADDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", + "matchCriteriaId": "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", + "matchCriteriaId": "F24F6122-2256-41B6-9033-794C6424ED99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", + "matchCriteriaId": "0EAFA79E-8C7A-48CF-8868-11378FE4B26F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", + "matchCriteriaId": "D1D6F19F-59B5-4BB6-AD35-013384025970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", + "matchCriteriaId": "E7BA97BC-3ADA-465A-835B-6C3C5F416B56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", + "matchCriteriaId": "B71F77A4-B7EB-47A1-AAFD-431A7D040B86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", + "matchCriteriaId": "91D6BEA9-5943-44A4-946D-CEAA9BA99376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", + "matchCriteriaId": "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", + "matchCriteriaId": "2CB74086-14B8-4237-8357-E0C6B5BB8313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", + "matchCriteriaId": "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", + "matchCriteriaId": "00C2B9C9-1177-4DA6-96CE-55F37F383F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", + "matchCriteriaId": "435CF189-0BD8-40DF-A0DC-99862CDEAF8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", + "matchCriteriaId": "12A3F367-33AD-47C3-BFDC-871A17E72C94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", + "matchCriteriaId": "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", + "matchCriteriaId": "78261932-7373-4F16-91E0-1A72ADBEBC3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", + "matchCriteriaId": "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", + "matchCriteriaId": "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", + "matchCriteriaId": "F5A40B8A-D428-4008-9F21-AF21394C51D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", + "matchCriteriaId": "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", + "matchCriteriaId": "3B504718-5DCE-43B4-B19A-C6B6E7444BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", + "matchCriteriaId": "3102AA10-99A8-49A9-867E-7EEC56865680" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", + "matchCriteriaId": "5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*", + "matchCriteriaId": "15BA8A26-2CDA-442B-A549-6BE92DCCD205" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*", + "matchCriteriaId": "56F2883B-6A1B-4081-8877-07AF3A73F6CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*", + "matchCriteriaId": "98C0742E-ACDD-4DB4-8A4C-B96702C8976C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", + "matchCriteriaId": "F8483034-DD5A-445D-892F-CDE90A7D58EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*", + "matchCriteriaId": "1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*", + "matchCriteriaId": "DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*", + "matchCriteriaId": "A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*", + "matchCriteriaId": "383F0B07-59BF-4744-87F2-04C98BC183B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*", + "matchCriteriaId": "494C17C6-54A3-4BE6-A4FF-2D54DF2B38D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*", + "matchCriteriaId": "1058ABDC-D652-4E2D-964D-C9C98FD404F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update372:*:*:*:*:*:*", + "matchCriteriaId": "DC62A8BB-6230-4D5A-B91C-DD1B222F9E5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update382:*:*:*:*:*:*", + "matchCriteriaId": "333F58FD-5F4F-4F11-B1F8-8815C99AC61A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update392:*:*:*:*:*:*", + "matchCriteriaId": "1CB4456E-18B0-4C5B-822E-2BFE7DE019D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", + "matchCriteriaId": "8279718F-878F-4868-8859-1728D13CD0D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update402-b00:*:*:*:*:*:*", + "matchCriteriaId": "3FCE7DD4-EF50-4F46-B5E1-F5F0B31C2A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update402-b01:*:*:*:*:*:*", + "matchCriteriaId": "60538D83-D9A2-4A8E-ADCA-25ACDE789D11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update402-b02:*:*:*:*:*:*", + "matchCriteriaId": "823D1593-CCB9-4172-85FE-3F7EC57E966A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update402-b03:*:*:*:*:*:*", + "matchCriteriaId": "3723D31F-21F3-4040-A59D-6F4FE4D38033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update402-b04:*:*:*:*:*:*", + "matchCriteriaId": "60C2BD46-0BF0-4960-9070-41EF8BD86606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update402-b05:*:*:*:*:*:*", + "matchCriteriaId": "4B43831A-21CF-4A2D-AF1E-C909954E4713" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", + "matchCriteriaId": "2C024E1A-FD2C-42E8-B227-C2AFD3040436" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", + "matchCriteriaId": "4F24389D-DDD0-4204-AA24-31C920A4F47E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", + "matchCriteriaId": "966979BE-1F21-4729-B6B8-610F74648344" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", + "matchCriteriaId": "F8534265-33BF-460D-BF74-5F55FDE50F29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", + "matchCriteriaId": "F77AFC25-1466-4E56-9D5F-6988F3288E16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", + "matchCriteriaId": "A650BEB8-E56F-4E42-9361-8D2DB083F0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", + "matchCriteriaId": "799FFECD-E80A-44B3-953D-CDB5E195F3AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", + "matchCriteriaId": "A7047507-7CAF-4A14-AA9A-5CEF806EDE98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", + "matchCriteriaId": "CFC7B179-95D3-4F94-84F6-73F1034A1AF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", + "matchCriteriaId": "9FB28526-9385-44CA-AF08-1899E6C3AE4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", + "matchCriteriaId": "E26B69E4-0B43-415F-A82B-52FDCB262B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", + "matchCriteriaId": "27BC4150-70EC-462B-8FC5-20B3442CBB31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", + "matchCriteriaId": "02646989-ECD9-40AE-A83E-EFF4080C69B9" + } + ] + } + ] + }, { "nodes": [ { diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21071.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21071.json index 8ae249a1763..d7486120280 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21071.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21071", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:25.837", - "lastModified": "2024-12-06T21:18:54.143", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-26T15:15:48.580", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21130.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21130.json index 5a72af151da..dfda0109028 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21130.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21130.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21130", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:13.020", - "lastModified": "2024-11-21T08:53:50.470", + "lastModified": "2025-03-26T15:15:48.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21183.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21183.json index d53861fe8b4..a265d2da096 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21183.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21183.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21183", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:22.847", - "lastModified": "2024-11-21T08:53:56.780", + "lastModified": "2025-03-26T15:15:48.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json index d76f3c81b59..218bed6b053 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22273", "sourceIdentifier": "security@vmware.com", "published": "2024-05-21T18:15:08.993", - "lastModified": "2025-03-01T02:36:21.560", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-26T16:15:19.423", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -73,6 +73,20 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24721.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24721.json index 77d95093bbb..42b93275113 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24721.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24721.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24721", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T00:15:06.953", - "lastModified": "2024-11-21T08:59:34.940", + "lastModified": "2025-03-26T16:15:19.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], "references": [ { "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2024-24721", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2626.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2626.json index c236c3dff0a..c2ac6a4001b 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2626.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2626.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2626", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-20T17:15:07.483", - "lastModified": "2024-11-21T09:10:09.767", + "lastModified": "2025-03-26T15:15:49.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28639.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28639.json index 1d5dd2eedc6..f49a5bd1758 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28639.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28639", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-16T06:15:14.370", - "lastModified": "2024-12-16T22:56:31.737", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-26T15:15:49.150", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json index d957803ebf9..88242a8e924 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28872.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28872", "sourceIdentifier": "security-officer@isc.org", "published": "2024-07-11T15:15:11.377", - "lastModified": "2024-11-21T09:07:05.323", + "lastModified": "2025-03-26T15:15:49.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json index 193371b9a73..9e5fcc16db0 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33247", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T13:15:51.607", - "lastModified": "2025-03-06T19:34:19.017", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-26T15:15:49.923", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33382.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33382.json index 7086e248f8e..f76d44a32d2 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33382.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33382.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33382", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-08T17:15:07.677", - "lastModified": "2024-11-21T09:16:52.027", + "lastModified": "2025-03-26T15:15:50.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Open5GS v.2.7.0 permite a un atacante provocar una denegaci\u00f3n de servicio a trav\u00e9s del registro fallido de 64 UE/gnb" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/issues/2733", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json index 7015fc802b0..3f30df1be2b 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35554.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35554", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T14:15:09.307", - "lastModified": "2024-11-21T09:20:26.253", + "lastModified": "2025-03-26T16:15:19.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/infoWeb_deal.php?mudi=del&dataType=newsWeb&dataTypeCN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38468.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38468.json index 5487855f06e..1aa11c6a448 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38468.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38468.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38468", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T16:15:09.960", - "lastModified": "2024-11-21T09:26:00.370", + "lastModified": "2025-03-26T16:15:20.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-640" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json index 3e245bba1bf..4b99a2378ca 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40116.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40116", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-26T20:15:04.980", - "lastModified": "2024-11-21T09:30:57.560", + "lastModified": "2025-03-26T16:15:20.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 un problema en Solar-Log 1000 anterior a v2.8.2 y compilaci\u00f3n 52-23.04.2013 al almacenar contrase\u00f1as en texto plano en los archivos export.html, email.html y sms.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40544.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40544.json index 8c6cf7133bf..a21c34f1607 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40544.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40544.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40544", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-12T16:15:05.407", - "lastModified": "2024-11-21T09:31:17.313", + "lastModified": "2025-03-26T16:15:20.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41511.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41511.json index 61c6b537998..c79a7cd059b 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41511.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41511.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41511", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T18:15:08.090", - "lastModified": "2024-10-07T19:37:09.727", + "lastModified": "2025-03-26T15:15:51.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://cadclick.de/", diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json index 75e5d149008..e566ecafeea 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41564", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-28T17:15:10.693", - "lastModified": "2024-09-19T14:40:32.270", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-26T15:15:51.477", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-129" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json index 06ebfec072a..4154bcbbd34 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4149", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-13T06:15:12.203", - "lastModified": "2024-11-21T09:42:16.890", + "lastModified": "2025-03-26T15:15:52.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json index ba8430f7711..38574741e00 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42616.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42616", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T15:15:22.690", - "lastModified": "2024-08-21T13:10:56.257", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-26T15:15:51.890", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48818.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48818.json index a3bb41cc2ad..b380961fa40 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48818.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48818.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48818", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-25T20:15:22.320", - "lastModified": "2025-03-25T20:15:22.320", + "lastModified": "2025-03-26T15:15:52.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,50 @@ "value": "An issue in IIT Bombay, Mumbai, India Bodhitree of cs101 version allows a remote attacker to execute arbitrary code." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/183309", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/183309", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55028.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55028.json index a66fab98349..916a2849c88 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55028.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55028.json @@ -2,20 +2,63 @@ "id": "CVE-2024-55028", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-25T21:15:41.467", - "lastModified": "2025-03-25T21:15:41.467", + "lastModified": "2025-03-26T15:15:52.693", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A template injection vulnerability in the Dashboard of NASA Fprime v3.4.3 allows attackers to execute arbitrary code via uploading a crafted Vue file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de plantilla en el Dashboard de NASA Fprime v3.4.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Vue manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://visionspace.com/remote-code-execution-and-critical-vulnerabilities-in-nasa-fprime-v3-4-3/", "source": "cve@mitre.org" + }, + { + "url": "https://visionspace.com/remote-code-execution-and-critical-vulnerabilities-in-nasa-fprime-v3-4-3/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55030.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55030.json index f4c97d9fa12..da2ceded6d6 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55030.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55030.json @@ -2,20 +2,63 @@ "id": "CVE-2024-55030", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-25T21:15:41.687", - "lastModified": "2025-03-25T21:15:41.687", + "lastModified": "2025-03-26T15:15:52.960", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in the Command Dispatcher Service of NASA Fprime v3.4.3 allows attackers to execute arbitrary commands." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en el Servicio de Despachador de Comandos de NASA Fprime v3.4.3 permite a los atacantes ejecutar comandos arbitrarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://visionspace.com/remote-code-execution-and-critical-vulnerabilities-in-nasa-fprime-v3-4-3/", "source": "cve@mitre.org" + }, + { + "url": "https://visionspace.com/remote-code-execution-and-critical-vulnerabilities-in-nasa-fprime-v3-4-3/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7806.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7806.json index fb9b17fd2f4..92b01ff2855 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7806.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7806.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7806", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:37.893", - "lastModified": "2025-03-20T16:15:14.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T16:46:35.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.3.8", + "matchCriteriaId": "B15E1DFB-EF7D-4820-B6A9-2D5CD943C9A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/9350a68d-5f33-4b3d-988b-81e778160ab8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/9350a68d-5f33-4b3d-988b-81e778160ab8", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json index 257d1174ad4..aab6e4b2195 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8021", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:39.260", - "lastModified": "2025-03-20T14:15:21.883", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T16:39:28.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradio_project:gradio:-:*:*:*:*:python:*:*", + "matchCriteriaId": "EFDEBC7A-8C4A-4708-9418-78AD94AA1128" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/adc23067-ec04-47ef-9265-afd452071888", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8026.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8026.json index 84e9a6a9b0d..837833985fa 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8026.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8026.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8026", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:39.503", - "lastModified": "2025-03-20T16:15:14.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T16:26:39.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qanything:qanything:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-06-24", + "matchCriteriaId": "41845D40-E044-4AD8-A2B6-EB55331CF895" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/e57f1e32-0fe5-4997-926c-587461aa6274", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/e57f1e32-0fe5-4997-926c-587461aa6274", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json index 6ff51a7d14f..c7adbf9b026 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8053", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:39.993", - "lastModified": "2025-03-20T14:15:21.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T16:18:07.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,16 +71,51 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openwebui:open_webui:0.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "29BD3977-F33C-4BD9-80A5-0D176D4176CE" + } + ] + } + ] } ], "references": [ { "url": "https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/ebe8c1fa-113b-4df9-be03-a406b9adb9f4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8062.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8062.json index a79c98b0f1b..645df1e00ed 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8062.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8062", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:40.627", - "lastModified": "2025-03-20T16:15:14.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T16:10:51.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:h2o:h2o:3.46.0:*:*:*:*:*:*:*", + "matchCriteriaId": "23A801BB-59F5-4E6E-9DC6-C9D924DC28D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/a04190d9-4acb-449a-9a7f-f1bf6be1ed23", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/a04190d9-4acb-449a-9a7f-f1bf6be1ed23", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json index dc3e9e0d7d8..cd4be008af7 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1413.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1413", "sourceIdentifier": "cvd@cert.pl", "published": "2025-02-28T09:15:11.850", - "lastModified": "2025-02-28T09:15:11.850", + "lastModified": "2025-03-26T16:15:20.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,9 +22,9 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 9.2, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -33,8 +33,8 @@ "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnAvailabilityImpact": "NONE", - "subConfidentialityImpact": "HIGH", - "subIntegrityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED", diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2098.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2098.json new file mode 100644 index 00000000000..5d40e96f038 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2098.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-2098", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-26T16:15:23.540", + "lastModified": "2025-03-26T16:15:23.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader\u00a0in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://apps.apple.com/pl/app/fast-cad-reader/id1484905765", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2025-2098/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22283.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22283.json new file mode 100644 index 00000000000..404b5e3ff68 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22283.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22283", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:53.340", + "lastModified": "2025-03-26T15:15:53.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riyaz GetSocial allows Reflected XSS. This issue affects GetSocial: from n/a through 2.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/getsocial/vulnerability/wordpress-getsocial-plugin-2-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23459.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23459.json new file mode 100644 index 00000000000..bcdf353b124 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23459.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23459", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:53.600", + "lastModified": "2025-03-26T15:15:53.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound NS Simple Intro Loader allows Reflected XSS. This issue affects NS Simple Intro Loader: from n/a through 2.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ns-simple-intro-loader/vulnerability/wordpress-ns-simple-intro-loader-plugin-2-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23460.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23460.json new file mode 100644 index 00000000000..b84545daee2 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23460.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23460", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:53.830", + "lastModified": "2025-03-26T15:15:53.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RWS Enquiry And Lead Follow-up allows Reflected XSS. This issue affects RWS Enquiry And Lead Follow-up: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rws-enquiry/vulnerability/wordpress-rws-enquiry-and-lead-follow-up-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23466.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23466.json new file mode 100644 index 00000000000..41b16aa49d1 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23466.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23466", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:54.100", + "lastModified": "2025-03-26T15:15:54.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpsiteeditor Site Editor Google Map allows Reflected XSS. This issue affects Site Editor Google Map: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/site-editor-google-map/vulnerability/wordpress-site-editor-google-map-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23542.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23542.json new file mode 100644 index 00000000000..916710d8e55 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23542.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23542", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:55.610", + "lastModified": "2025-03-26T15:15:55.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Robert D Payne RDP Linkedin Login allows Reflected XSS. This issue affects RDP Linkedin Login: from n/a through 1.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rdp-linkedin-login/vulnerability/wordpress-rdp-linkedin-login-plugin-1-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23543.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23543.json new file mode 100644 index 00000000000..30b53cbadb3 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23543.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23543", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:57.723", + "lastModified": "2025-03-26T15:15:57.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FOMO Pay Chinese Payment Solution allows Reflected XSS. This issue affects FOMO Pay Chinese Payment Solution: from n/a through 2.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fomo-payment-gateway-for-woocommerce/vulnerability/wordpress-fomo-pay-chinese-payment-solution-plugin-2-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23546.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23546.json new file mode 100644 index 00000000000..0b51efbb297 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23546", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:57.993", + "lastModified": "2025-03-26T15:15:57.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RDP inGroups+ allows Reflected XSS. This issue affects RDP inGroups+: from n/a through 1.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rdp-ingroups/vulnerability/wordpress-rdp-ingroups-plugin-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23612.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23612.json new file mode 100644 index 00000000000..7de476eb731 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23612.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23612", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:58.283", + "lastModified": "2025-03-26T15:15:58.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pixobe Cartography allows Reflected XSS. This issue affects Pixobe Cartography: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pixobe-cartography/vulnerability/wordpress-pixobe-cartography-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23632.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23632.json new file mode 100644 index 00000000000..02cc76fa159 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23632.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23632", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:58.530", + "lastModified": "2025-03-26T15:15:58.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rhizome Networks CG Button allows Reflected XSS. This issue affects CG Button: from n/a through 1.0.5.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/content-glass-button/vulnerability/wordpress-cg-button-plugin-1-0-5-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23633.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23633.json new file mode 100644 index 00000000000..76f03f3e99c --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23633.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23633", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:58.753", + "lastModified": "2025-03-26T15:15:58.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Database Audit allows Reflected XSS. This issue affects WP Database Audit: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/database-audit/vulnerability/wordpress-wp-database-audit-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23638.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23638.json new file mode 100644 index 00000000000..a830a5d1288 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23638.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23638", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:15:58.940", + "lastModified": "2025-03-26T15:15:58.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Frontend Post Submission allows Reflected XSS. This issue affects Frontend Post Submission: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/frontend-post-submission/vulnerability/wordpress-frontend-post-submission-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23666.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23666.json new file mode 100644 index 00000000000..354b9a00142 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23666.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23666", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:00.870", + "lastModified": "2025-03-26T15:16:00.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Management-screen-droptiles allows Reflected XSS. This issue affects Management-screen-droptiles: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cxc-sawa/vulnerability/wordpress-management-screen-droptiles-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23680.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23680.json new file mode 100644 index 00000000000..a750d2eaafe --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23680.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23680", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:02.850", + "lastModified": "2025-03-26T15:16:02.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Narnoo Operator allows Reflected XSS. This issue affects Narnoo Operator: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/narnoo-shortcodes/vulnerability/wordpress-narnoo-operator-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23704.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23704.json new file mode 100644 index 00000000000..1fb0b7dc943 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23704.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23704", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:03.380", + "lastModified": "2025-03-26T15:16:03.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Reuven Karasik Your Lightbox allows Reflected XSS. This issue affects Your Lightbox: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/your-lightbox/vulnerability/wordpress-your-lightbox-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23714.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23714.json new file mode 100644 index 00000000000..f300c34fc03 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23714.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23714", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:03.907", + "lastModified": "2025-03-26T15:16:03.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AppReview allows Reflected XSS. This issue affects AppReview: from n/a through 0.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/appreview/vulnerability/wordpress-appreview-plugin-0-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23728.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23728.json new file mode 100644 index 00000000000..cb3afc0fe70 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23728.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23728", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:04.433", + "lastModified": "2025-03-26T15:16:04.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AuMenu allows Reflected XSS. This issue affects AuMenu: from n/a through 1.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/aumenu/vulnerability/wordpress-aumenu-plugin-1-1-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23735.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23735.json new file mode 100644 index 00000000000..40a4690f4d2 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23735.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23735", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:06.437", + "lastModified": "2025-03-26T15:16:06.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cosmin Schiopu Infugrator allows Reflected XSS. This issue affects Infugrator: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/infugrator/vulnerability/wordpress-infugrator-plugin-1-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23937.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23937.json new file mode 100644 index 00000000000..ba3c3ce30b1 --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23937.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23937", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:06.673", + "lastModified": "2025-03-26T15:16:06.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound LinkedIn Lite allows PHP Local File Inclusion. This issue affects LinkedIn Lite: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/linkedin-lite/vulnerability/wordpress-linkedin-lite-plugin-1-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23952.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23952.json new file mode 100644 index 00000000000..644a0011687 --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23952.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23952", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:06.913", + "lastModified": "2025-03-26T15:16:06.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ntm custom-field-list-widget allows PHP Local File Inclusion. This issue affects custom-field-list-widget: from n/a through 1.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-field-list-widget/vulnerability/wordpress-custom-field-list-widget-plugin-1-5-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23964.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23964.json new file mode 100644 index 00000000000..c8ef9b6023e --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23964.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23964", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:07.173", + "lastModified": "2025-03-26T15:16:07.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Google Plus allows Reflected XSS. This issue affects Google Plus: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-plus-google/vulnerability/wordpress-google-plus-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24690.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24690.json new file mode 100644 index 00000000000..a073ca6a53e --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24690.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24690", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:07.407", + "lastModified": "2025-03-26T15:16:07.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/formality/vulnerability/wordpress-formality-plugin-1-5-7-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24808.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24808.json index 90988e529f4..4d7734be92c 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24808.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24808.json @@ -2,13 +2,13 @@ "id": "CVE-2025-24808", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-26T14:15:32.417", - "lastModified": "2025-03-26T14:15:32.417", + "lastModified": "2025-03-26T15:16:07.630", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Discourse is an open-source discussion platform. Prior to versions 3.3.4 on the `stable` branch and `3.4.0.beta5` on the `beta` branch, someone who is about to reach the limit of users in a group DM may send requests to add new users in parallel. The requests might all go through ignoring the limit due to a race condition. The patch in versions `3.3.4` and `3.4.0.beta5` uses the `lock` step in service to wrap part of the `add_users_to_channel` service inside a distributed lock/mutex in order to avoid the race condition." + "value": "Discourse is an open-source discussion platform. Prior to versions `3.3.4` on the `stable` branch and `3.4.0.beta5` on the `beta` branch, someone who is about to reach the limit of users in a group DM may send requests to add new users in parallel. The requests might all go through ignoring the limit due to a race condition. The patch in versions `3.3.4` and `3.4.0.beta5` uses the `lock` step in service to wrap part of the `add_users_to_channel` service inside a distributed lock/mutex in order to avoid the race condition." } ], "metrics": { @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24972.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24972.json new file mode 100644 index 00000000000..54aa9796181 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24972.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24972", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-26T15:16:07.920", + "lastModified": "2025-03-26T15:16:07.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Discourse is an open-source discussion platform. Prior to versions `3.3.4` on the `stable` branch and `3.4.0.beta5` on the `beta` branch, in specific circumstances, users could be added to group direct messages despite disabling direct messaging in their preferences. Versions `3.3.4` and `3.4.0.beta5` contain a patch for the issue. A workaround is available. If a user disables chat in their preferences then they cannot be added to new group chats." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-4p63-qw6g-4mv2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25134.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25134.json new file mode 100644 index 00000000000..8b0b5777ef3 --- /dev/null +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25134.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25134", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:08.190", + "lastModified": "2025-03-26T15:16:08.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Theme Demo Bar allows Reflected XSS. This issue affects Theme Demo Bar: from n/a through 1.6.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-theme-demo-bar/vulnerability/wordpress-theme-demo-bar-plugin-1-6-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25373.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25373.json index 8577c23c16c..8706764fae6 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25373.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25373.json @@ -2,20 +2,63 @@ "id": "CVE-2025-25373", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-25T21:15:42.140", - "lastModified": "2025-03-25T21:15:42.140", + "lastModified": "2025-03-26T15:16:08.443", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Memory Management Module of NASA cFS (Core Flight System) Aquila has insecure permissions, which can be exploited to gain an RCE on the platform." + }, + { + "lang": "es", + "value": "El m\u00f3dulo de gesti\u00f3n de memoria de NASA cFS (Core Flight System) Aquila tiene permisos inseguros, que pueden explotarse para obtener un RCE en la plataforma." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/", "source": "cve@mitre.org" + }, + { + "url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26536.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26536.json new file mode 100644 index 00000000000..5da113622ee --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26536.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26536", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:08.890", + "lastModified": "2025-03-26T15:16:08.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yendif Player Another Events Calendar allows Reflected XSS. This issue affects Another Events Calendar: from n/a through 1.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/another-events-calendar/vulnerability/wordpress-another-events-calendar-plugin-1-7-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26537.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26537.json new file mode 100644 index 00000000000..34241245435 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26537.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26537", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:09.130", + "lastModified": "2025-03-26T15:16:09.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound GDPR Tools allows Stored XSS. This issue affects GDPR Tools: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gdpr-tools/vulnerability/wordpress-gdpr-tools-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26541.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26541.json new file mode 100644 index 00000000000..9a992a5bb13 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26541.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26541", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:09.357", + "lastModified": "2025-03-26T15:16:09.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeSolz Bitcoin / AltCoin Payment Gateway for WooCommerce allows Reflected XSS. This issue affects Bitcoin / AltCoin Payment Gateway for WooCommerce: from n/a through 1.7.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-altcoin-payment-gateway/vulnerability/wordpress-bitcoin-altcoin-payment-gateway-for-woocommerce-plugin-1-7-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26542.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26542.json new file mode 100644 index 00000000000..fedbd6e4e6b --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26542.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26542", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:09.613", + "lastModified": "2025-03-26T15:16:09.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Zalo Live Chat allows Reflected XSS. This issue affects Zalo Live Chat: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/zalo-live-chat/vulnerability/wordpress-zalo-live-chat-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26544.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26544.json new file mode 100644 index 00000000000..43e45b1ffc9 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26544.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26544", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:09.850", + "lastModified": "2025-03-26T15:16:09.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound UTM tags tracking for Contact Form 7 allows Reflected XSS. This issue affects UTM tags tracking for Contact Form 7: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-utm-tracking/vulnerability/wordpressutm-tags-landing-page-plugin-1-4-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26546.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26546.json new file mode 100644 index 00000000000..79e9339a1e2 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26546", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:10.050", + "lastModified": "2025-03-26T15:16:10.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Cookies Pro allows Reflected XSS. This issue affects Cookies Pro: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cookies-pro/vulnerability/wordpress-cookies-pro-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26559.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26559.json new file mode 100644 index 00000000000..b8e8b4699c1 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26559.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26559", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:10.203", + "lastModified": "2025-03-26T15:16:10.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Secure Invites allows Reflected XSS. This issue affects Secure Invites: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wordpress-mu-secure-invites/vulnerability/wordpress-secure-invites-plugin-1-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26560.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26560.json new file mode 100644 index 00000000000..abed6e8996e --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26560.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26560", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:10.363", + "lastModified": "2025-03-26T15:16:10.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Contact Form III allows Reflected XSS. This issue affects WP Contact Form III: from n/a through 1.6.2d." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-contact-form-iii/vulnerability/wordpress-wp-contact-form-iii-plugin-1-6-2d-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26564.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26564.json new file mode 100644 index 00000000000..6efa4f04c2b --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26564.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26564", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:10.533", + "lastModified": "2025-03-26T15:16:10.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kagla GNUCommerce allows Reflected XSS. This issue affects GNUCommerce: from n/a through 1.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gnucommerce/vulnerability/wordpress-gnucommerce-plugin-1-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26565.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26565.json new file mode 100644 index 00000000000..1e98166b88f --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26565.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26565", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:10.687", + "lastModified": "2025-03-26T15:16:10.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kagla GNUPress allows Reflected XSS. This issue affects GNUPress: from n/a through 0.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gnupress/vulnerability/wordpress-gnupress-plugin-0-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26566.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26566.json new file mode 100644 index 00000000000..3e3a392c401 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26566.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26566", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:10.863", + "lastModified": "2025-03-26T15:16:10.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound In Stock Mailer for WooCommerce allows Reflected XSS. This issue affects In Stock Mailer for WooCommerce: from n/a through 2.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/in-stock-mailer-for-woocommerce/vulnerability/wordpress-in-stock-mailer-for-woocommerce-plugin-2-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26573.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26573.json new file mode 100644 index 00000000000..cb7043a0a6a --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:11.040", + "lastModified": "2025-03-26T15:16:11.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Rizzi Guestbook allows Reflected XSS. This issue affects Rizzi Guestbook: from n/a through 4.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rizzi-guestbook/vulnerability/wordpress-rizzi-guestbook-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26575.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26575.json new file mode 100644 index 00000000000..83a0dfea50f --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26575.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26575", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:11.203", + "lastModified": "2025-03-26T15:16:11.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Maurer Display Post Meta allows Reflected XSS. This issue affects Display Post Meta: from n/a through 2.4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/display-post-meta/vulnerability/wordpress-display-post-meta-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26576.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26576.json new file mode 100644 index 00000000000..69cd7add00f --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26576.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26576", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:11.363", + "lastModified": "2025-03-26T15:16:11.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in takumin WP Simple Slideshow allows Reflected XSS. This issue affects WP Simple Slideshow: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-simple-slideshow/vulnerability/wordpress-wp-simple-slideshow-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26579.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26579.json new file mode 100644 index 00000000000..cc1627d9a4b --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26579.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26579", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:11.557", + "lastModified": "2025-03-26T15:16:11.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in videowhisper MicroPayments allows Reflected XSS. This issue affects MicroPayments: from n/a through 3.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/paid-membership/vulnerability/wordpress-micropayments-paid-membership-plugin-1-2-reflected-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26581.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26581.json new file mode 100644 index 00000000000..4035e2607be --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26581.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26581", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:11.720", + "lastModified": "2025-03-26T15:16:11.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in videowhisper Picture Gallery allows Reflected XSS. This issue affects Picture Gallery: from n/a through 1.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/picture-gallery/vulnerability/wordpress-picture-gallery-plugin-1-5-23-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26583.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26583.json new file mode 100644 index 00000000000..f96da347e46 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26583.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26583", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:11.903", + "lastModified": "2025-03-26T15:16:11.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in videowhisper Video Share VOD allows Reflected XSS. This issue affects Video Share VOD: from n/a through 2.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/video-share-vod/vulnerability/wordpress-video-share-vod-plugin-2-6-32-reflected-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26584.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26584.json new file mode 100644 index 00000000000..fbd5502f0da --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26584.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26584", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:12.063", + "lastModified": "2025-03-26T15:16:12.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound TBTestimonials allows Reflected XSS. This issue affects TBTestimonials: from n/a through 1.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tb-testimonials/vulnerability/wordpress-tbtestimonials-plugin-1-7-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26739.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26739.json new file mode 100644 index 00000000000..b7ccf5ba796 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26739.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26739", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:12.233", + "lastModified": "2025-03-26T15:16:12.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themefunction newseqo allows Stored XSS.This issue affects newseqo: from n/a through 2.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/newseqo/vulnerability/wordpress-newseqo-theme-2-1-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26747.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26747.json new file mode 100644 index 00000000000..319b6f28e1c --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26747.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26747", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:12.390", + "lastModified": "2025-03-26T15:16:12.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 99colorthemes RainbowNews allows Stored XSS.This issue affects RainbowNews: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/rainbownews/vulnerability/wordpress-rainbownews-theme-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26869.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26869.json new file mode 100644 index 00000000000..ab7798692aa --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26869.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26869", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:12.553", + "lastModified": "2025-03-26T15:16:12.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Build allows Stored XSS.This issue affects Build: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/build/vulnerability/wordpress-build-theme-1-13-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26922.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26922.json new file mode 100644 index 00000000000..d0f23383954 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26922.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26922", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:12.713", + "lastModified": "2025-03-26T15:16:12.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in techthemes AuraMart allows Stored XSS.This issue affects AuraMart: from n/a through 2.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/auramart/vulnerability/wordpress-auramart-theme-2-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26923.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26923.json new file mode 100644 index 00000000000..6dc3a71953a --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26923.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26923", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:12.877", + "lastModified": "2025-03-26T15:16:12.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bastien Ho Event post allows Stored XSS.This issue affects Event post: from n/a through 5.9.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/event-post/vulnerability/wordpress-event-post-plugin-5-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26929.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26929.json new file mode 100644 index 00000000000..44f1e24f0aa --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26929.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26929", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:13.043", + "lastModified": "2025-03-26T15:16:13.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NOUS Ouvert Utile et Simple Accounting for WooCommerce allows Stored XSS.This issue affects Accounting for WooCommerce: from n/a through 1.6.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/accounting-for-woocommerce/vulnerability/wordpress-accounting-for-woocommerce-plugin-1-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26941.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26941.json new file mode 100644 index 00000000000..a0372b92701 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26941.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26941", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:13.210", + "lastModified": "2025-03-26T15:16:13.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Andy Moyle Church Admin allows SQL Injection.This issue affects Church Admin: from n/a through 5.0.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/church-admin/vulnerability/wordpress-church-admin-plugin-5-0-18-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26986.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26986.json new file mode 100644 index 00000000000..c36bc2b5467 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26986.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26986", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:13.373", + "lastModified": "2025-03-26T15:16:13.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in StylemixThemes Pearl - Corporate Business allows PHP Local File Inclusion.This issue affects Pearl - Corporate Business: from n/a before 3.4.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/pearl/vulnerability/wordpress-pearl-theme-3-4-8-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json index 48b43d96f85..7334630b053 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2652.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2652", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-23T15:15:13.737", - "lastModified": "2025-03-24T13:15:27.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T15:16:11.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to exposure of information through directory listing. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. Multiple sub-directories are affected." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n expone informaci\u00f3n a trav\u00e9s de listados de directorios. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se recomienda cambiar la configuraci\u00f3n. Varios subdirectorios est\u00e1n afectados." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,30 +144,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/happytraveller-alone/cve/blob/main/dir.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.300667", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.300667", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.519876", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/happytraveller-alone/cve/blob/main/dir.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json index 3ae6c0922f3..78d13307888 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2691.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2691", "sourceIdentifier": "report@snyk.io", "published": "2025-03-23T15:15:13.940", - "lastModified": "2025-03-24T13:15:28.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T15:06:35.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Versions of the package nossrf before 1.0.4 are vulnerable to Server-Side Request Forgery (SSRF) where an attacker can provide a hostname that resolves to a local or reserved IP address space and bypass the SSRF protection mechanism." + }, + { + "lang": "es", + "value": "Las versiones del paquete nossrf anteriores a 1.0.4 son vulnerables a Server-Side Request Forgery (SSRF), donde un atacante puede proporcionar un nombre de host que se resuelve en un espacio de direcci\u00f3n IP local o reservado y eludir el mecanismo de protecci\u00f3n SSRF." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -101,14 +125,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nossrf_project:nossrf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "8E59BD9C-ACAD-4FC8-B1B2-CE7A214224ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.snyk.io/vuln/SNYK-JS-NOSSRF-9510842", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-JS-NOSSRF-9510842", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27014.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27014.json new file mode 100644 index 00000000000..954ed927952 --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27014.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27014", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:13.527", + "lastModified": "2025-03-26T15:16:13.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in designingmedia Hostiko allows Reflected XSS.This issue affects Hostiko: from n/a before 30.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/hostiko/vulnerability/wordpress-hostiko-theme-30-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27015.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27015.json new file mode 100644 index 00000000000..d4c1a73425e --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27015.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27015", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:13.683", + "lastModified": "2025-03-26T15:16:13.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in designingmedia Hostiko allows PHP Local File Inclusion.This issue affects Hostiko: from n/a before 30.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/hostiko/vulnerability/wordpress-hostiko-theme-30-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27267.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27267.json new file mode 100644 index 00000000000..d9c0b224d18 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27267.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27267", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:13.850", + "lastModified": "2025-03-26T15:16:13.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in srcoley Random Quotes allows Reflected XSS. This issue affects Random Quotes: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/random-quotes/vulnerability/wordpress-random-quotes-plugin-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27404.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27404.json new file mode 100644 index 00000000000..8b4e41632b1 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27404.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27404", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-26T15:16:14.000", + "lastModified": "2025-03-26T15:16:14.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.11.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.12.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-c6pg-h955-wf66", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27405.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27405.json new file mode 100644 index 00000000000..3268398fb92 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27405.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27405", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-26T16:15:22.983", + "lastModified": "2025-03-26T16:15:22.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.11.5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.12.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-3x37-fjc3-ch8w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27406.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27406.json new file mode 100644 index 00000000000..2f736f07a67 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27406.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27406", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-26T16:15:23.147", + "lastModified": "2025-03-26T16:15:23.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework Icinga Web 2. A vulnerability present in versions 0.10.0 through 1.0.2 allows to set up a template that allows to embed arbitrary Javascript. This enables the attacker to act on behalf of the user, if the template is being previewed; and act on behalf of the headless browser, if a report using the template is printed to PDF. This issue has been resolved in version 1.0.3 of Icinga Reporting. As a workaround, review all templates and remove suspicious settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Icinga/icingaweb2-module-reporting/releases/tag/v1.0.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icingaweb2-module-reporting/security/advisories/GHSA-7qvq-54vm-r7hx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json index 7142628f22a..cdb9548cc6a 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27553.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27553", "sourceIdentifier": "security@apache.org", "published": "2025-03-23T15:15:13.377", - "lastModified": "2025-03-24T14:15:18.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-26T15:22:59.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Relative Path Traversal vulnerability in Apache Commons VFS before 2.10.0.\n\nThe FileObject API in Commons VFS has a 'resolveFile' method that\ntakes a 'scope' parameter. Specifying 'NameScope.DESCENDENT' promises that \"an exception is thrown if the resolved file is not a descendent of\nthe base file\". However, when the path contains encoded \"..\"\ncharacters (for example, \"%2E%2E/bar.txt\"), it might return file objects that are not\na descendent of the base file, without throwing an exception.\nThis issue affects Apache Commons VFS: before 2.10.0.\n\nUsers are recommended to upgrade to version 2.10.0, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Path Traversal relativo en Apache Commons VFS anterior a la versi\u00f3n 2.10.0. La API FileObject de Commons VFS incluye un m\u00e9todo \"resolveFile\" que utiliza el par\u00e1metro \"scope\". Especificar \"NameScope.DESCENDENT\" implica que se lanzar\u00e1 una excepci\u00f3n si el archivo resuelto no es descendiente del archivo base. Sin embargo, si la ruta contiene caracteres \"..\" codificados (por ejemplo, \"%2E%2E/bar.txt\"), podr\u00eda devolver objetos de archivo que no son descendientes del archivo base, sin lanzar una excepci\u00f3n. Este problema afecta a Apache Commons VFS anterior a la versi\u00f3n 2.10.0. Se recomienda actualizar a la versi\u00f3n 2.10.0, que soluciona el problema." } ], "metrics": { @@ -47,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:commons_vfs:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.10.0", + "matchCriteriaId": "4BABF8CF-5800-484E-9B46-701503CA903B" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/cnzqowyw9r2pl263cylmxhnvh41hyjcb", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/03/23/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2783.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2783.json new file mode 100644 index 00000000000..2039b66f0aa --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2783.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-2783", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-03-26T16:15:23.693", + "lastModified": "2025-03-26T16:15:23.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/405143032", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28855.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28855.json new file mode 100644 index 00000000000..9b6807e98dd --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28855.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28855", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:14.167", + "lastModified": "2025-03-26T15:16:14.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Teleport allows Reflected XSS. This issue affects Teleport: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/teleport/vulnerability/wordpress-teleport-plugin-1-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28858.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28858.json new file mode 100644 index 00000000000..5823fcbea79 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28858.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28858", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:14.317", + "lastModified": "2025-03-26T15:16:14.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arrow Plugins Arrow Maps allows Reflected XSS. This issue affects Arrow Maps: from n/a through 1.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ap-google-maps/vulnerability/wordpress-arrow-maps-plugin-1-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28865.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28865.json new file mode 100644 index 00000000000..418e66d7d9b --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28865.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28865", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:14.460", + "lastModified": "2025-03-26T15:16:14.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in lionelroux WP Colorful Tag Cloud allows Reflected XSS. This issue affects WP Colorful Tag Cloud: from n/a through 2.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-colorful-tag-cloud/vulnerability/wordpress-wp-colorful-tag-cloud-plugin-2-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28869.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28869.json new file mode 100644 index 00000000000..b9f0869b7e5 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28869.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28869", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:14.617", + "lastModified": "2025-03-26T15:16:14.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound NextGEN Gallery Voting allows Reflected XSS. This issue affects NextGEN Gallery Voting: from n/a through 2.7.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/nextgen-gallery-voting/vulnerability/wordpress-nextgen-gallery-voting-plugin-2-7-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28873.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28873.json new file mode 100644 index 00000000000..59e35495175 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28873.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28873", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:14.767", + "lastModified": "2025-03-26T15:16:14.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Shuffle allows Blind SQL Injection. This issue affects Shuffle: from n/a through 0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shuffle/vulnerability/wordpress-shuffle-plugin-0-5-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28877.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28877.json new file mode 100644 index 00000000000..c4ba4d225a5 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28877.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28877", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:14.917", + "lastModified": "2025-03-26T15:16:14.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Key4ce osTicket Bridge allows Reflected XSS. This issue affects Key4ce osTicket Bridge: from n/a through 1.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/key4ce-osticket-bridge/vulnerability/wordpress-key4ce-osticket-bridge-plugin-1-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28880.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28880.json new file mode 100644 index 00000000000..ad0c9af4900 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28880.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28880", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:15.070", + "lastModified": "2025-03-26T15:16:15.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Blue Captcha allows Reflected XSS. This issue affects Blue Captcha: from n/a through 1.7.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/blue-captcha/vulnerability/wordpress-blue-captcha-plugin-1-7-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28882.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28882.json new file mode 100644 index 00000000000..01677c2d6a2 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28882.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28882", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:15.227", + "lastModified": "2025-03-26T15:16:15.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Omnify, Inc. Omnify allows Reflected XSS. This issue affects Omnify: from n/a through 2.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/omnify-widget/vulnerability/wordpress-omnify-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28885.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28885.json new file mode 100644 index 00000000000..ccfa76cf91f --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28885.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28885", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:15.380", + "lastModified": "2025-03-26T15:16:15.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Fiverr.com Official Search Box allows Stored XSS. This issue affects Fiverr.com Official Search Box: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fiverr-official-search-box/vulnerability/wordpress-fiverr-com-official-search-box-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28889.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28889.json new file mode 100644 index 00000000000..50c708ee59e --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28889.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28889", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:15.543", + "lastModified": "2025-03-26T15:16:15.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Custom Product Stickers for Woocommerce allows Reflected XSS. This issue affects Custom Product Stickers for Woocommerce: from n/a through 1.9.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-product-stickers-for-woocommerce/vulnerability/wordpress-custom-product-stickers-for-woocommerce-plugin-1-9-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28890.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28890.json new file mode 100644 index 00000000000..9a8da6f7e72 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28890.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28890", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:15.700", + "lastModified": "2025-03-26T15:16:15.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Lightview Plus allows Reflected XSS. This issue affects Lightview Plus: from n/a through 3.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lightview-plus/vulnerability/wordpress-lightview-plus-plugin-3-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28893.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28893.json new file mode 100644 index 00000000000..f7e5e414b13 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28893.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28893", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:15.873", + "lastModified": "2025-03-26T15:16:15.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Visual Text Editor allows Remote Code Inclusion. This issue affects Visual Text Editor: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/visual-text-editor/vulnerability/wordpress-visual-text-editor-plugin-1-2-1-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28898.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28898.json new file mode 100644 index 00000000000..e70a214b4ba --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28898.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28898", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.030", + "lastModified": "2025-03-26T15:16:16.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound WP Multistore Locator allows SQL Injection. This issue affects WP Multistore Locator: from n/a through 2.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-multi-store-locator/vulnerability/wordpress-wp-multistore-locator-plugin-2-5-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28899.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28899.json new file mode 100644 index 00000000000..2d83528adb4 --- /dev/null +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28899.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28899", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.190", + "lastModified": "2025-03-26T15:16:16.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Event Ticketing allows Reflected XSS. This issue affects WP Event Ticketing: from n/a through 1.3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpeventticketing/vulnerability/wordpress-wp-event-ticketing-plugin-1-3-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28903.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28903.json new file mode 100644 index 00000000000..6b6b02bdf56 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28903.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28903", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.340", + "lastModified": "2025-03-26T15:16:16.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Driving Directions allows Reflected XSS. This issue affects Driving Directions: from n/a through 1.4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ddirections/vulnerability/wordpress-driving-directions-plugin-1-4-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28911.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28911.json new file mode 100644 index 00000000000..f89f45b5ded --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28911.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28911", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.493", + "lastModified": "2025-03-26T15:16:16.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gravity2pdf Gravity 2 PDF allows Reflected XSS. This issue affects Gravity 2 PDF: from n/a through 3.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gf2pdf/vulnerability/wordpress-gravity-2-pdf-plugin-3-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28916.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28916.json new file mode 100644 index 00000000000..b152b0cc8a5 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28916.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28916", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.653", + "lastModified": "2025-03-26T15:16:16.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Docpro allows PHP Local File Inclusion. This issue affects Docpro: from n/a through 2.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/docpro/vulnerability/wordpress-docpro-plugin-2-0-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28917.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28917.json new file mode 100644 index 00000000000..dbdf756b5fc --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28917.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28917", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.803", + "lastModified": "2025-03-26T15:16:16.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Custom Smilies allows Stored XSS. This issue affects Custom Smilies: from n/a through 2.9.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-smilies-se/vulnerability/wordpress-custom-smilies-plugin-2-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28921.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28921.json new file mode 100644 index 00000000000..26e61470936 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28921.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28921", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:16.943", + "lastModified": "2025-03-26T15:16:16.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound SpatialMatch IDX allows Reflected XSS. This issue affects SpatialMatch IDX: from n/a through 3.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spatialmatch-free-lifestyle-search/vulnerability/wordpress-spatialmatch-idx-plugin-3-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28924.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28924.json new file mode 100644 index 00000000000..dba8713ea9e --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28924.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28924", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:17.100", + "lastModified": "2025-03-26T15:16:17.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ZenphotoPress allows Reflected XSS. This issue affects ZenphotoPress: from n/a through 1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/zenphotopress/vulnerability/wordpress-zenphotopress-plugin-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28928.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28928.json new file mode 100644 index 00000000000..802a4e2c0a4 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28928.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28928", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:17.307", + "lastModified": "2025-03-26T15:16:17.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sureshdsk Are you robot google recaptcha for wordpress allows Reflected XSS. This issue affects Are you robot google recaptcha for wordpress: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/are-you-robot-recaptcha/vulnerability/wordpress-are-you-robot-google-recaptcha-for-wordpress-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28934.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28934.json new file mode 100644 index 00000000000..e0d5bec5f1c --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28934.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28934", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:17.517", + "lastModified": "2025-03-26T15:16:17.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple Post Series allows Reflected XSS. This issue affects Simple Post Series: from n/a through 2.4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-post-series/vulnerability/wordpress-simple-post-series-plugin-2-4-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28935.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28935.json new file mode 100644 index 00000000000..f229c173063 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28935.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28935", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:17.727", + "lastModified": "2025-03-26T15:16:17.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in puzich Fancybox Plus allows Reflected XSS. This issue affects Fancybox Plus: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fancybox-plus/vulnerability/wordpress-fancybox-plus-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28939.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28939.json new file mode 100644 index 00000000000..6bd4158295e --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28939.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28939", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:17.923", + "lastModified": "2025-03-26T15:16:17.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound WP Google Calendar Manager allows Blind SQL Injection. This issue affects WP Google Calendar Manager: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-gcalendar/vulnerability/wordpress-wp-google-calendar-manager-plugin-2-1-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-289xx/CVE-2025-28942.json b/CVE-2025/CVE-2025-289xx/CVE-2025-28942.json new file mode 100644 index 00000000000..b4fc1d10ff9 --- /dev/null +++ b/CVE-2025/CVE-2025-289xx/CVE-2025-28942.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-28942", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:18.107", + "lastModified": "2025-03-26T15:16:18.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Trust Payments Trust Payments Gateway for WooCommerce allows SQL Injection. This issue affects Trust Payments Gateway for WooCommerce: from n/a through 1.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/trust-payments-hosted-payment-pages-integration/vulnerability/wordpress-trust-payments-gateway-for-woocommerce-plugin-1-1-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2819.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2819.json new file mode 100644 index 00000000000..f51471ca3ab --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2819", + "sourceIdentifier": "0beee27a-7d8c-424f-8e46-ac453fa147e6", + "published": "2025-03-26T15:16:21.970", + "lastModified": "2025-03-26T15:16:21.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a risk of unauthorized file uploads in GT-SoftControl and potential file overwrites due to insufficient validation in the file selection process. This could lead to data integrity issues and unauthorized access by an authenticated privileged user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0beee27a-7d8c-424f-8e46-ac453fa147e6", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "0beee27a-7d8c-424f-8e46-ac453fa147e6", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.bizerba.com/downloads/global/information-security/2025/bizerba-sa-2025-0001.pdf", + "source": "0beee27a-7d8c-424f-8e46-ac453fa147e6" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2820.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2820.json new file mode 100644 index 00000000000..95dd558978a --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2820.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2820", + "sourceIdentifier": "0beee27a-7d8c-424f-8e46-ac453fa147e6", + "published": "2025-03-26T15:16:22.167", + "lastModified": "2025-03-26T15:16:22.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated attacker can compromise the availability of the device via the network" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0beee27a-7d8c-424f-8e46-ac453fa147e6", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "0beee27a-7d8c-424f-8e46-ac453fa147e6", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.bizerba.com/downloads/global/information-security/2025/bizerba-sa-2025-0002.pdf", + "source": "0beee27a-7d8c-424f-8e46-ac453fa147e6" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json new file mode 100644 index 00000000000..195d661b08c --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2825.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2025-2825", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-03-26T16:15:23.883", + "lastModified": "2025-03-26T16:15:23.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that may result in unauthenticated access. Remote and unauthenticated HTTP requests to CrushFTP may allow attackers to gain unauthorized access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-next-js-cve-2025-29927/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.runzero.com/blog/crushftp/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29100.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29100.json index 28badb40719..45a7ef106c8 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29100.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29100.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29100", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T21:15:17.673", - "lastModified": "2025-03-24T21:15:17.673", + "lastModified": "2025-03-26T15:16:18.333", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda AC8 V16.03.34.06 is vulnerable to Buffer Overflow in the fromSetRouteStatic function via the parameter list." + }, + { + "lang": "es", + "value": "Tenda AC8 V16.03.34.06 es vulnerable al desbordamiento del b\u00fafer en la funci\u00f3n fromSetRouteStatic a trav\u00e9s de la lista de par\u00e1metros." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Raining-101/b2bd27d16cdca94d330150a8ead9caa8", @@ -20,6 +59,10 @@ { "url": "https://github.com/Raining-101/IOT_cve/blob/main/Tenda%20a8%20V16.03.34.06%20fromSetRouteStatic_stack_overflow.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Raining-101/IOT_cve/blob/main/Tenda%20a8%20V16.03.34.06%20fromSetRouteStatic_stack_overflow.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29135.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29135.json index 24774a7a240..f701667e9dc 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29135.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29135.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29135", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T21:15:17.787", - "lastModified": "2025-03-24T21:15:17.787", + "lastModified": "2025-03-26T15:16:20.343", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability in Tenda AC7 V15.03.06.44 allows a remote attacker to execute arbitrary code through a stack overflow attack using the security parameter of the formWifiBasicSet function." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en Tenda AC7 V15.03.06.44 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un ataque de desbordamiento de pila utilizando el par\u00e1metro de seguridad de la funci\u00f3n formWifiBasicSet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Raining-101/1651dd3901efdbb38d94a156a54bbc62", @@ -20,6 +59,10 @@ { "url": "https://github.com/Raining-101/IOT_cve/blob/main/a7_formWifiBasic_Setsecurity_stackoverflow.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Raining-101/IOT_cve/blob/main/a7_formWifiBasic_Setsecurity_stackoverflow.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29310.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29310.json index 9a97c06a5cd..d632dc00526 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29310.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29310.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29310", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T21:15:17.893", - "lastModified": "2025-03-24T21:15:17.893", + "lastModified": "2025-03-26T15:16:20.583", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in onos v2.7.0 allows attackers to trigger a packet deserialization problem when supplying a crafted LLDP packet. This vulnerability allows attackers to execute arbitrary commands or access network information." + }, + { + "lang": "es", + "value": "Un problema en onos v2.7.0 permite a los atacantes desencadenar un problema de deserializaci\u00f3n de paquetes al suministrar un paquete LLDP manipulado. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios o acceder a informaci\u00f3n de red." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Saber-Berserker/10c9d548b38fa988310d90b8314e3129.", diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29311.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29311.json index 234aaf5b5d7..bbe8ac22b80 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29311.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29311.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29311", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T21:15:18.003", - "lastModified": "2025-03-24T21:15:18.003", + "lastModified": "2025-03-26T15:16:20.817", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Limited secret space in LLDP packets used in onos v2.7.0 allows attackers to obtain the private key via a bruteforce attack. Attackers are able to leverage this vulnerability into creating crafted LLDP packets." + }, + { + "lang": "es", + "value": "El espacio secreto limitado en los paquetes LLDP utilizados en onos v2.7.0 permite a los atacantes obtener la clave privada mediante un ataque de fuerza bruta. Los atacantes pueden aprovechar esta vulnerabilidad para crear paquetes LLDP manipulados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Saber-Berserker/790f2a75ae482df3fd0fce569f30504a;", diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29312.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29312.json index f4a6419f75c..5150f996997 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29312.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29312.json @@ -2,20 +2,63 @@ "id": "CVE-2025-29312", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T21:15:18.113", - "lastModified": "2025-03-24T21:15:18.113", + "lastModified": "2025-03-26T15:16:21.063", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in onos v2.7.0 allows attackers to trigger unexpected behavior within a device connected to a legacy switch via changing the link type from indirect to direct." + }, + { + "lang": "es", + "value": "Un problema en onos v2.7.0 permite a los atacantes provocar un comportamiento inesperado dentro de un dispositivo conectado a un conmutador heredado al cambiar el tipo de enlace de indirecto a directo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Saber-Berserker/4e54c2aa70abab2b133ce2c2b7e91249", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/Saber-Berserker/4e54c2aa70abab2b133ce2c2b7e91249", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29315.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29315.json index 3b41b881ab6..f29083d0538 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29315.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29315.json @@ -2,20 +2,63 @@ "id": "CVE-2025-29315", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-24T21:15:18.440", - "lastModified": "2025-03-24T21:15:18.440", + "lastModified": "2025-03-26T15:16:21.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the Shiro-based RBAC (Role-based Access Control) mechanism of OpenDaylight Service Function Chaining (SFC) Subproject SFC Sodium-SR4 and below allows attackers to execute privileged operations via a crafted request." + }, + { + "lang": "es", + "value": "Un problema en el mecanismo RBAC (control de acceso basado en roles) basado en Shiro del subproyecto SFC Sodium-SR4 y anteriores de encadenamiento de funciones de servicio (SFC) de OpenDaylight permite a los atacantes ejecutar operaciones privilegiadas a trav\u00e9s de una solicitud manipulada espec\u00edficamente para ello." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.csdn.net/weixin_43959580/article/details/144794289", "source": "cve@mitre.org" + }, + { + "url": "https://blog.csdn.net/weixin_43959580/article/details/144794289", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30118.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30118.json index 00d87c6601b..7b04dcf2838 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30118.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30118.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30118", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-25T20:15:22.447", - "lastModified": "2025-03-25T20:15:22.447", + "lastModified": "2025-03-26T15:16:22.327", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered on the Audi Universal Traffic Recorder 2.88. It has Susceptibility to denial of service. It uses the same default credentials for all devices and does not implement proper multi-device authentication, allowing attackers to deny the owner access by occupying the only available connection. The SSID remains broadcast at all times, increasing exposure to potential attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://github.com/geo-chen/Audi/blob/main/README.md#finding-1---cve-2025-30118-audi-utr-susceptibility-to-dos", diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30524.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30524.json new file mode 100644 index 00000000000..8b92734c774 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30524.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30524", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-26T15:16:22.580", + "lastModified": "2025-03-26T15:16:22.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in origincode Product Catalog allows SQL Injection. This issue affects Product Catalog: from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/displayproduct/vulnerability/wordpress-product-catalog-plugin-1-0-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5000814ff88..d739bd9cf14 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-26T15:00:20.481078+00:00 +2025-03-26T17:00:19.995683+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-26T14:54:37.560000+00:00 +2025-03-26T16:46:35.783000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286607 +286693 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `86` -- [CVE-2022-39163](CVE-2022/CVE-2022-391xx/CVE-2022-39163.json) (`2025-03-26T14:15:20.793`) -- [CVE-2024-45351](CVE-2024/CVE-2024-453xx/CVE-2024-45351.json) (`2025-03-26T14:15:31.457`) -- [CVE-2025-2228](CVE-2025/CVE-2025-22xx/CVE-2025-2228.json) (`2025-03-26T13:15:36.373`) -- [CVE-2025-23203](CVE-2025/CVE-2025-232xx/CVE-2025-23203.json) (`2025-03-26T14:15:32.250`) -- [CVE-2025-24808](CVE-2025/CVE-2025-248xx/CVE-2025-24808.json) (`2025-03-26T14:15:32.417`) +- [CVE-2025-28858](CVE-2025/CVE-2025-288xx/CVE-2025-28858.json) (`2025-03-26T15:16:14.317`) +- [CVE-2025-28865](CVE-2025/CVE-2025-288xx/CVE-2025-28865.json) (`2025-03-26T15:16:14.460`) +- [CVE-2025-28869](CVE-2025/CVE-2025-288xx/CVE-2025-28869.json) (`2025-03-26T15:16:14.617`) +- [CVE-2025-28873](CVE-2025/CVE-2025-288xx/CVE-2025-28873.json) (`2025-03-26T15:16:14.767`) +- [CVE-2025-28877](CVE-2025/CVE-2025-288xx/CVE-2025-28877.json) (`2025-03-26T15:16:14.917`) +- [CVE-2025-28880](CVE-2025/CVE-2025-288xx/CVE-2025-28880.json) (`2025-03-26T15:16:15.070`) +- [CVE-2025-28882](CVE-2025/CVE-2025-288xx/CVE-2025-28882.json) (`2025-03-26T15:16:15.227`) +- [CVE-2025-28885](CVE-2025/CVE-2025-288xx/CVE-2025-28885.json) (`2025-03-26T15:16:15.380`) +- [CVE-2025-28889](CVE-2025/CVE-2025-288xx/CVE-2025-28889.json) (`2025-03-26T15:16:15.543`) +- [CVE-2025-28890](CVE-2025/CVE-2025-288xx/CVE-2025-28890.json) (`2025-03-26T15:16:15.700`) +- [CVE-2025-28893](CVE-2025/CVE-2025-288xx/CVE-2025-28893.json) (`2025-03-26T15:16:15.873`) +- [CVE-2025-28898](CVE-2025/CVE-2025-288xx/CVE-2025-28898.json) (`2025-03-26T15:16:16.030`) +- [CVE-2025-28899](CVE-2025/CVE-2025-288xx/CVE-2025-28899.json) (`2025-03-26T15:16:16.190`) +- [CVE-2025-28903](CVE-2025/CVE-2025-289xx/CVE-2025-28903.json) (`2025-03-26T15:16:16.340`) +- [CVE-2025-28911](CVE-2025/CVE-2025-289xx/CVE-2025-28911.json) (`2025-03-26T15:16:16.493`) +- [CVE-2025-28916](CVE-2025/CVE-2025-289xx/CVE-2025-28916.json) (`2025-03-26T15:16:16.653`) +- [CVE-2025-28917](CVE-2025/CVE-2025-289xx/CVE-2025-28917.json) (`2025-03-26T15:16:16.803`) +- [CVE-2025-28921](CVE-2025/CVE-2025-289xx/CVE-2025-28921.json) (`2025-03-26T15:16:16.943`) +- [CVE-2025-28924](CVE-2025/CVE-2025-289xx/CVE-2025-28924.json) (`2025-03-26T15:16:17.100`) +- [CVE-2025-28928](CVE-2025/CVE-2025-289xx/CVE-2025-28928.json) (`2025-03-26T15:16:17.307`) +- [CVE-2025-28934](CVE-2025/CVE-2025-289xx/CVE-2025-28934.json) (`2025-03-26T15:16:17.517`) +- [CVE-2025-28935](CVE-2025/CVE-2025-289xx/CVE-2025-28935.json) (`2025-03-26T15:16:17.727`) +- [CVE-2025-28939](CVE-2025/CVE-2025-289xx/CVE-2025-28939.json) (`2025-03-26T15:16:17.923`) +- [CVE-2025-28942](CVE-2025/CVE-2025-289xx/CVE-2025-28942.json) (`2025-03-26T15:16:18.107`) +- [CVE-2025-30524](CVE-2025/CVE-2025-305xx/CVE-2025-30524.json) (`2025-03-26T15:16:22.580`) ### CVEs modified in the last Commit -Recently modified CVEs: `76` +Recently modified CVEs: `102` -- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2025-03-26T14:15:31.660`) -- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-03-26T13:14:32.087`) -- [CVE-2025-25371](CVE-2025/CVE-2025-253xx/CVE-2025-25371.json) (`2025-03-26T14:15:32.570`) -- [CVE-2025-25372](CVE-2025/CVE-2025-253xx/CVE-2025-25372.json) (`2025-03-26T14:15:32.750`) -- [CVE-2025-25374](CVE-2025/CVE-2025-253xx/CVE-2025-25374.json) (`2025-03-26T14:15:32.930`) -- [CVE-2025-2654](CVE-2025/CVE-2025-26xx/CVE-2025-2654.json) (`2025-03-26T14:54:37.560`) -- [CVE-2025-2672](CVE-2025/CVE-2025-26xx/CVE-2025-2672.json) (`2025-03-26T14:37:30.087`) -- [CVE-2025-2673](CVE-2025/CVE-2025-26xx/CVE-2025-2673.json) (`2025-03-26T14:15:40.467`) -- [CVE-2025-2674](CVE-2025/CVE-2025-26xx/CVE-2025-2674.json) (`2025-03-26T14:09:08.730`) -- [CVE-2025-2675](CVE-2025/CVE-2025-26xx/CVE-2025-2675.json) (`2025-03-26T14:03:31.380`) -- [CVE-2025-2676](CVE-2025/CVE-2025-26xx/CVE-2025-2676.json) (`2025-03-26T13:55:26.630`) -- [CVE-2025-2677](CVE-2025/CVE-2025-26xx/CVE-2025-2677.json) (`2025-03-26T13:48:38.670`) -- [CVE-2025-2678](CVE-2025/CVE-2025-26xx/CVE-2025-2678.json) (`2025-03-26T13:42:31.437`) -- [CVE-2025-2679](CVE-2025/CVE-2025-26xx/CVE-2025-2679.json) (`2025-03-26T13:35:46.297`) -- [CVE-2025-2680](CVE-2025/CVE-2025-26xx/CVE-2025-2680.json) (`2025-03-26T13:23:41.867`) -- [CVE-2025-27830](CVE-2025/CVE-2025-278xx/CVE-2025-27830.json) (`2025-03-26T14:15:33.113`) -- [CVE-2025-27831](CVE-2025/CVE-2025-278xx/CVE-2025-27831.json) (`2025-03-26T14:15:33.290`) -- [CVE-2025-27832](CVE-2025/CVE-2025-278xx/CVE-2025-27832.json) (`2025-03-26T14:15:33.483`) -- [CVE-2025-27833](CVE-2025/CVE-2025-278xx/CVE-2025-27833.json) (`2025-03-26T14:15:33.680`) -- [CVE-2025-27834](CVE-2025/CVE-2025-278xx/CVE-2025-27834.json) (`2025-03-26T14:15:33.867`) -- [CVE-2025-27835](CVE-2025/CVE-2025-278xx/CVE-2025-27835.json) (`2025-03-26T14:15:34.057`) -- [CVE-2025-27836](CVE-2025/CVE-2025-278xx/CVE-2025-27836.json) (`2025-03-26T14:15:34.253`) -- [CVE-2025-27837](CVE-2025/CVE-2025-278xx/CVE-2025-27837.json) (`2025-03-26T14:15:34.440`) -- [CVE-2025-29806](CVE-2025/CVE-2025-298xx/CVE-2025-29806.json) (`2025-03-26T14:50:45.523`) -- [CVE-2025-30222](CVE-2025/CVE-2025-302xx/CVE-2025-30222.json) (`2025-03-26T14:15:34.817`) +- [CVE-2024-4149](CVE-2024/CVE-2024-41xx/CVE-2024-4149.json) (`2025-03-26T15:15:52.433`) +- [CVE-2024-41511](CVE-2024/CVE-2024-415xx/CVE-2024-41511.json) (`2025-03-26T15:15:51.120`) +- [CVE-2024-41564](CVE-2024/CVE-2024-415xx/CVE-2024-41564.json) (`2025-03-26T15:15:51.477`) +- [CVE-2024-42616](CVE-2024/CVE-2024-426xx/CVE-2024-42616.json) (`2025-03-26T15:15:51.890`) +- [CVE-2024-48818](CVE-2024/CVE-2024-488xx/CVE-2024-48818.json) (`2025-03-26T15:15:52.140`) +- [CVE-2024-55028](CVE-2024/CVE-2024-550xx/CVE-2024-55028.json) (`2025-03-26T15:15:52.693`) +- [CVE-2024-55030](CVE-2024/CVE-2024-550xx/CVE-2024-55030.json) (`2025-03-26T15:15:52.960`) +- [CVE-2024-7806](CVE-2024/CVE-2024-78xx/CVE-2024-7806.json) (`2025-03-26T16:46:35.783`) +- [CVE-2024-8021](CVE-2024/CVE-2024-80xx/CVE-2024-8021.json) (`2025-03-26T16:39:28.747`) +- [CVE-2024-8026](CVE-2024/CVE-2024-80xx/CVE-2024-8026.json) (`2025-03-26T16:26:39.410`) +- [CVE-2024-8053](CVE-2024/CVE-2024-80xx/CVE-2024-8053.json) (`2025-03-26T16:18:07.887`) +- [CVE-2024-8062](CVE-2024/CVE-2024-80xx/CVE-2024-8062.json) (`2025-03-26T16:10:51.357`) +- [CVE-2025-1413](CVE-2025/CVE-2025-14xx/CVE-2025-1413.json) (`2025-03-26T16:15:20.833`) +- [CVE-2025-24808](CVE-2025/CVE-2025-248xx/CVE-2025-24808.json) (`2025-03-26T15:16:07.630`) +- [CVE-2025-25373](CVE-2025/CVE-2025-253xx/CVE-2025-25373.json) (`2025-03-26T15:16:08.443`) +- [CVE-2025-2652](CVE-2025/CVE-2025-26xx/CVE-2025-2652.json) (`2025-03-26T15:16:11.270`) +- [CVE-2025-2691](CVE-2025/CVE-2025-26xx/CVE-2025-2691.json) (`2025-03-26T15:06:35.310`) +- [CVE-2025-27553](CVE-2025/CVE-2025-275xx/CVE-2025-27553.json) (`2025-03-26T15:22:59.280`) +- [CVE-2025-29100](CVE-2025/CVE-2025-291xx/CVE-2025-29100.json) (`2025-03-26T15:16:18.333`) +- [CVE-2025-29135](CVE-2025/CVE-2025-291xx/CVE-2025-29135.json) (`2025-03-26T15:16:20.343`) +- [CVE-2025-29310](CVE-2025/CVE-2025-293xx/CVE-2025-29310.json) (`2025-03-26T15:16:20.583`) +- [CVE-2025-29311](CVE-2025/CVE-2025-293xx/CVE-2025-29311.json) (`2025-03-26T15:16:20.817`) +- [CVE-2025-29312](CVE-2025/CVE-2025-293xx/CVE-2025-29312.json) (`2025-03-26T15:16:21.063`) +- [CVE-2025-29315](CVE-2025/CVE-2025-293xx/CVE-2025-29315.json) (`2025-03-26T15:16:21.323`) +- [CVE-2025-30118](CVE-2025/CVE-2025-301xx/CVE-2025-30118.json) (`2025-03-26T15:16:22.327`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4bf30d220b8..b9849edc6da 100644 --- a/_state.csv +++ b/_state.csv @@ -44266,7 +44266,7 @@ CVE-2010-2568,0,0,192dec62ced8fdffb33be9b22340651890b22fb5e568723a598f336264cd2f CVE-2010-2569,0,0,3fcc14fc9fd4127f3e62283c556f647e3bf90d3c09b9aad6c474cf0ce329997e,2024-11-21T01:16:55.423000 CVE-2010-2570,0,0,defd634aaf52e285feb09c26673c2bb653a0d1f5cc90ddebdb27d62098f073d8,2024-11-21T01:16:55.527000 CVE-2010-2571,0,0,8df54066b3ca2a146709bd05e0adc027ad74b233b1de20ae940d2478110f5cf0,2024-11-21T01:16:55.637000 -CVE-2010-2572,0,0,181cf824315766560e2fc25f56025ca13945a9ed76200ab5593864358eda1725,2025-02-10T19:15:30.363000 +CVE-2010-2572,0,1,c6fd90ae73671b46260ca0aa72d0565b31174a37486299cce6dd145ff13e3935,2025-03-26T16:18:53.810000 CVE-2010-2573,0,0,66bca0bf4246c3ef12da4fadc931aa0ee6203524cab88fa4042bf03240b40458,2024-11-21T01:16:55.843000 CVE-2010-2574,0,0,42ca530ffa0d07c442deb4c9e5813bdf1b6bfa5e4e9230645dc696f814b5cbe9,2024-11-21T01:16:55.953000 CVE-2010-2575,0,0,b8371893598bd6e2df34f6be45b922062f12d5fc52abc43c289f97fc21a05616,2024-11-21T01:16:56.110000 @@ -78888,7 +78888,7 @@ CVE-2015-5951,0,0,850406c33f1b641cd59954a2acc384a79f705354a6d956ed8aac39f067bf89 CVE-2015-5952,0,0,f62fdf52f4c3444f96f898ad22d3b0d9806c784df7cb555d0dec41a7323a13cb,2024-11-21T02:34:12.100000 CVE-2015-5953,0,0,8c0f935e9f8302715fd0a60bff5da3eee51231895c9f06b800b0e1fcb839cfd8,2024-11-21T02:34:12.247000 CVE-2015-5954,0,0,d0563a95068dc31a792c4ffdb6633357ceb3f30219a6f65c2f04b62d67c8118b,2024-11-21T02:34:12.397000 -CVE-2015-5955,0,0,31961f626cef482017691decefc39018287ed8fed908a2a6bdfecbf6d1b99b4c,2024-11-21T02:34:12.537000 +CVE-2015-5955,0,1,90f04a121cca53a71cf51227d8b79d4b2a17d843d0abd2804dde58cd2e54e202,2025-03-26T16:44:36.377000 CVE-2015-5956,0,0,04d7fd99e0396724fe2f327d274e9a510560aa25887dbf156de0db86f4620621,2024-11-21T02:34:12.680000 CVE-2015-5957,0,0,186a8280296c9240af3359e32b5c36d318e25811cd321e804d070f907b794b86,2024-11-21T02:34:12.837000 CVE-2015-5958,0,0,b2dbe3432de87ba6afaa0b4e48446f365911141040027fb29e596cc35d2d9827,2024-11-21T02:34:12.987000 @@ -110538,11 +110538,11 @@ CVE-2018-0794,0,0,a043a51f8878f1508b41146dc9c6fd6c57203ce8c27917364a8b7d31323b6b CVE-2018-0795,0,0,3662a3982cf234c6df64ce129bfe749cde15eaa9630400088ef26e1c084eafaa,2024-11-21T03:38:57.933000 CVE-2018-0796,0,0,ec9edd61603c9fabe2139b57fc2b1befabb7afb7cf86f9d79727146e15f53d0e,2024-11-21T03:38:58.060000 CVE-2018-0797,0,0,37103f1703cdff773ea7fa799b48ab22a1b0727ba34f485d895724d3ae29dd9b,2024-11-21T03:38:58.187000 -CVE-2018-0798,0,0,fa401c43b44f47c3f9d5f6ab0a5b7f619f43bd939f8abf37419bc08bcd15063c,2025-02-07T17:15:10.113000 +CVE-2018-0798,0,1,bd4f6be3b00a9f7572f01a59d27b8ae5ee784978927026d9f5918adab714a853,2025-03-26T16:18:18.910000 CVE-2018-0799,0,0,e011c432b14a75554a8236ef30de60a42c2bb5fe962d12a67a05a9f2b50e3bf3,2024-11-21T03:38:58.443000 CVE-2018-0800,0,0,d7fc3d81f1624b657a2e4a80ff2cc5f117a52bbde36571ed3721e0e20311d2f9,2024-11-21T03:38:58.570000 CVE-2018-0801,0,0,804eeb5e57f5ca050e18dc9d0a1428ff399456294764e4de9a0146a0d85067cd,2024-11-21T03:38:58.717000 -CVE-2018-0802,0,0,38bf5abe65ca3b09c9546e5b3a7e78e83321433a294cd36a11c81333a82fe833,2025-02-07T17:15:10.330000 +CVE-2018-0802,0,1,a53fef32faf1b394318ec9f3e016b0cf62c846762680ea62b2aa7c9ce2e88d6f,2025-03-26T16:16:43.773000 CVE-2018-0803,0,0,7897e6cf1190072824b408009bca86d00d9a5910da8156515326f62cc9881cac,2024-11-21T03:38:59 CVE-2018-0804,0,0,f177cca96d9da3a025f4b118327460bfdb67c890d9e6e413ca9fed376b7c5de0,2024-11-21T03:38:59.127000 CVE-2018-0805,0,0,f934ea36e7f22914d1c257c62ac0f2a778b1b425f20686a2a54abe05a664dd90,2024-11-21T03:38:59.250000 @@ -174030,7 +174030,7 @@ CVE-2021-29251,0,0,700a4cd398be0c57419b2b217839bcd6a94a502f1e4f7f474b80b6ff38b5c CVE-2021-29252,0,0,f0933777c0c308ee5a32296016bde2de20068463be1956359df32f9621933f4a,2024-11-21T06:00:53.360000 CVE-2021-29253,0,0,499506f2e55a033b98b72f9391b30cbef0e863f81c0b02f53d6f18adec3090f5,2024-11-21T06:00:53.517000 CVE-2021-29255,0,0,84eaa1ba67239640d08ddd9c0adcd36085d036b0ceea3a25401d8f796ff5d4a2,2024-11-21T06:00:53.663000 -CVE-2021-29256,0,0,2d283f2f4f23abdbd578b16f44de964846ca0d83bff94ab3bf0b6549077b51cd,2025-02-04T20:15:42.447000 +CVE-2021-29256,0,1,5dbd128763a837d353f5853b3cf5c51114ba2f1cade297f88f5d70ba59812f7c,2025-03-26T16:41:11.860000 CVE-2021-29258,0,0,ff5dce28ae45cc37ada5436c522c7ac162c4667f2444d65e714ea1d78101cb00,2024-11-21T06:00:53.947000 CVE-2021-29261,0,0,2d03fcac11a6cce4850192fcebf3bdf149eadf87d331563db474f354576ac7d8,2024-11-21T06:00:54.093000 CVE-2021-29262,0,0,6c6bb875bbfca8d93029fcd2400df89361ad81fa105fa03d75be4e4dfacb79e6,2024-11-21T06:00:54.250000 @@ -175921,9 +175921,9 @@ CVE-2021-31566,0,0,ceae3ebc0a2bdabb0e8d901f91062c868b4e74644c777432a2a1f47e3dbfa CVE-2021-31567,0,0,00d15572cff57a319b44f61ded37e9dc176e4e6677c5d44456432a7c43d47a29,2025-02-20T21:15:12.453000 CVE-2021-31571,0,0,856fcf34ab92e37ab5d243f2c37863f3b0df2b9b772b4661151fa45bb28d44c6,2024-11-21T06:05:55.500000 CVE-2021-31572,0,0,d5e3842a1b097ab007f528e19cc96abc71cc2f532b0aee723b7f11c9b42d078e,2024-11-21T06:05:55.653000 -CVE-2021-31573,0,0,76aa3f237adc2d4b8d9e7e653cf950038d291762ea7af09561b1aac3bf6aa06e,2024-11-21T06:05:55.817000 -CVE-2021-31574,0,0,88158c6467e86a92179bfd7a8945e979b7261b802f3716948660e337cccbf28e,2024-11-21T06:05:55.970000 -CVE-2021-31575,0,0,fe3980982656fbf15cb2e39ad0da72eca3705f39d6bcd7a42987f8beecc60151,2024-11-21T06:05:56.093000 +CVE-2021-31573,0,1,eb0808f397a1b8d01b0a1c9d26b0d08037bacc84c1415dcbe478de2e73a986ec,2025-03-26T15:15:36.763000 +CVE-2021-31574,0,1,f2f6e13274dbbfedba1d89372731175a6adecaaa8c605ee0b9cf9dfee740659c,2025-03-26T15:15:37.900000 +CVE-2021-31575,0,1,ce3117499ab0a41932adefd597b9233d3ce2d3baa59f8b7e0d69fb7613a46ae2,2025-03-26T16:15:14.620000 CVE-2021-31576,0,0,29cada0af190b5217b22d579cf235e35dd246f1eb3f06ec71c881d0ef39dd88f,2024-11-21T06:05:56.220000 CVE-2021-31577,0,0,4868d4186e028658ed0ad367412246103fbdf17da11350fe143617f55f1c8785,2024-11-21T06:05:56.340000 CVE-2021-31578,0,0,b8369d5c45d6db29bddb9cc7dc14cc9512f9308ad64f3b0de1e7093675dfe23b,2024-11-21T06:05:56.450000 @@ -180153,7 +180153,7 @@ CVE-2021-3737,0,0,7b016d457d1b1a122bc9a341d71abfdd837fd1891f06d75818a28d94160509 CVE-2021-37371,0,0,e4746bdfa851f61f814eedb8ee0efc38dfb3f9dc485b3f7bd6d55c4a1c26e2f5,2024-11-21T06:15:01.533000 CVE-2021-37372,0,0,c4dab1998925bf1ba0e162e0e506e64ed67d4ffbe70cf9691730ad7fc80be247,2024-11-21T06:15:01.717000 CVE-2021-37373,0,0,27a13fac0cb969e3582988aacd0e15d17a6da9bf3bed5fda2296347d43dae39f,2024-11-21T06:15:01.880000 -CVE-2021-37374,0,0,f41f9eed51fb92408ce2ff0609cc31e4086ec7ac2fbf89a5cdbc21f05af97f57,2024-11-21T06:15:02.040000 +CVE-2021-37374,0,1,07f1580c397450b142e4d687d9e481df132c7ad69ed5afaf565de95cae4e526f,2025-03-26T15:15:38.067000 CVE-2021-37375,0,0,2097ac47d2462f5cf9b69ef2d86dffd0b25d38a97631a7af554f5b9251c3a57b,2024-11-21T06:15:02.213000 CVE-2021-37376,0,0,4b63d3cb16f34257953cd766e707d52dea60a0f3dc9bbdfd458121673eca1d24,2024-11-21T06:15:02.380000 CVE-2021-37377,0,0,a10ce452ae3a71d5edab4ff1b4b453ebbf37bbfc9c47a397bca6e3cf0e4155b1,2024-11-21T06:15:02.557000 @@ -194906,7 +194906,7 @@ CVE-2022-25456,0,0,76aa7e7f5dd28587df646cc77cbfadbefe525fec826652c35d18a3f4cb8d3 CVE-2022-25457,0,0,c9707cb58248eefec67667c16dcc5880b46cb952fe188ad3e98617d8855d98ef,2024-11-21T06:52:13.217000 CVE-2022-25458,0,0,55968db6731a13dfdfd0eda071934dd1e3a7cb1a52ed9938b43b72d4ec459676,2024-11-21T06:52:13.350000 CVE-2022-25459,0,0,a9d69d8123da85d57fe95d0348120272f14b0c7288ae69f5eba47e3cfc19b3ec,2024-11-21T06:52:13.487000 -CVE-2022-2546,0,0,3562c05c63d60b95c53ea145299296d76372e51d7b8208475e67421721578c9d,2024-11-21T07:01:13.640000 +CVE-2022-2546,0,1,fdad170748e8eb06c8428bf37e874ef650f56073d77ec8ad1a65f20bd8860fea,2025-03-26T15:15:38.557000 CVE-2022-25460,0,0,a27e01643dc65628b92224f63562304bde658b6cf46fc5707b97453f26a38a00,2024-11-21T06:52:13.630000 CVE-2022-25461,0,0,f27933cab1ee9b0aec38b380e30dc0f29aedd245cd19c43fec9584129061a521,2024-11-21T06:52:13.760000 CVE-2022-25462,0,0,4c7a57526589590246440662c9ef8341788f0d709de1372671501cc1d65ea8cc,2024-11-21T06:52:13.890000 @@ -200815,7 +200815,7 @@ CVE-2022-32657,0,0,92a59844ba1f6889f47fe834cd2805914dc34600abc302ab5ebde95690fdf CVE-2022-32658,0,0,af5f2a45f2e2917e91c38ee902e1ae395cff0abd5a61a1311e10cf5aedbb0ee4,2024-11-21T07:06:49.923000 CVE-2022-32659,0,0,954a88be290df4192fd13017f18917958d208c998c6761e4f3eb302f0047c6eb,2024-11-21T07:06:50.060000 CVE-2022-3266,0,0,ee049acb478b0501d8811a62ad2e4fc339b513afcc1b2a141a074278b46f2dae,2024-11-21T07:19:10.563000 -CVE-2022-32663,0,0,ee84276173760c8134284e66d99b83a91636d7c8da7b29ad59ecbcfecc4a1bf8,2024-11-21T07:06:50.210000 +CVE-2022-32663,0,1,8be0330e81519d6bba4d5fbe26f046bc4475c8576cdd2bdd7751ea07b88dfe6d,2025-03-26T15:15:38.863000 CVE-2022-32664,0,0,3d56f7071a3d388450fdc4c4f15ebc92ba0e53e0c2319d71e2b4705d66a0fd54,2024-11-21T07:06:50.377000 CVE-2022-32665,0,0,9a7822ae090cc9cdcf8a2f7247ea6d6b58a4ca9b627e9ea47e43372512cb1c4f,2024-11-21T07:06:50.520000 CVE-2022-32666,0,0,fdcc1c8563566dcf00d7b55b6d46af57f5f8f2dab17866e54a2f7a88a3642fea,2024-11-21T07:06:50.657000 @@ -205525,7 +205525,7 @@ CVE-2022-38653,0,0,245bb8c9aa8f2ae4299c9f1747b362ad83aacdf916e9d9c5f67eb26baa402 CVE-2022-38654,0,0,2cccda3dde682099b9783517748129d7f34fa269281ad10361986a45e8913d26,2024-11-21T07:16:52.233000 CVE-2022-38655,0,0,ec7954400945ca232e0ddd2f78e2a890ef628d7288d4cab3b7f2368ce4863571,2024-11-21T07:16:52.390000 CVE-2022-38656,0,0,9969c33f07a47a3ebf924ea86ef69bfda74e6c65e80c6debe3dfc08177355232,2024-11-21T07:16:52.520000 -CVE-2022-38657,0,0,926dd610ed91d5d8935b8abe57d99c9a3923019f2cc77806a9cecc5dc3fd2cb7,2024-11-21T07:16:52.650000 +CVE-2022-38657,0,1,c811d80f9a3565d582a61b36a5eb1520d084c2b77edfa2735d3cc764284bc4f1,2025-03-26T15:15:39.237000 CVE-2022-38658,0,0,7fec71e08ebcb28acdbd33af16c5962ad189249daf69f62c9d0fae9a36b788ea,2024-11-21T07:16:52.777000 CVE-2022-38659,0,0,3c4c7ada7c8331675426d8c943bf1478b882da00fa63c088203946a32b296485,2024-11-21T07:16:52.910000 CVE-2022-3866,0,0,3d970fd80f6c1be267c4c8388bb1f4b67e77a430b208ca935a260ec59b874a6f,2024-11-21T07:20:23.823000 @@ -205544,20 +205544,20 @@ CVE-2022-38670,0,0,5f7b07806008480e6849e1ba71ce47e086f1a36c384caaa82a8eb0293bc57 CVE-2022-38671,0,0,00da45e5c9b95a09e97a362533fa83a7e4f8b66f5c7576c2da38712da2c03919,2024-11-21T07:16:54.497000 CVE-2022-38672,0,0,c5e6818f94ccf4dbda30954e70ecb74d737bd066051d8c00b7c93378fb0823fd,2024-11-21T07:16:54.623000 CVE-2022-38673,0,0,bb33c22991ec8d586e95b59015be7f8034faa0fad6446d3cc65a263e457751bb,2024-11-21T07:16:54.757000 -CVE-2022-38674,0,1,e541318932853ebf29d808458e033d00751466e660d106780dc82f1a0bbbee30,2025-03-26T14:15:17.500000 -CVE-2022-38675,0,1,da5214fa08a9b851b0507043b84b2b232e1b36f0fa398eed2d5465bb88a8d2d3,2025-03-26T14:15:20.040000 +CVE-2022-38674,0,0,e541318932853ebf29d808458e033d00751466e660d106780dc82f1a0bbbee30,2025-03-26T14:15:17.500000 +CVE-2022-38675,0,0,da5214fa08a9b851b0507043b84b2b232e1b36f0fa398eed2d5465bb88a8d2d3,2025-03-26T14:15:20.040000 CVE-2022-38676,0,0,c1f86350f1959e1ec6aae69beb2dca62d098c4d6f36fb6ee2a979f1ae98dc6e9,2024-11-21T07:16:55.140000 CVE-2022-38677,0,0,45e5130a06b34d8b4608a6f384a5d6ab0d1220eac163ae219448b1d8eb132509,2024-11-21T07:16:55.270000 CVE-2022-38678,0,0,fcaea2dadc6004c49696084fd0eb919c69612acd0c70841b4191bf93c7ad5ad9,2024-11-21T07:16:55.393000 CVE-2022-38679,0,0,30554966cf7b361a82706593e65f2dc51b7b5e625b9417e785a7e31204ca22fe,2024-11-21T07:16:55.537000 CVE-2022-3868,0,0,36a3001c5865c0f61622978d5fd7c76f7571b4109d9ffde231eed0250308f612,2024-11-21T07:20:24.093000 -CVE-2022-38680,0,1,391285d54aa3d2099c05191de903328c164eaf11369e5752e9d9f25ce8c1de75,2025-03-26T14:15:20.263000 +CVE-2022-38680,0,0,391285d54aa3d2099c05191de903328c164eaf11369e5752e9d9f25ce8c1de75,2025-03-26T14:15:20.263000 CVE-2022-38681,0,0,f6ca4866804420d0840e8e3c0e3fcd1b880332ecb402f7b74717d66c8aafe1fd,2024-11-21T07:16:55.793000 CVE-2022-38682,0,0,d014c0128122867e4b8b4ffb9f4bd2346427fd64d3a70f17c446edd1f10314bf,2024-11-21T07:16:55.923000 CVE-2022-38683,0,0,6c4b1b4fcaebdbe8e527e6b89dddadb02d73e139d5c3924c3c8bb0346c1dd7b7,2024-11-21T07:16:56.050000 CVE-2022-38684,0,0,c287ed02d4a082132c36b6f7b98277a0bed22f7da4ad3013adf95c4d95e12eed,2024-11-21T07:16:56.180000 CVE-2022-38685,0,0,fada6ef48db08863f3191f4a2c1ffd1739b0dbde06b9dc2a8727c3483490d8aa,2024-11-21T07:16:56.303000 -CVE-2022-38686,0,0,fa044e522da29aa540d1adddeb056f4b6f4a8529ddb67964b85161ff51c8124d,2024-11-21T07:16:56.437000 +CVE-2022-38686,0,1,3d1c432f0b752dc5a708896c0f6c6270ce50942a0459b7c54992181e0a30ac6d,2025-03-26T15:15:39.427000 CVE-2022-38687,0,0,86b3a81c51e373666439a725ea783c70c1f6c71b370595d9e36618346863a098,2024-11-21T07:16:56.557000 CVE-2022-38688,0,0,b0931bd4f3bd7b0f93dd6742635266008b9a9ec248f9ce2fc20c3bb6ecadc473,2024-11-21T07:16:56.680000 CVE-2022-38689,0,0,a3f1b47b0dfaf0d7f7b847008ad900ba0838c198a5019baa87577f7f37156a7b,2024-11-21T07:16:56.807000 @@ -205936,7 +205936,7 @@ CVE-2022-39159,0,0,9bab48ae0c7ec6d829fcebbd383c88265471d1b8930e73570a0438b68d4ee CVE-2022-3916,0,0,4aca84e566526af675a57765ef3d1d206a38f133fdf84532ec163834cff42294,2024-11-21T07:20:31.480000 CVE-2022-39160,0,0,e1c05f7218e8e8c347b91de7f55a473fd143199ecd24c9add0e4d0df07948ae7,2024-11-21T07:17:41.700000 CVE-2022-39161,0,0,374db153ea4a7818f93713bd5ddf1964b7dab3b6fb9e2bcd84c5b50b129436ed,2024-11-21T07:17:41.823000 -CVE-2022-39163,1,1,9bfad7812d7fd9be5c5e01267a9e31066d85a677f28ee143424a79620a02b9ac,2025-03-26T14:15:20.793000 +CVE-2022-39163,0,0,9bfad7812d7fd9be5c5e01267a9e31066d85a677f28ee143424a79620a02b9ac,2025-03-26T14:15:20.793000 CVE-2022-39164,0,0,910c2790ec8cc2e31e30c18869d1a9b96cc73805e1c939b688a6b0f694e0332b,2024-11-21T07:17:41.963000 CVE-2022-39165,0,0,eb42fbb702d7c8841cd5ed9b6b61d837644be9416d74e6640b40197ec0d8edd5,2024-11-21T07:17:42.097000 CVE-2022-39166,0,0,c00a1e6b7adee19072cf36acc9786c3a6960ebaac27b755287ac7dc95805c61a,2024-11-21T07:17:42.233000 @@ -208677,7 +208677,7 @@ CVE-2022-4278,0,0,a4d7b958a15731e9c30235f55bf2c829422e2db228f6933a3096155e2a98ff CVE-2022-42780,0,0,fceb96d53b95b3171d97f0a829778e2bd82b0c6cbd6ea32e9239833075bc79bc,2024-11-21T07:25:19.600000 CVE-2022-42781,0,0,500610f19396de408f4223afa5c9b25ce5c2d03b4309053122ec52ceeeedce9b,2024-11-21T07:25:19.727000 CVE-2022-42782,0,0,20cab44664f2494adb526f4c9a977e571164d07914ee0770e5074e10b9e6ac9f,2024-11-21T07:25:19.860000 -CVE-2022-42783,0,0,d69ce3d44f70ececc4fa3e5254ac5d02a97d70d24c1c781e584a726a08f1dc7d,2024-11-21T07:25:19.997000 +CVE-2022-42783,0,1,d980e96fbf94fff232050dba2f3315e7f7e7a501f561b7e2ae4f85889d99b0f9,2025-03-26T15:15:39.733000 CVE-2022-42784,0,0,95784a8d2cf1379cdcd11f5f9edd72443ea4f59abf0f300883b3ac3e45f78a04,2024-11-21T07:25:20.120000 CVE-2022-42785,0,0,9cc900ff1c98874fc2a49f7f1713ed5d7a961acc20ee844067ebb715904e2169,2024-11-21T07:25:20.317000 CVE-2022-42786,0,0,761c233f470adaa56fb1e203572349871f3c07458d516ea4b0c3a11e4fd2ac1d,2024-11-21T07:25:20.490000 @@ -208834,8 +208834,8 @@ CVE-2022-42947,0,0,cc1c615fc0f3f4cb7830c716c2ffa54b12b7dcb04bf0dea4f27cee8fc5a4f CVE-2022-42948,0,0,bc162c9d27c19d3d222508b9c51e1ae06585c13a85fa9e4510b6807401a58fa5,2025-02-07T14:53:43.630000 CVE-2022-42949,0,0,33394d4aeb0aa484f80ff643457959f66bf9c81fd9ae0c6d1e40c8dfacab8f0b,2024-11-21T07:25:40.050000 CVE-2022-4295,0,0,c4a101447ebb7f7b37118bbe688156dd6665cd3db754bc8da6ce671825797aa0,2024-11-21T07:34:57.627000 -CVE-2022-42950,0,0,3665b747607f746305d0879f4c555c4b3d3722d692c3f8df972f021700deb573,2024-11-21T07:25:40.207000 -CVE-2022-42951,0,0,55af88a1d6e9a493e689ffb313fad92ef100ea25079ccd3515c4039c672aa2eb,2024-11-21T07:25:40.390000 +CVE-2022-42950,0,1,20d4082bffbc77fa3560921770930640b675e908f7bc2394264650dd258e0603,2025-03-26T15:15:39.937000 +CVE-2022-42951,0,1,1c030da7f5ff30312033b2bc3d23eeed5ac1b7e402a7fea4ff36f2ef213b6a3f,2025-03-26T15:15:40.167000 CVE-2022-42953,0,0,c243fef1d09f673431d6c6b4d7dc71e695be61ae51155a9a568a6790e6e595d1,2024-11-21T07:25:40.550000 CVE-2022-42954,0,0,097f447b99a7c952c456fbd966423e13cf9fa75d291e4dea19788279138e2e32,2024-11-21T07:25:40.733000 CVE-2022-42955,0,0,17fb1ae49670698a4e8adcb5ca942fc742f29fd42100c8f53f2777ea4e43ec26,2024-11-21T07:25:40.903000 @@ -209824,8 +209824,8 @@ CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d51435 CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000 CVE-2022-44263,0,0,eb1ea19f57630d7b2deb794291a98f3ba2732dd30ede9bdd52273b0a9535922b,2024-11-21T07:27:48.710000 CVE-2022-44264,0,0,ff41db97a4ad8ea2d26871baab291726199d73710c392156f6e453ae2d9a2000,2024-11-21T07:27:48.857000 -CVE-2022-44267,0,0,d5e41f11d97cfd207a2d66dde2d4140c871a736c56921b087258c2a219957df7,2024-11-21T07:27:49 -CVE-2022-44268,0,0,1f1f09e54ae65e27cc27a65a3b66ab2a3fbbb837ac04e0e9109e4a1874e98c8b,2024-11-21T07:27:49.170000 +CVE-2022-44267,0,1,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000 +CVE-2022-44268,0,1,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000 CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000 CVE-2022-44276,0,0,9873716515ec4fa50e073fda987b7d10a38ef2998e1c36de7d4ade38c66f0b44,2024-11-21T07:27:49.347000 CVE-2022-44277,0,0,b2cfd5bc26616cb3e456243fb8c0e0bce6a8160e7ee9607d2467bde4f1db0de1,2024-11-21T07:27:49.523000 @@ -209862,7 +209862,7 @@ CVE-2022-44320,0,0,4a818f66a5b06f0a76d4435c4ee8e6f9ac7fdd5b3813c26d143f777cf241e CVE-2022-44321,0,0,57f8f5a061d153a272fbdd0541de039407623ee7df3339fc5aa2c5a65b4c996d,2024-11-21T07:27:53.590000 CVE-2022-4433,0,0,75b9aa23ac6f3f36967876623eae1e95b7f973744795563285e35e943f439c8a,2024-11-21T07:35:15.170000 CVE-2022-4434,0,0,10e1fbbac279ba1398eae57bb0e90c0ed5f9b58f3e102f4c5eec3656df2b632c,2024-11-21T07:35:15.297000 -CVE-2022-44343,0,0,99ca09976e1c37c7cb1100319cc8edbb996055360040e59f84766b480df634b3,2024-11-21T07:27:53.743000 +CVE-2022-44343,0,1,fa3820db6742bae63165ce4dc94768ba45786dc578308380594374c0422abe04,2025-03-26T15:15:40.970000 CVE-2022-44345,0,0,d8da4a255353a8232353a2ab1ca5d7e5d3f3431f394aa006b2c35a72e48a37b2,2024-11-21T07:27:53.890000 CVE-2022-44347,0,0,ea467fc0a7372b54a667a9de9b8fea97283968d8cfd2bbf5512425bbf74ef4f1,2024-11-21T07:27:54.023000 CVE-2022-44348,0,0,0d91e1e433a20aa465bba499dd996ec291104cd327d27d5cc56dbd35f3020a5f,2024-11-21T07:27:54.167000 @@ -209938,8 +209938,8 @@ CVE-2022-44443,0,0,a05afab2a67ff8ae0c921e66ecfb678d555be037d19b899932969fad4b4ac CVE-2022-44444,0,0,35d79adf7f2a820e18b974141331feba04c2522fdbf1495dc6e20f9e4d2567b9,2024-11-21T07:28:02.133000 CVE-2022-44445,0,0,98b818cfddd55fc9df9ba4c703b45f167d40aae539ac36145317228fd2518d46,2024-11-21T07:28:02.257000 CVE-2022-44446,0,0,b87a075bc11c7bf7879be2b7a0deec8816fbc0db0e5e2cd310c423a22e703df2,2024-11-21T07:28:02.377000 -CVE-2022-44447,0,1,b839b4dbd02b0303d1275d5549321f022cdc6a4738ce0f7eb511d56ba2bbd59a,2025-03-26T14:15:21.223000 -CVE-2022-44448,0,0,51991eac5e2bfcde5967a5669578093a73799e3adf2470b634b8c3a9bb0d6931,2024-11-21T07:28:02.607000 +CVE-2022-44447,0,0,b839b4dbd02b0303d1275d5549321f022cdc6a4738ce0f7eb511d56ba2bbd59a,2025-03-26T14:15:21.223000 +CVE-2022-44448,0,1,5a44cb58cef9d74b031519925c5080e3e52b6a6f9a9184eecd96b9c4ad9f61d9,2025-03-26T15:15:41.187000 CVE-2022-44449,0,0,f001641190f0af734eea3fea990f3ff8177ef18a9d61cb293b8fb9b09bf446fd,2024-11-21T07:28:02.723000 CVE-2022-4445,0,0,cedca36b9b879b049e03157ad890d2870ba90bb1afe63e410a0ea538ec3aa62a,2025-03-21T15:15:38.497000 CVE-2022-44451,0,0,88ff513a50262d6c08f63eeb08dcc8ac12e57100481f0cda5bace6b6ce4ed782,2024-11-21T07:28:02.837000 @@ -210039,7 +210039,7 @@ CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67bedd CVE-2022-44587,0,0,6dfaf7b30b3dd518c8baa1531cd49f4d347ed0a847d046b7fe56358fb870412e,2024-11-21T07:28:10.493000 CVE-2022-44588,0,0,c7175322edd9d7ad433ad5234e758084af6f5b6df1c9a6080b20d6e871b59b23,2024-11-21T07:28:10.627000 CVE-2022-44589,0,0,3c2bd6a31443e7ed33d7d7972f625159cb717f110556afbf06ac8d96a6a3039c,2024-11-21T07:28:10.743000 -CVE-2022-4459,0,1,a0d0ba41de33702ec70b3020ba12862d1aba8958f239c1aa62798e7c0d3d44b5,2025-03-26T14:15:25.590000 +CVE-2022-4459,0,0,a0d0ba41de33702ec70b3020ba12862d1aba8958f239c1aa62798e7c0d3d44b5,2025-03-26T14:15:25.590000 CVE-2022-44590,0,0,8419b28e3a0fb49ed6ee057d9814f15968322a8d49125a15e7831fc76db33c2f,2024-11-21T07:28:10.877000 CVE-2022-44591,0,0,c847c79694e4ea0add459ff62a58817005ae0ba77ef3c55979619aef08bd2f9a,2024-11-21T07:28:11 CVE-2022-44593,0,0,90f8ad45672b1e43741913eaec2f22fe4107cda8646e72a10d74cce24b42f4d1,2024-11-21T07:28:11.120000 @@ -210643,7 +210643,7 @@ CVE-2022-45491,0,0,1b6a471b640d79b2290aa9ffb27677c7deb36ff7c0b1053463ac5aa1c23cb CVE-2022-45492,0,0,be61a73bebc11dc54d2ce18380eae1e1f4a3a0f74e909c36e1621302822298e7,2024-11-21T07:29:20.193000 CVE-2022-45493,0,0,88355351e568c54fca58a7d3eb129da7a9bbac3b38822108e44035efba5db975,2024-11-21T07:29:20.327000 CVE-2022-45494,0,0,586bc1e1d79c80b0dd0d2b296b10b5249bbc11ee700340b7b6639ecd6ee9b021,2024-11-21T07:29:20.453000 -CVE-2022-45496,0,0,a7f53391ae87e391af358b796165d253b593d0e842584dc797f7ea43b915b5c6,2024-11-21T07:29:20.600000 +CVE-2022-45496,0,1,7a7d209dfa778c61885ce8b532b335ba94289eab971efead0348075058f7d5f3,2025-03-26T16:15:15.743000 CVE-2022-45497,0,0,39dfe8eef99e8d3c410610743a5d8278a9861cc90b9b95aa616a7f2df09a5abc,2024-11-21T07:29:20.730000 CVE-2022-45498,0,0,8515281443317ef9de343bce9fddd4918576238ffbb7e875eba96a93c7c23145,2024-11-21T07:29:20.863000 CVE-2022-45499,0,0,2938830f52bc9947239a0b1681ba169666ebce48e47d14009cb80aa205bbfe4f,2024-11-21T07:29:20.993000 @@ -210706,7 +210706,7 @@ CVE-2022-4558,0,0,f970fd3928efea1b5554441e3c916d6a6fb91be99fd3c95ebcc40ad27c610f CVE-2022-45582,0,0,fb6a5aed09df447052c1080f0f3ca25b9f4b331d8aa159276f71f5084b3a6430,2024-11-21T07:29:27.527000 CVE-2022-45586,0,0,041fa1f98c0e1032e8b0aafdc00e59807da3284dce298c31ebac48655500539e,2025-03-19T18:15:18.210000 CVE-2022-45587,0,0,731ab094c4fb5d3f2a6aaa031bb360b562e520d91c461801d15198f9701e2885,2025-03-19T18:15:18.393000 -CVE-2022-45588,0,0,f651447f5e5fc174047e99ac9407f3993e7874c1df7eb94c69df3555d1053d88,2024-11-21T07:29:27.947000 +CVE-2022-45588,0,1,f73a9d164d884c9e184c23e9f1b2caf4962f54ec2e689bf695f72ed05e415809,2025-03-26T16:15:15.993000 CVE-2022-45589,0,0,d2cbd0b21cc854599a5bf98b4bf9fd15aa327385b3261b879e672caf3293e319,2024-11-21T07:29:28.097000 CVE-2022-4559,0,0,3edd289e50a04a6ce45932a9d361eae123cc1d9b5b3d9fadc6d754bcc210ceee,2024-11-21T07:35:29.397000 CVE-2022-45597,0,0,0a63846daabfdbe9d684b85a7b644ab1ceee9656440de011a6048cda3954416e,2024-11-21T07:29:28.240000 @@ -210812,7 +210812,7 @@ CVE-2022-45760,0,0,0d1a8eb90e8eb8d3f74e550a85785935ddd25217edeabe6882dc4db9e32c1 CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc85cf,2025-03-24T18:15:16.197000 CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000 CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000 -CVE-2022-4577,0,1,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000 +CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000 CVE-2022-45770,0,0,02dc41d193d36a9bfc8460eb7435feb6273b7b9f86afc53f0e593727eb5aae1a,2024-11-21T07:29:41.203000 CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000 CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000 @@ -210820,7 +210820,7 @@ CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e57 CVE-2022-45781,0,0,af5875681fe2ee1d5531c6d8ee1f3bdb8a6d138970efb5e8ab0f5142c741d481,2024-11-21T07:29:41.657000 CVE-2022-45782,0,0,edab3a553726f0ee865b05fc85e092ff1fd62cca5d7ff093b6e09fd4c8f95a45,2024-11-21T07:29:41.917000 CVE-2022-45783,0,0,99caa90c0c796a457e24fd66341035568c722235e187a3c980a405731656f189,2024-11-21T07:29:42.700000 -CVE-2022-45786,0,1,eceab8889b7edb80c20ab4c9d9104ec72f95bf0abb8fe81c682a71a69b413d30,2025-03-26T14:15:21.453000 +CVE-2022-45786,0,0,eceab8889b7edb80c20ab4c9d9104ec72f95bf0abb8fe81c682a71a69b413d30,2025-03-26T14:15:21.453000 CVE-2022-45787,0,0,6e575959d3d8da9988e1c9ac769f974584e450a6f0905326025a6c024c86b8bb,2024-11-21T07:29:42.970000 CVE-2022-45788,0,0,f6f79d223f38261b7ad2add378e194245959512d8efa61388e7752de75a0700d,2024-11-21T07:29:43.093000 CVE-2022-45789,0,0,430fa15832d387a29a0389562bd6681c71542a481cef59c3138e1404448b57c3,2024-11-21T07:29:43.287000 @@ -211519,7 +211519,7 @@ CVE-2022-4673,0,0,ae81b2d3725dffbb1142722b47d0f8c8c70b094a6f67b615dbce9278734323 CVE-2022-46732,0,0,e14127d804f025884e831ca46adc0de908f852d85b8e4a9e57ee145c2f969bd3,2025-01-17T22:15:27.260000 CVE-2022-46733,0,0,dab6a16ba7aa13baea3e43ae318c71e03ced958ebc4b4f9863afc731ab25e4c2,2024-11-21T07:30:59.350000 CVE-2022-46738,0,0,2bc8d3136674cbb74669d235a37a0dadd4f4f38eb64d7bbc723615e5d78bd0d6,2024-11-21T07:30:59.470000 -CVE-2022-4674,0,1,413cbada43c93f23a08c4a8e3d11800e6b067b16197ad6b531b1a528befa64a5,2025-03-26T14:15:25.987000 +CVE-2022-4674,0,0,413cbada43c93f23a08c4a8e3d11800e6b067b16197ad6b531b1a528befa64a5,2025-03-26T14:15:25.987000 CVE-2022-46740,0,0,f5eb759dc52fd36b093e5cabdeed4634e385cb9adaf5f29545728efff1878ccb,2024-11-21T07:30:59.613000 CVE-2022-46741,0,0,dc84b3b96f86b2345d118c63c373a240ac715179dfb5a0744bbe369531b3f27f,2024-11-21T07:30:59.727000 CVE-2022-46742,0,0,7b90f148a7d1ba066a0951b401c337c5055bca6c5a559eba16b90f6d52c77043,2024-11-21T07:30:59.863000 @@ -211751,7 +211751,7 @@ CVE-2022-4706,0,0,8fc3eb852157cf8500c77c3bd8b4c5a09af8c4d3b1cd462432b279f46367b3 CVE-2022-47065,0,0,d69fa9c662e27b8051fa357dbdd60aaeec4cfdf244d81d98f0bb37fbbfe7f3db,2024-11-21T07:31:27.260000 CVE-2022-47069,0,0,887e07d320710c6167b3c59bd07316c092363ca104ad56f467df3d84b60a7261,2024-11-21T07:31:27.490000 CVE-2022-4707,0,0,46965d8b08213adfd9a2fb7aba5eb37b104a9152a1b11cab9a99b52a01e22755,2024-11-21T07:35:46.480000 -CVE-2022-47070,0,0,71c8bcc6578714c3144a038254a7dc271b96363a1f21388701be9e04a61ae255,2024-11-21T07:31:27.630000 +CVE-2022-47070,0,1,ba5534a61ec2dbb7bfa0e2f61a37aee01ea2583f06ce4fcd412181fa3aa384a1,2025-03-26T16:15:16.247000 CVE-2022-47071,0,0,624d31c53a450474697f97b0ab9f7e502dd1abe95ebcceda2a0f3fe76bd81f51,2024-11-21T07:31:27.783000 CVE-2022-47072,0,0,36e706d3d20207b8800cdc3631c0ccbb74ffcd6e2a15d9b3c507223942950358,2024-11-21T07:31:27.933000 CVE-2022-47073,0,0,e3bc043ad438f7485ae3de916ae242b5d27d53be299b3c61b0cee4417d090e01,2024-11-21T07:31:28.107000 @@ -211792,8 +211792,8 @@ CVE-2022-47126,0,0,6bd8779361f57d888b6cbdcf041bcc5a753f877ad3c0b8eab4ca47261f611 CVE-2022-47127,0,0,7f3ddef080230aefa5fb7534e489e5c7ae2a0de3a449397f60fec48d88807fa9,2024-11-21T07:31:32.603000 CVE-2022-47128,0,0,1c75f578da3d63eba054764bcb40de25ddf5478d90329293e0999c80cdd0e217,2024-11-21T07:31:32.770000 CVE-2022-47129,0,0,4c652cd2ffce48967a8cd7325eaea2ecc348166e165c9e28455b5502b2b2a42f,2025-01-27T17:15:09.930000 -CVE-2022-47130,0,0,bd56e88146459760481d0502621f086dae384eadd306a52993ae9e272ff2d776,2024-11-21T07:31:33.110000 -CVE-2022-47131,0,0,500afffdcc5849eb67e594b4d12078b5df9061108737a421b248eadc5474d012,2024-11-21T07:31:33.287000 +CVE-2022-47130,0,1,0bd1f049a2ebd046764e64c6dd0779931b0d3a0cdfb12ebae8ed95b7ebb22031,2025-03-26T16:15:16.503000 +CVE-2022-47131,0,1,f0c68dd5e6cef3f453e387e2e5cf39b675ec9ed490fad11cf46910723f44df7e,2025-03-26T16:15:16.770000 CVE-2022-47132,0,0,0f9fdbceae624fe6ed848fd9cb9e9074b08d178eeca3f87a64b4af7c157e084d,2024-11-21T07:31:33.443000 CVE-2022-47134,0,0,f825899acc17a387cb8b7ca5e538376c25d71f85b6ff4b549726b723c43b8ad4,2024-11-21T07:31:33.593000 CVE-2022-47135,0,0,bbaa567e223ee5f5929899202d46908c4270ea357a5257374951a8a6fca561f5,2024-11-21T07:31:33.727000 @@ -211885,17 +211885,17 @@ CVE-2022-47317,0,0,d9724359768c15574132313c4a84b168e35c7343bca9dcbfa87b74d2e26fc CVE-2022-47318,0,0,6af24138340e04880329b9f14f40723787d0603024b12cd139a68d8481f6e4bd,2024-11-21T07:31:42.667000 CVE-2022-4732,0,0,d61af37a48fcd1f254824b115234b3b8f90d333756f2dbed0b10c4d23f4be705,2024-11-21T07:35:49.963000 CVE-2022-47320,0,0,cc1f62cb6ccfb756737fc0b3dfb4985e2c045a2b2a52c0b7e3b779e1d9facda3,2024-11-21T07:31:42.807000 -CVE-2022-47322,0,0,d87ac8b158f58d19c0a8e2c2b1cff781aa6d51642d3caa9a23f10994a0ee161d,2024-11-21T07:31:42.970000 -CVE-2022-47323,0,0,5764ed6de229bb2a5fe7f58b553e2e56557faabe6ef60399b77d5e22fd615784,2024-11-21T07:31:43.093000 -CVE-2022-47324,0,0,6347d37c8ba3bcf7c6c804f9e8776a16aaa9ad0eeb0128925ffa43234012daf0,2024-11-21T07:31:43.207000 -CVE-2022-47325,0,0,f1910be6c349906fabbd876fc043f995ed80296d1314d0acf767c899343113d0,2024-11-21T07:31:43.323000 -CVE-2022-47326,0,1,5887f05720e53da12671da125e8f66c8fb77d83a1232bb3c4b71136a25ae6b3f,2025-03-26T14:15:21.730000 +CVE-2022-47322,0,1,c6e436b4d9b68288a79447794fa91a3f532ba5f281a6032c7dae12567817e5dd,2025-03-26T15:15:41.373000 +CVE-2022-47323,0,1,898e660ad08c287e773cd1ad041ee38b82788ab0799273d0a1d8ff86b3e2b66c,2025-03-26T15:15:41.567000 +CVE-2022-47324,0,1,6612fe2bd5b26d8c34b80abc48661a2c31a7e91ec3b113258c77a994d49beb85,2025-03-26T15:15:41.743000 +CVE-2022-47325,0,1,c8560228bb8ab12875f2b12d87225ad159d57c3e6e48895b2749c30907638c22,2025-03-26T15:15:41.933000 +CVE-2022-47326,0,0,5887f05720e53da12671da125e8f66c8fb77d83a1232bb3c4b71136a25ae6b3f,2025-03-26T14:15:21.730000 CVE-2022-47327,0,0,cdda28a735d2510b8cf72f9a30284a33154adc3ef3a38b4576b77f0357c04d1e,2025-03-25T18:15:29.193000 -CVE-2022-47328,0,1,75c892b6b03d86d8da70fec3db643b2cf562c7077c3f3958d25f473757aae392,2025-03-26T14:15:21.953000 -CVE-2022-47329,0,1,ce26b44ea133b073ed3502604f0f289a0709dd9906e15bb4ef13a2df740bdb91,2025-03-26T14:15:22.157000 +CVE-2022-47328,0,0,75c892b6b03d86d8da70fec3db643b2cf562c7077c3f3958d25f473757aae392,2025-03-26T14:15:21.953000 +CVE-2022-47329,0,0,ce26b44ea133b073ed3502604f0f289a0709dd9906e15bb4ef13a2df740bdb91,2025-03-26T14:15:22.157000 CVE-2022-4733,0,0,a20d2ce8ba8643a864765c9df050e349f7e665a20b62ce2ebd9e393a64b63a5d,2024-11-21T07:35:50.087000 CVE-2022-47330,0,0,85a4a57af31008da3df89e202cecb177ab359c603025cd5154f14828cadff588,2024-11-21T07:31:44.390000 -CVE-2022-47331,0,1,7cd87437f0571abf6658289de93967ca70a361a85dcb05e7923c53569f8351be,2025-03-26T14:15:22.347000 +CVE-2022-47331,0,0,7cd87437f0571abf6658289de93967ca70a361a85dcb05e7923c53569f8351be,2025-03-26T14:15:22.347000 CVE-2022-47332,0,0,df4a869bc27df4ccc5cdd75a5d42e95190d4d508f368a0952433a428bbbb2fde,2024-11-21T07:31:44.633000 CVE-2022-47333,0,0,85acb4ec1539f5e778d6bc3e7f4a7f82e765434978b41c39b8cb6bc88bad5ee2,2024-11-21T07:31:44.763000 CVE-2022-47334,0,0,79697999df090a6112af4776243e1d4cdac5ba6c9d4bf6c9080c00663bf9e733,2025-01-28T17:15:09.353000 @@ -211903,42 +211903,42 @@ CVE-2022-47335,0,0,ffe3fdad4887dcb93fb83432929bc0989af9ac33da71f284c431b8c887b9f CVE-2022-47336,0,0,4263e5dfa897d200b1472042b9608449760978a147e975bfc23d9ea82473138d,2025-02-10T20:15:40.423000 CVE-2022-47337,0,0,af927ae5afc0fcbfd42348de1a6ecf7a0a3245fd3c8303b538745074da65a295,2025-02-10T19:15:36.133000 CVE-2022-47338,0,0,c3646efcfc2f12a9cdf31bc3d6d12890d9775e7538a13b5ba65c0224b6fd9281,2025-02-10T18:15:24.483000 -CVE-2022-47339,0,1,1365086999babaf9d393fb336cd1a7f2703fb5525f4b00a45366ae86254fe814,2025-03-26T14:15:22.543000 +CVE-2022-47339,0,0,1365086999babaf9d393fb336cd1a7f2703fb5525f4b00a45366ae86254fe814,2025-03-26T14:15:22.543000 CVE-2022-4734,0,0,3e3f895b4ca74c84b0fb151d8268a7f8b991a926d79e2ed84ec0f21e7438c93c,2024-11-21T07:35:50.207000 CVE-2022-47340,0,0,6028ec2b2df7cf335147b50331bfd8125f68753f9e3796dc8e5ffbdd41658212,2025-01-28T18:15:27.967000 -CVE-2022-47341,0,1,a6b4d3247802373b3c699ee9f55c7d93efbe578b414192b1632e6595efe9ea0a,2025-03-26T14:15:22.737000 -CVE-2022-47342,0,1,9e990179ee47c1b7232e129f591f58931822738a485f0f39a82fa8ad2ae5e4f2,2025-03-26T14:15:22.937000 -CVE-2022-47343,0,1,b777196379f504351a50fbe7159ee2ff3539b8fe0f21a3259fb482c1ad1dbd49,2025-03-26T14:15:23.137000 -CVE-2022-47344,0,1,03a09cd54a7705bd8115bdc7a602fbc7981f695f4d1bd5483abf4776a38e2d8a,2025-03-26T14:15:23.320000 -CVE-2022-47345,0,1,1ee8b863e85602779b5ffd9b021d10ace36200a263dd7087aff50e923119b6f5,2025-03-26T14:15:23.523000 +CVE-2022-47341,0,0,a6b4d3247802373b3c699ee9f55c7d93efbe578b414192b1632e6595efe9ea0a,2025-03-26T14:15:22.737000 +CVE-2022-47342,0,0,9e990179ee47c1b7232e129f591f58931822738a485f0f39a82fa8ad2ae5e4f2,2025-03-26T14:15:22.937000 +CVE-2022-47343,0,0,b777196379f504351a50fbe7159ee2ff3539b8fe0f21a3259fb482c1ad1dbd49,2025-03-26T14:15:23.137000 +CVE-2022-47344,0,0,03a09cd54a7705bd8115bdc7a602fbc7981f695f4d1bd5483abf4776a38e2d8a,2025-03-26T14:15:23.320000 +CVE-2022-47345,0,0,1ee8b863e85602779b5ffd9b021d10ace36200a263dd7087aff50e923119b6f5,2025-03-26T14:15:23.523000 CVE-2022-47346,0,0,0aed09c421cfb42d8f171a4029f4cb7eede4a9c894d88138e6562816efecbc5f,2025-03-25T21:15:38.160000 CVE-2022-47347,0,0,a8989f37873566c87d703841deb58abdd6887396642993be575afbf72dd891e0,2025-03-25T21:15:38.333000 -CVE-2022-47348,0,0,2ee4baa94522df07a77505e8c11d3e85f011843707f320782b06d867fe47df8e,2024-11-21T07:31:46.510000 +CVE-2022-47348,0,1,a647ee06758c292274fbd03bb745777b76950d6b6401f484ee1bc8b4a827463e,2025-03-26T15:15:42.110000 CVE-2022-4735,0,0,90b33faab5782ce8b5153283364316ff6a3287777702de7d9ae451a7b802a026,2024-11-21T07:35:50.333000 CVE-2022-47350,0,0,bece3fdd2c3d6cdb1e6541a2c949c9982efc4e1da268ee7ab5a483ab8dfc570c,2024-11-21T07:31:46.620000 CVE-2022-47351,0,0,f9d5e8e66c91f1dd01e5dcab5af0679df80a25165c15ea3b66e2cefb06883abd,2024-11-21T07:31:46.753000 CVE-2022-47352,0,0,05cbcf2697f12d00ae56041d1cfc48ba3d6f72c29aacb4d25c6512a650c795d6,2024-11-21T07:31:48.500000 CVE-2022-47353,0,0,e15d009f7a026317b30d329ff84e5896f47b1f05750928f849a5e481ff9ea5d6,2024-11-21T07:31:48.627000 -CVE-2022-47354,0,0,497ad40c11569c29d96883cb3c8a77c36600e11926a8f34354ec23c9205cc61f,2024-11-21T07:31:48.797000 -CVE-2022-47355,0,0,046e83fc7fbfb58acbbb97fe4d7b16d767c0b4d88972d249de394e06ed3714fc,2024-11-21T07:31:48.903000 -CVE-2022-47356,0,0,e17262981d07a3f89a077b3f1e3532c4ff339d32ca5b6e741635f0c3aafacbd1,2024-11-21T07:31:49.020000 -CVE-2022-47357,0,1,5e731d6b9b1a18244fa1e65ff0c8429cb87cfe487f4ca770dbb73a01d943aa5b,2025-03-26T14:15:23.730000 -CVE-2022-47358,0,1,1743fec564ae245a3a7afda532929b51df0836610a7f50f723dc2596f15bf694,2025-03-26T14:15:23.927000 -CVE-2022-47359,0,1,50260233501304e116ee2f03c4b499b69ae0b55af8c04a770df1b913ded26cd4,2025-03-26T14:15:24.137000 +CVE-2022-47354,0,1,ff16a12fbaf11d4880cfb3582bb4a570c0b617d2e8cf1c4185f609f447064939,2025-03-26T15:15:42.293000 +CVE-2022-47355,0,1,32f05af6257197aee2b0daa80c2e3c0df3be1ca7cce4b3731c633b9b8bda959e,2025-03-26T15:15:42.480000 +CVE-2022-47356,0,1,c90ed13232bdb2aeac382a7f7d595863d5f0b10c779150b39a8dae32fbc3c843,2025-03-26T15:15:42.670000 +CVE-2022-47357,0,0,5e731d6b9b1a18244fa1e65ff0c8429cb87cfe487f4ca770dbb73a01d943aa5b,2025-03-26T14:15:23.730000 +CVE-2022-47358,0,0,1743fec564ae245a3a7afda532929b51df0836610a7f50f723dc2596f15bf694,2025-03-26T14:15:23.927000 +CVE-2022-47359,0,0,50260233501304e116ee2f03c4b499b69ae0b55af8c04a770df1b913ded26cd4,2025-03-26T14:15:24.137000 CVE-2022-4736,0,0,6966b4fa17aac898e0fbc1c67dd80d966b944b4975b9ce9b8cf3622f5260ac2e,2024-11-21T07:35:50.483000 -CVE-2022-47360,0,1,2080874404fa4668f5fad79680f49517e2f99dfb08e28d10b31722ee3e7029cd,2025-03-26T14:15:24.343000 -CVE-2022-47361,0,1,a6febb945aa7b4a8d5cf41e9cecbc99b326c75f2bd13aa9701f473814f0835fa,2025-03-26T14:15:24.560000 +CVE-2022-47360,0,0,2080874404fa4668f5fad79680f49517e2f99dfb08e28d10b31722ee3e7029cd,2025-03-26T14:15:24.343000 +CVE-2022-47361,0,0,a6febb945aa7b4a8d5cf41e9cecbc99b326c75f2bd13aa9701f473814f0835fa,2025-03-26T14:15:24.560000 CVE-2022-47362,0,0,5c73387549131606f4ccb53ca66b317939741435c862f4715ff17c09104803dd,2025-02-10T18:15:24.720000 -CVE-2022-47363,0,0,039f49a2379b03208bfa2f138b8529b2c11a09fe035d9cd144ead718e34eea90,2024-11-21T07:31:49.873000 -CVE-2022-47364,0,0,9932d508109eadbf324c3ee2ef48be3b2a469fe92a061f53a718a76ad5ac8412,2024-11-21T07:31:49.983000 -CVE-2022-47365,0,0,cf31015cfa31648ad2923697ec48c8c13834cfb6fdd30dc8f355a364b6a594f4,2024-11-21T07:31:50.097000 -CVE-2022-47366,0,0,11e3a10a7a09752bff42c1aa959da6306f72644bceb636aa72417a06a571b984,2024-11-21T07:31:50.203000 -CVE-2022-47367,0,0,f2cd0dc9b405a34d6b24f23598804fdabc5f6e2995314773675fae5c6eb03bba,2024-11-21T07:31:50.317000 -CVE-2022-47368,0,0,864ac8fd67213d7196e2b3ba090186c8e1e1c5fbef627b3fec12655773b07ad9,2024-11-21T07:31:50.430000 -CVE-2022-47369,0,0,dac8a4cd2c3921d4d915cd89a3123daef3a97515602ff6bc0021fdbe3e9359d5,2024-11-21T07:31:50.543000 +CVE-2022-47363,0,1,8a8bd91b92746bafa59c3b9c7ba85123e3f7f67e7bb2b2c356d4e3e3231a88c1,2025-03-26T15:15:42.840000 +CVE-2022-47364,0,1,388636e526a9161e21b61db5ec4fb24947ddf605fd37cbe31386ff0dc1eccbfb,2025-03-26T15:15:43.017000 +CVE-2022-47365,0,1,e2a3634e2e4caef65a6da1a0c67d3c0308a02baf1f2cfeae53c5d2b5af45f045,2025-03-26T15:15:43.210000 +CVE-2022-47366,0,1,2971bb9d65678638b8c78a699dcafa45fb9c861c1048a89b245242cd9a18dc36,2025-03-26T15:15:43.393000 +CVE-2022-47367,0,1,f46a7d54ecd2f8bb5e705330aed17e5bd246563d9925e3914df28b8b0207d756,2025-03-26T15:15:43.567000 +CVE-2022-47368,0,1,edc0c6a81fa30f9559ea6236c17b7a8993d51afd377907a009ab3972d8dff07c,2025-03-26T15:15:43.750000 +CVE-2022-47369,0,1,4d61351a383f7be463b84b284edc7a471ca1fba9c95a8e534fee973ac973b11d,2025-03-26T15:15:43.947000 CVE-2022-4737,0,0,dba502a8626959ce6d0880dcba8a3e4a3ed0b45c0d2076ff09fce5fdfdd17219,2024-11-21T07:35:50.610000 -CVE-2022-47370,0,1,31184b9a2366983ce15cb055351d326a425e88ec753f1c69d989d264093d6f33,2025-03-26T14:15:24.750000 -CVE-2022-47371,0,1,e3a9adf55786e2a53cf433f71bcae1c3eac23c3bb4c4f0b3d797cd85177cb6b6,2025-03-26T14:15:24.940000 +CVE-2022-47370,0,0,31184b9a2366983ce15cb055351d326a425e88ec753f1c69d989d264093d6f33,2025-03-26T14:15:24.750000 +CVE-2022-47371,0,0,e3a9adf55786e2a53cf433f71bcae1c3eac23c3bb4c4f0b3d797cd85177cb6b6,2025-03-26T14:15:24.940000 CVE-2022-47372,0,0,dfa77dc4d425c9bf12877c67de0f763eabc9ccacebbcddff67044d9d21c0fc3e,2024-11-21T07:31:50.883000 CVE-2022-47373,0,0,96a907b08b5e21840b5e6f0473ecbf70469d1dc841e707b95ca2af1207a9a256,2024-11-21T07:31:51.007000 CVE-2022-47374,0,0,0fc68a2d2ba75f7fa891da2f570cf59855fee3dac0ed28f98a8e1489bb311d72,2024-11-21T07:31:51.127000 @@ -212025,7 +212025,7 @@ CVE-2022-47449,0,0,cc50b6ae48af7d02d6dd04daa7e7790ccc23f748f67344294a359e7883fee CVE-2022-4745,0,0,e01e0a62109bd4ef8e5f97d29b95ffae6191f45de6a32d7af67013476f6b6e2c,2024-11-21T07:35:51.627000 CVE-2022-47450,0,0,39fb77bfe8251294fa7825fa9caf8b57b402a26a70ce42dd4739b99f948f3b47,2024-11-21T07:31:59.200000 CVE-2022-47451,0,0,d21767685c9e1c48a8f641e6f36b2ecf5b4aec2ebd1b394de1f03253e03895f3,2025-03-25T21:15:38.490000 -CVE-2022-47452,0,1,e58db3a26b36e58e9bbee3a6f857db617877571ea407f71bc52f55ec1c8a7001,2025-03-26T14:15:25.120000 +CVE-2022-47452,0,0,e58db3a26b36e58e9bbee3a6f857db617877571ea407f71bc52f55ec1c8a7001,2025-03-26T14:15:25.120000 CVE-2022-47453,0,0,16ab4548a934e0f69918832fe307d3cc886b6695da2b3cc8295f8e8bf14fc630,2024-11-21T07:31:59.610000 CVE-2022-47454,0,0,e7b737cb99edf1fdc942511ae649efa0f88637b608618d95b99e53858a5b0cd0,2024-11-21T07:31:59.757000 CVE-2022-47455,0,0,78da122697407476b70af5bb22716c5d16d54cefd750214ba4143eeb45121173,2024-11-21T07:31:59.877000 @@ -212335,7 +212335,7 @@ CVE-2022-48010,0,0,07ce7c2bca7b75e7debedbaf3ff9c47c42118124c7dd250e79b294a28c6b6 CVE-2022-48011,0,0,a3cac5a9d48600c7bf2e22935fc0878bb60406ff2e2c3da3091bd51fb4eeddad,2024-11-21T07:32:42.180000 CVE-2022-48012,0,0,4611572fbf5a8e32c78f09d10dc6f4f2e0f130cb7f129e213b26f8c4a2b04ac2,2024-11-21T07:32:42.387000 CVE-2022-48013,0,0,445779374cec1e5adfa3369b6a0d97469febbf785d668ad1610b36eb24ebbecd,2024-11-21T07:32:43.147000 -CVE-2022-48019,0,0,e5067d60a1a13259a3a74c7e0954a826bcb2690c021ccc7eef33ea775570f755,2024-11-21T07:32:43.317000 +CVE-2022-48019,0,1,40acee809c336ba60d6414e44ecac72038914696c067d2f4880300926ba8bcfb,2025-03-26T16:15:17.020000 CVE-2022-4802,0,0,22eec20741e168027161476d458d358f39516dfdee813e8a77908832087505ed,2024-11-21T07:35:58.223000 CVE-2022-48020,0,0,42a655f37aee33433d414bb52eeb6ceda7533397e9e4643e687b6376d60c2349,2025-02-05T18:15:25.767000 CVE-2022-48021,0,0,538e85196aae9213831b6e068aea25d7b5613f4529bae447de98cfe681c4c32d,2024-11-21T07:32:44.333000 @@ -212454,7 +212454,7 @@ CVE-2022-48236,0,0,850fb4dcd8171cd15cb19c7aac6f7bab1434f0b7f306bad2cd68cf86ae838 CVE-2022-48237,0,0,6c5ca8ecfd414e8897abb5afce28bf8294cd5e71cc28a0415820c17c1ecfef21,2025-01-28T21:15:12.503000 CVE-2022-48238,0,0,e0a3363b05434d90930d72ee63d7cd0f23451e39dd4127f60f3e457acf12474d,2025-01-28T21:15:12.663000 CVE-2022-48239,0,0,c626f4e77adf4ca19a86fc17a78a7a500eaaee17af23726d2dfd15ec4ece9380,2025-01-29T17:15:22.070000 -CVE-2022-4824,0,1,2229504ea8337da25915fe1fd14db3cfdeaca0c0cc51186358b9e7ff62419e8b,2025-03-26T14:15:26.187000 +CVE-2022-4824,0,0,2229504ea8337da25915fe1fd14db3cfdeaca0c0cc51186358b9e7ff62419e8b,2025-03-26T14:15:26.187000 CVE-2022-48240,0,0,b83423ba575e6be2e559f2f6a79613f36da5350453969e7c1b98d66b15908cb8,2025-01-28T19:15:08.860000 CVE-2022-48241,0,0,a632f9d07ce4128422cead40398fa41d5943354be2b7b89da53b23cc8bf4cf53,2025-01-28T19:15:10.233000 CVE-2022-48242,0,0,eaa3bc520a98e7911f4dff06b93742735f3b6cf14f5bffae1782f9ec6e714cc1,2025-01-28T19:15:10.467000 @@ -212514,7 +212514,7 @@ CVE-2022-48308,0,0,d82ea45e2ac099dc3c3ecf13551c9dc3ababac68114d8f5415e8c3ff26f91 CVE-2022-48309,0,0,9af53705e87c70c09a62712e5ffa6e8eeb125ade4869b2020319bd5558cc17a4,2025-03-07T21:15:12.900000 CVE-2022-4831,0,0,f3a096c06597b8e18b75ac644035ee7a465b6ea70b28d2895528d5c3f7fcfd7c,2024-11-21T07:36:01.990000 CVE-2022-48310,0,0,ebfed86719c206e34df06d3147715e5d78c6f8ef832d5de22d2b9a682e7e26b5,2025-03-07T21:15:13.047000 -CVE-2022-48311,0,1,12a0cdfbf5573bb8f87e0c5a0ca3d58f6ae7d8e3c95cf644494fcad7e534123a,2025-03-26T14:15:25.310000 +CVE-2022-48311,0,0,12a0cdfbf5573bb8f87e0c5a0ca3d58f6ae7d8e3c95cf644494fcad7e534123a,2025-03-26T14:15:25.310000 CVE-2022-48312,0,0,bec59e47dfb2e4094906ec17562aba4cdf6be4c4ce63944a8d9e3c8d7d7a58d8,2025-02-06T17:15:14.253000 CVE-2022-48313,0,0,fe9586966c1ecaaeb40ddf7a3e5514f39dc3f74450e5264891e068a90268852f,2025-02-06T17:15:14.450000 CVE-2022-48314,0,0,1b1df12682c8b2f13fcf1ebcbf7e95e664b833fc8341f50a69c9e95111e5ee19,2025-02-06T17:15:14.643000 @@ -214127,7 +214127,7 @@ CVE-2023-0140,0,0,df7177faa2d8cb9862c8b50c6cc729872478c2ba0d70361a7bb2e6912f9991 CVE-2023-0141,0,0,85fccfa0835592642082878f04b3ca84af9442273f80cf9aad7f70c91ed83ef3,2025-03-20T21:15:16.407000 CVE-2023-0142,0,0,b7133677787ddbbd1130cc8c143928e5cbd31febaed1bc74027c053535510e61,2025-01-14T19:29:55.853000 CVE-2023-0143,0,0,12e6bcea5a3db8de8256483e07860446df3a2ee1bf6ddb6adaff3df8fc243f4c,2025-03-25T21:15:40.143000 -CVE-2023-0144,0,1,b0b684392742244710e87e2337db3c5c1d750456d69b57859f7335c71658ec4d,2025-03-26T14:15:26.400000 +CVE-2023-0144,0,0,b0b684392742244710e87e2337db3c5c1d750456d69b57859f7335c71658ec4d,2025-03-26T14:15:26.400000 CVE-2023-0145,0,0,a4cbaa3c26a4250a2dd6b3cd43cec76d7c10d4cce1fc8e2c43fcf34ca91668db,2025-02-26T15:15:17.957000 CVE-2023-0146,0,0,8eb9d90955bdae43de02b5f3b926196cc1bb5521330b52186e58ae08057eea53,2025-03-25T18:15:30.523000 CVE-2023-0147,0,0,d83a6a9cc747578644cdc678d460b719e77c1dcb07d59fbedecd667ef6b22e7b,2025-03-25T20:15:16.930000 @@ -214161,7 +214161,7 @@ CVE-2023-0174,0,0,b42528505b72ad99092252a143ae5d7e87893bdee09be93dad54b02238e573 CVE-2023-0175,0,0,f675b36a1edf72fa9629e908e8135656f624b1e3facf4fe662ec8f8ba7f94a2d,2025-02-26T19:15:14.847000 CVE-2023-0176,0,0,1dc2a255a38756fd69b660836918029f220e67fe474010062db4d35f498821a4,2025-03-25T18:15:31.023000 CVE-2023-0177,0,0,96612f0d6acc9356b7bef11758fc6250b99f39292144eec2d89a14d00f6db80e,2025-03-20T20:15:27.907000 -CVE-2023-0178,0,1,fc51a3e93e7b20dbf41b1671299d60206e6d82a64feca8e26ee75812eaced7d9,2025-03-26T14:15:26.580000 +CVE-2023-0178,0,0,fc51a3e93e7b20dbf41b1671299d60206e6d82a64feca8e26ee75812eaced7d9,2025-03-26T14:15:26.580000 CVE-2023-0179,0,0,9877146175097de2cfaf24ea6f7e8489c6f5c588d2b6bdbf87553e381b048fdf,2024-11-21T07:36:41.697000 CVE-2023-0180,0,0,874d5347c225b067c1bec87c944f9e77ff0adec74cd6c76e1cda8afd708aa06f,2024-11-21T07:36:41.843000 CVE-2023-0181,0,0,6cc218f9c12dcd68e0f8d4ab80bfa62e629b02864392080e103c64c6a0cbe010,2024-11-21T07:36:41.983000 @@ -214260,7 +214260,7 @@ CVE-2023-0278,0,0,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564 CVE-2023-0279,0,0,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000 CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000 CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000 -CVE-2023-0282,0,1,f2a8105be0180298e4597b68e62b27826503d962ca075ae0ec4e67d5172050ca,2025-03-26T14:15:26.760000 +CVE-2023-0282,0,0,f2a8105be0180298e4597b68e62b27826503d962ca075ae0ec4e67d5172050ca,2025-03-26T14:15:26.760000 CVE-2023-0283,0,0,230ec949cdfa87f9c743cbda03bee4b4589b701b25482058f27efe88db1a01ea,2024-11-21T07:36:53.493000 CVE-2023-0284,0,0,2ee75b8d52458792893d506f4678003e9f3a4ee3862a0d66ec5a91e2fc2321a7,2024-11-21T07:36:53.613000 CVE-2023-0285,0,0,5cfc15627d85ef00a346f7dfd31b8843c30b6e48b152b2072e5bf24a5e2751ec,2025-03-12T16:15:18.480000 @@ -216286,19 +216286,19 @@ CVE-2023-20596,0,0,5b2bce570c3a41831e228fca0439c8b43c565eb8206629753215f3aa992a6 CVE-2023-20597,0,0,1ce3daeb1083e877ed67ba7eb1e0c169b92397e49e6b8d5547e7fdafb9c41f1d,2024-11-21T07:41:11.923000 CVE-2023-20598,0,0,10bdb3216576a83083efc44a069662dde254102fd0b21ecf4ce722f0ae080fd5,2024-11-21T07:41:12.177000 CVE-2023-2060,0,0,c256a39dd7e962fae313c1daa7316cb92aff2ed2ab60c07792ec1909b8ec56d0,2024-11-21T07:57:51.607000 -CVE-2023-20602,0,0,e42248077a6a85608e970faf0ea7ed64f699bdda13f7ded22fbaeabe5cc6c83e,2024-11-21T07:41:12.393000 -CVE-2023-20604,0,0,89104cd6bcd572fcd43d03046cd8de5ff1ea8829d4d0bdd409ede520ee0ad218,2024-11-21T07:41:12.533000 -CVE-2023-20605,0,0,0a50f8aed353e1972580ad9bc80d68446dfb03a26e65506fd8ca3367e802fbdf,2024-11-21T07:41:12.673000 -CVE-2023-20606,0,0,3c42dc82be70724cbe7cab6b59ab01aba1f16f44b91a8b568cb49094579a692f,2024-11-21T07:41:12.833000 +CVE-2023-20602,0,1,92aa84c767db7a6dd721658b208a6551e447db436cc5586d8936ad5ca538f8ec,2025-03-26T15:15:44.483000 +CVE-2023-20604,0,1,4bf3c778b64a500781c003e8d67a4041a820012182b71c7a18179e3bc020fa9e,2025-03-26T15:15:44.670000 +CVE-2023-20605,0,1,55f1d3a69f9d9608e408f50f3c0d8fa21c8046ba296b70b281c2f35de9bca596,2025-03-26T15:15:44.993000 +CVE-2023-20606,0,1,ba582fb9a4dd1c1ca2ff18bafb7a90c23f95d9095276f6a06b91200c6a95f6ac,2025-03-26T15:15:45.790000 CVE-2023-20607,0,0,2d2b5b020fbe0b55fb14d869a0d8dcac4d6c2aafeb48626430bf6bafca70499c,2025-03-25T19:15:41.100000 -CVE-2023-20608,0,1,d6f9dbbbac69b93cc0824a47d4df36c65ecda27214abbe1f241989302aa528a2,2025-03-26T14:15:26.940000 -CVE-2023-20609,0,1,0afa963dad6ef04212b9672924a803b8c2d17becb20dad9274ecbff4a22dfa5f,2025-03-26T14:15:27.147000 +CVE-2023-20608,0,0,d6f9dbbbac69b93cc0824a47d4df36c65ecda27214abbe1f241989302aa528a2,2025-03-26T14:15:26.940000 +CVE-2023-20609,0,0,0afa963dad6ef04212b9672924a803b8c2d17becb20dad9274ecbff4a22dfa5f,2025-03-26T14:15:27.147000 CVE-2023-2061,0,0,b4b807b6ce48cef7d45a0e20c4572bea09af7570d502ad43d494e63723900e46,2024-11-21T07:57:51.733000 -CVE-2023-20610,0,1,8dab462f84161729dc798bc558aade169f04f6528ebea714a146b1324a0c2eb5,2025-03-26T14:15:27.333000 -CVE-2023-20611,0,1,039ba1281f90fbc43b46d5ed4bc7aa045324f58c8b3b21dd09e77c7c28820d8c,2025-03-26T14:15:27.513000 -CVE-2023-20612,0,1,8e27291aa342cdf92d574714ca62f01f7fece2ec67dbc63744a0d174086e2ef3,2025-03-26T14:15:27.683000 -CVE-2023-20613,0,1,b9e134d2f6217071ced16c061aa8582c2090f2710c978787b549509b90760a94,2025-03-26T14:15:27.857000 -CVE-2023-20614,0,1,064e591aea3018d61466ccc9fc7891160572654a0b0f52209773e2a17399f534,2025-03-26T14:15:28.053000 +CVE-2023-20610,0,0,8dab462f84161729dc798bc558aade169f04f6528ebea714a146b1324a0c2eb5,2025-03-26T14:15:27.333000 +CVE-2023-20611,0,0,039ba1281f90fbc43b46d5ed4bc7aa045324f58c8b3b21dd09e77c7c28820d8c,2025-03-26T14:15:27.513000 +CVE-2023-20612,0,0,8e27291aa342cdf92d574714ca62f01f7fece2ec67dbc63744a0d174086e2ef3,2025-03-26T14:15:27.683000 +CVE-2023-20613,0,0,b9e134d2f6217071ced16c061aa8582c2090f2710c978787b549509b90760a94,2025-03-26T14:15:27.857000 +CVE-2023-20614,0,0,064e591aea3018d61466ccc9fc7891160572654a0b0f52209773e2a17399f534,2025-03-26T14:15:28.053000 CVE-2023-20615,0,0,883e510daf212c6edc0d1340944a56e2b0521f500d1dbdce172681c6f67ac175,2024-11-21T07:41:13.933000 CVE-2023-20616,0,0,193613a083dd6d1fd7c1386d0403d5ab6ff160f6e29176720343022bc0d9c487,2024-11-21T07:41:14.050000 CVE-2023-20618,0,0,d0d6f837b8b9d73bd167ef73e8985b6891f1aec0f68346c0ecad3d267bce8957,2024-11-21T07:41:14.170000 @@ -216533,7 +216533,7 @@ CVE-2023-20850,0,0,2f23c5f1b83f56e918fd896a88f923ade429b0abd6a8450551da87b8ed493 CVE-2023-20851,0,0,ad13295b57c6d045f6eb5dc4d8e635c50dbdb18ee2224071e23fc91368fcce72,2024-11-21T07:41:41.720000 CVE-2023-20852,0,0,63bf381c38655e9014f7b908e57b9815d22848296454412b7071321723df65da,2024-11-21T07:41:41.840000 CVE-2023-20853,0,0,a4a4925bb7d17dc151501c8aa321035678533d7956ae2d1bc1c5ee3469d5d5f4,2024-11-21T07:41:41.950000 -CVE-2023-20854,0,1,3fd21afb922bd56fc008b50800b2495770b5431f7d7f37bcb3c9e76180122b2c,2025-03-26T14:15:28.260000 +CVE-2023-20854,0,0,3fd21afb922bd56fc008b50800b2495770b5431f7d7f37bcb3c9e76180122b2c,2025-03-26T14:15:28.260000 CVE-2023-20855,0,0,519e80dc39dfb08aa2fab9b00de3391eedce7c0f70caa8dc1169bc7dbbf22801,2025-03-17T19:15:17.593000 CVE-2023-20856,0,0,5ae4aa033dbad19981a07ee21a2a125d884a36c4e68c92f5feffac991dac2d83,2024-11-21T07:41:42.283000 CVE-2023-20857,0,0,fefdaa2c60a821e74991439fecf2049da1cf72f21cbe6bd98ce3ea011f3513ae,2025-03-10T15:15:36.383000 @@ -216939,7 +216939,7 @@ CVE-2023-21233,0,0,5353cbf9d3cd3a897fe090daac663ee59b6b49a4da5b709ae645ecb6373e3 CVE-2023-21234,0,0,ce606bec52926a2c6c3c12a1bf7fb0cec37843385b3463c97ab1772c293d1ed6,2024-11-21T07:42:26.173000 CVE-2023-21235,0,0,64d1583a0712311e786f3fcc8d23f39bc122abac327e2e584e31ba4a9309aa0b,2024-11-21T07:42:27.743000 CVE-2023-21236,0,0,faccc3c92e195990f85747f90d2b718ff96137780e2842944801454f8ad6f0d0,2024-11-21T07:42:27.860000 -CVE-2023-21237,0,0,91157b43e4e3c1dc38d4296ed6fd9dac2e8b906cde26561a4f276936ccb62095,2024-11-21T07:42:27.973000 +CVE-2023-21237,0,1,7a0919a7b1cd012fef68d039ed44e5a5a2264bd87754008d2a281eab49c5ddd9,2025-03-26T16:32:44.373000 CVE-2023-21238,0,0,8fc3b006d1bc6a863e91603d730b9396206c18404096155b862d28de8bc02415,2024-11-21T07:42:28.173000 CVE-2023-21239,0,0,e778411dfd951a9645090513b4545a003546f4a3b30d7d070afd5332f662a2a7,2024-11-21T07:42:28.300000 CVE-2023-2124,0,0,43826dbcd8cf6509f3971c997435a96f0ebbc159881545b65f370af1f6ec9e41,2024-11-21T07:57:58.977000 @@ -218815,7 +218815,7 @@ CVE-2023-23465,0,0,35f79e6483d774afe3641fc5c164afc4fd11cd820acd051aac3c7defee608 CVE-2023-23466,0,0,5244445c595a5832d4cc66caa0ccaec785ea31318a0800b3061f84fe90331d0e,2025-03-19T16:15:19.060000 CVE-2023-23467,0,0,07fe9bd2a1ccdf3861c70ef3b332766a43f12b2a21dec48d6c3a87d083c61d46,2024-11-21T07:46:15.513000 CVE-2023-23468,0,0,dcf3783a6e46e2a0eeb9074ee47ed2d5c0a9c74ff1896870c21e1e0585b30f65,2024-11-21T07:46:15.633000 -CVE-2023-23469,0,0,69288f0f15e2c2829cc139ea58aa96679edf14002fe3924391288bf0361cb528,2024-11-21T07:46:15.757000 +CVE-2023-23469,0,1,2777ab42c73b74869d5fec2f5d2f56ce8487b27ed653361e702ccddd82c31d13,2025-03-26T15:15:46.320000 CVE-2023-2347,0,0,1b510b70d5055256be9b7fcc7958f0e58a0f64f1d305c1e7bd8117d463d82014,2024-11-21T07:58:25.880000 CVE-2023-23470,0,0,e89627e3a10c4f9719807de277c66eb447b3d442868ee74ef96be9c0297eba6a,2025-01-29T17:15:22.900000 CVE-2023-23472,0,0,935c78e7a0a708239643061173cf7b95911b0df6d6ce20f56af7a62fa88788e2,2025-03-11T17:24:19.470000 @@ -219460,17 +219460,17 @@ CVE-2023-24144,0,0,e8fcaa485d3e86f4de9614741a076f68cf24ccfb0c3f8c2bc56f52d40ed78 CVE-2023-24145,0,0,7adfa24da8476d3099357250e8f859e959fdc12f34e12dac76b6b8f8b301d4a2,2024-11-21T07:47:28.807000 CVE-2023-24146,0,0,46fc63b156b6230ae708a62ef96ae23ba090f5c04c7d7d0be99764fb5e5473b9,2024-11-21T07:47:28.950000 CVE-2023-24147,0,0,e41d93156b332bc09da94000972adb79b55e924deb52945fabdab46f7aa6c021,2024-11-21T07:47:29.090000 -CVE-2023-24148,0,0,8f4cbf1173123c11ef0acd68f37281d76e645800941487c8631694162f4b40fc,2024-11-21T07:47:29.233000 -CVE-2023-24149,0,0,2ad76db1c5862510918a7fa07cda481d445d8453c450d29d889aa820b042c959,2024-11-21T07:47:29.387000 +CVE-2023-24148,0,1,674fcc1ba994dcc53f4b1b2739b50f2a07dd6c1a6a960c9b2ad892fe2760138b,2025-03-26T15:15:46.813000 +CVE-2023-24149,0,1,66a85b28be069e7a828e596d9ee9e4eeb5c531dd78d2e0ad02bb4912ec7fa8ad,2025-03-26T16:15:17.513000 CVE-2023-2415,0,0,9158d528c422e52dc579bb111359d9138c64face63f6ce0130f26f3114b23994,2024-11-21T07:58:34.373000 -CVE-2023-24150,0,0,3e3bb6d1c07a0bcab16541859e14c74a1ab65b6a3f4a75a6217fa6faab21193d,2024-11-21T07:47:29.540000 -CVE-2023-24151,0,0,7299d35d161a2c1d5393cb4ee043374228abce53944216793105343ee7181f9b,2024-11-21T07:47:29.677000 -CVE-2023-24152,0,0,a0c2f6ad27fe4a4187c111c04f3a3168c425b03c104e324b980070989a2678c2,2024-11-21T07:47:29.820000 -CVE-2023-24153,0,0,6425364cd7359d743b351589e367f71571a490831b32fe471f1ce2900060b8dc,2024-11-21T07:47:29.963000 -CVE-2023-24154,0,0,5ff152d5828ddc3dd8316398ece11ab45cf6f8502b4cfafa483c606a6b858c61,2024-11-21T07:47:30.103000 -CVE-2023-24155,0,0,f59431cb91851a8a8cc97d44f9e8fae7d0cf1e7555b4cdb90b4b6502e9da042c,2024-11-21T07:47:30.243000 -CVE-2023-24156,0,0,3898ff5e83abb031f4a38b40ab49666c3ad70063fce440d9c8f0f3c72b4a8dd9,2024-11-21T07:47:30.380000 -CVE-2023-24157,0,0,a00b61f9298bd5abf5e527043ebc6defb9eddf15dc81f86f48e0b0234f0ec130,2024-11-21T07:47:30.517000 +CVE-2023-24150,0,1,1978898d6cf410b25d039428bb9737f50542bd2686ecbc60274b16a854707519,2025-03-26T16:15:17.793000 +CVE-2023-24151,0,1,46a02063b1cc678e5b41e6a9210a4878d97df355a6783b6ce7880e871dab2c99,2025-03-26T16:15:18.033000 +CVE-2023-24152,0,1,0b774f6418b33460f6bdefed5229af905060e1d2ef5ecff57c55e910dab13da3,2025-03-26T16:15:18.273000 +CVE-2023-24153,0,1,63c4fd8a018d73e33e1a8ffe1645aeeec4043079412b91ad055a97f9b5999724,2025-03-26T16:15:18.527000 +CVE-2023-24154,0,1,a2fec47508f879ada15d15fa0496e4295dc526da8a3d7739fdbb73cb691d7b26,2025-03-26T16:15:18.787000 +CVE-2023-24155,0,1,64de41923a85e49241b8a1b4174c0b66f36a9b352d7968e7119bce55e950b1f9,2025-03-26T16:15:19.020000 +CVE-2023-24156,0,1,fbfbacd0d95c7c78fe2944649f4e3da8ffd28603a028d8536389a6fc85d8bb5f,2025-03-26T15:15:47.047000 +CVE-2023-24157,0,1,603fbe9137c0740f9081f35b76cad146834fc9872cfe2eed2412a269598f9a06,2025-03-26T15:15:47.267000 CVE-2023-24159,0,0,7760eaf985df74413d84fd1de8669f9eb5b9e5befb0b84de1f1b3892c8d7d513,2025-03-20T18:15:16.760000 CVE-2023-2416,0,0,acdf5b4886c4297fef66ae568a61d37a4ec99430d66c160077e079aaabd2a5d8,2024-11-21T07:58:34.510000 CVE-2023-24160,0,0,65cc2c933fa4f55a423a0b03c6f5849c561d8a239b685c27ac6c141c47ef1803,2025-03-20T21:15:18.357000 @@ -219498,12 +219498,12 @@ CVE-2023-24192,0,0,cd15b721a1def7d2488c8772b14ab5fa194e85c370091b47b7506efb91941 CVE-2023-24194,0,0,e4ccdedec4ff686cdb32380992e795162de0f625f141138e9db34036c57ce026,2024-11-21T07:47:33.660000 CVE-2023-24195,0,0,d3ad145057770126892eae4c8b1942cfaf61bf44e61fe15530355046295d8f8c,2024-11-21T07:47:33.800000 CVE-2023-24197,0,0,59993168d8c8a82128502350a8b2e514e9c3650f951b99db5d8fa52eb29a00da,2024-11-21T07:47:33.953000 -CVE-2023-24198,0,1,59f7b90c591a894063db2a85fd2ad5be45e641826e3abc76bee195169b31b49f,2025-03-26T14:15:28.920000 -CVE-2023-24199,0,1,2b6b3876429e4e03fdfcdff4e1f089f07756ad717eeddfb6e0bf1906f64e21b8,2025-03-26T14:15:29.150000 +CVE-2023-24198,0,0,59f7b90c591a894063db2a85fd2ad5be45e641826e3abc76bee195169b31b49f,2025-03-26T14:15:28.920000 +CVE-2023-24199,0,0,2b6b3876429e4e03fdfcdff4e1f089f07756ad717eeddfb6e0bf1906f64e21b8,2025-03-26T14:15:29.150000 CVE-2023-2420,0,0,21c37b78d486b076af4063a056c9741c917da2c1f0f0cf7cdb87987114ae94f5,2024-11-21T07:58:35.080000 -CVE-2023-24200,0,1,76fa4fc4b3d226e3bf87c5c62c7a712186811c0a535cffdcaa1ca3aca3493fb0,2025-03-26T14:15:29.363000 -CVE-2023-24201,0,1,41dc720936aedebdeff0452b89478c36368d2d4d2c4991249ec07fcc8952bd94,2025-03-26T14:15:29.560000 -CVE-2023-24202,0,1,84e1d9c8252f35ad40b6810498a4f3b7f7cf09b7d4e4e84a42593ef7c0d1e6f0,2025-03-26T14:15:29.760000 +CVE-2023-24200,0,0,76fa4fc4b3d226e3bf87c5c62c7a712186811c0a535cffdcaa1ca3aca3493fb0,2025-03-26T14:15:29.363000 +CVE-2023-24201,0,0,41dc720936aedebdeff0452b89478c36368d2d4d2c4991249ec07fcc8952bd94,2025-03-26T14:15:29.560000 +CVE-2023-24202,0,0,84e1d9c8252f35ad40b6810498a4f3b7f7cf09b7d4e4e84a42593ef7c0d1e6f0,2025-03-26T14:15:29.760000 CVE-2023-24203,0,0,d214cd8dba2f26d07b8d2405c19634fe1dc920a39a8970fca3b3cb699b52ee5e,2024-11-21T07:47:34.870000 CVE-2023-24204,0,0,8d647f4993aac3259b0cd1cda5d7563be021d0ac208e3e41804e4d3946e9bf3e,2024-11-21T07:47:35.097000 CVE-2023-24205,0,0,c2e505927e2bfefc7dbaeaa0138b9c3c54bd47a7156afc23a5d1a26123de85c6,2025-03-12T17:15:39.053000 @@ -219834,7 +219834,7 @@ CVE-2023-24609,0,0,425b5065ce3b98f0e73fcc1c781977c19247bf9d8fd5dcbf726c59468e33b CVE-2023-2461,0,0,be1487a1c15780c7bd238ec9dc5e462a75262a5204ae751a0e878b4cc2670d7d,2024-11-21T07:58:39.770000 CVE-2023-24610,0,0,39877b8448087117bf7f9bbedf18df8ec184cc3c8021f517fdf54a836dadf34f,2024-11-21T07:48:14.163000 CVE-2023-24612,0,0,ce37fa75c1fe49a6bbdd390f35fa49a1e9e49f0eaabf47997125799e6d936c76,2024-11-21T07:48:14.320000 -CVE-2023-24613,0,0,1aa04378c5f856e0c17d046001db80f3c96aa4b00e02a5150f626ebe2aa00c0b,2024-11-21T07:48:14.463000 +CVE-2023-24613,0,1,5ca1d43e4dd191a92da12be074e0cc6e498233454e6eb1b82569d8817e78b94c,2025-03-26T15:15:47.477000 CVE-2023-24619,0,0,487d3fc851d9a5041f94199c22b870ca0759791795e5c41a282f8e2947cbc2da,2025-03-21T18:15:31.523000 CVE-2023-2462,0,0,2e11f3528ed939f0220efc9a7daacc3f67d605017c175a72293b12bbbc9c06ff,2024-11-21T07:58:39.970000 CVE-2023-24620,0,0,3a3bc66320b549a4417001163bc5252914addae68831682c8e3b9eaa5826fb36,2024-11-21T07:48:14.763000 @@ -220116,7 +220116,7 @@ CVE-2023-24993,0,0,e2b323db19ebfb1b969ba66b86f5f55677d448d7d4801273286197feb1c19 CVE-2023-24994,0,0,0aaa39334f0a5feb34920361bee73ba6e0b369b014b5330c5b101e3cc1ad6533,2024-11-21T07:48:53.710000 CVE-2023-24995,0,0,512c18c8e47cd15f0e3c37b56da9b630712f4db7e5a7020d5555221dfe14f945,2024-11-21T07:48:53.820000 CVE-2023-24996,0,0,e3dd849877d218d6c8e4ef8138ee37f41c8b8396041e024919479570752aa579,2024-11-21T07:48:53.930000 -CVE-2023-24997,0,0,544b96c00cd212670b6b3de7628fdadefe7018bbd8223e525f79c4cd0a148111,2024-11-21T07:48:54.047000 +CVE-2023-24997,0,1,3b5e5bcbce81d21d5693da8433b15b0492be6c181861c3fd9c4a647002fb7fc8,2025-03-26T15:15:47.737000 CVE-2023-24998,0,0,ac3307c45c551a1e1a851239d3408ee1a699211a60c162ebdc4340912e2a68ad,2025-02-13T17:16:09.017000 CVE-2023-24999,0,0,46de77bd243348e6501570206548540583157f268a4a668c6edb3cb151ecb467,2024-11-21T07:48:54.297000 CVE-2023-2500,0,0,f2b1f13cf8eec809e3517f462c55af8ead54658ff07b4d077422a116af204809,2024-11-21T07:58:44.070000 @@ -220264,9 +220264,9 @@ CVE-2023-25131,0,0,20aff29aba8d810f6dd69704a1a176364cedbeddddf46de1c510b455cb060 CVE-2023-25132,0,0,969b5d6de448f6e2d841381c08c5fcad2906ac9c2990a4a5bb97ce7e8579a0f3,2024-11-21T07:49:10.350000 CVE-2023-25133,0,0,d69098918f227a3e143e36108a62106673e79ededfd5c21cc79223f5344b0aec,2024-11-21T07:49:10.470000 CVE-2023-25134,0,0,fb4103d496073d299806b3dbef56abad5b939666ba020c6ef5925c0261e785f9,2025-02-28T22:15:37.817000 -CVE-2023-25135,0,0,d2039f0e14623ffd9b9d7f8cfc89d1bceb548266f3b71c9a3a43314c526dc8eb,2024-11-21T07:49:10.733000 +CVE-2023-25135,0,1,f7fcb4bc7445792256151eb414c4f7c6872839a5989a48b15b0802133f2f2e2e,2025-03-26T15:15:47.997000 CVE-2023-25136,0,0,2afc3a70a5e06c0c69c3830dfff5a970668d068f38662a496adf67062392c23f,2024-11-21T07:49:10.877000 -CVE-2023-25139,0,0,c8c6816eb7d6fad0b1254d72563b0eca09c617cb1a12c92195044d95d483e510,2024-11-21T07:49:11.073000 +CVE-2023-25139,0,1,07f7513ac6a56aa814af8c062bcc94a0d45623d3d4ba3dc7463eeee28e1472c2,2025-03-26T15:15:48.237000 CVE-2023-2514,0,0,c0a74aabdf612338b5c2bbf99973c4dcf772d38ab9efc3bea1b0156e23e9654b,2024-11-21T07:58:45.227000 CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b135,2024-11-21T07:49:11.220000 CVE-2023-25141,0,0,26abeae296d9927915c3ad0441e22235bc57bf9e7019a4e36e4c53d5d3062c1b,2025-03-20T19:15:19.913000 @@ -249570,7 +249570,7 @@ CVE-2024-2093,0,0,a987f3cd769933540e0ca2c1e6014986bdfcabf3a28322dfa4b62e2bc8dfbe CVE-2024-20930,0,0,a465cfe97f76d983fb7053fdef31b0f6dfee6f609eed77b02337477344699c0a,2024-11-21T08:53:27.317000 CVE-2024-20931,0,0,113c08fb6467555e9da6c231288941cd66981afe08d2e59fb8cfc87535ed8d4f,2024-11-29T14:08:24.607000 CVE-2024-20932,0,0,fa0e312fec16aadd8f7f6a8740585db3d83c5bfb73587981fca607f9365835f4,2024-11-21T08:53:27.550000 -CVE-2024-20933,0,0,d23fb7ed157c8818c5d6202c707c5af8c9cfaa0ee677e57670d562fdd1747c1f,2024-11-21T08:53:27.690000 +CVE-2024-20933,0,1,af7e2c6ae091b6b3568ab36265d3ae229c6833dd800da30fdeca3e4ea1d9639d,2025-03-26T16:15:19.277000 CVE-2024-20934,0,0,b65f965737a3e2891245c60dbd96bbfcead55912ea958deb1745b6d679d34da3,2024-11-21T08:53:27.817000 CVE-2024-20935,0,0,fb50273773637c8237056a5f8a044f59613cd802e29e7214b39fb546dc6c5406,2024-11-21T08:53:27.937000 CVE-2024-20936,0,0,5d4df234249aa2ab491dc91aa6c10f33af2a50a73812483f6640ba4c5e8d786f,2024-11-21T08:53:28.060000 @@ -249589,7 +249589,7 @@ CVE-2024-20948,0,0,478ff8498cda003af9bf356b574fdd7fbd60839750bfaac52ead4f2eae29c CVE-2024-20949,0,0,8447586b572938721504c1687180a68e63afc2fdacf6da4b480edb44c75dd7c0,2024-11-21T17:15:10.917000 CVE-2024-20950,0,0,f5c99eea8d10c44cb6306cc5eef489fdee68a2f90bacd64ab99a343812559bae,2024-11-21T08:53:29.690000 CVE-2024-20951,0,0,a912377cd9c5e3f36b663316c781a26423eb926f1a59dc0a2f3408b7c7125bd6,2024-11-29T14:07:57.480000 -CVE-2024-20952,0,0,974bc5f3b18c2e594a4d1c4bd936f6f9b31dc1a29fe2f12bc3faf51bb8eac324,2024-11-21T08:53:29.903000 +CVE-2024-20952,0,1,c859b01f6eb083bde4c1783d2fa87bb7e2cd35e513146bfd06000afb009e35c1,2025-03-26T15:03:47.983000 CVE-2024-20953,0,0,b4a3842d63eda45fd21efffeeef1cf36983cfc95e2e0ca5800a1d3edba0c6841,2025-03-10T20:23:29.163000 CVE-2024-20954,0,0,9afc2253774090ba4eb185e93f29f04799d88be99ccffcb7987fb70e621bc5d1,2024-12-06T19:38:00.843000 CVE-2024-20955,0,0,888e1b88ad65bdcadee36bf516889d82a35fb4b5c74e00f287b421d64597a1fe,2024-11-21T08:53:30.257000 @@ -249672,7 +249672,7 @@ CVE-2024-21028,0,0,540b79219f5e222f7319884f080746d7f3a0b5d84060a59af31e4a5b500bf CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000 CVE-2024-2103,0,0,d75ea97133463dd8923821c5ae7569e4e5c73171dd75a860d96581c3124dd721,2024-11-21T09:09:02.603000 CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044979,2024-11-21T08:53:39.080000 -CVE-2024-21031,0,1,d2c613cce14f1e8d0f65b6d844d15d36e99dd892ccc5bfd2d4f2c4e048d318a7,2025-03-26T14:15:30.167000 +CVE-2024-21031,0,0,d2c613cce14f1e8d0f65b6d844d15d36e99dd892ccc5bfd2d4f2c4e048d318a7,2025-03-26T14:15:30.167000 CVE-2024-21032,0,0,d866ba7453e451375479bb9ece1d42e7dc9d212a5d44ebbadf8c40772a9012db,2024-12-03T19:15:08.570000 CVE-2024-21033,0,0,a190cf24eefe3df88328553d504518f14ded069c8f92a734e4d65b6b23c47b20,2024-11-27T16:30:57.530000 CVE-2024-21034,0,0,ae9d308a305bca7ec9458e6d1f48c196a478086ae62d814b7be92c36ade87461,2025-02-10T23:15:11.760000 @@ -249714,7 +249714,7 @@ CVE-2024-21068,0,0,22cb123e2b550308d0173e521466dd982631e5a97ed4a6d7bc6a3b636818c CVE-2024-21069,0,0,c9f01955133ee2d7d88ba224021b6a44140d5daf435c1f4f00ecf007d265c6fa,2024-12-06T19:04:31.867000 CVE-2024-2107,0,0,f6b06b3b7d2a7fd14939cc7b98294c66c6c74558e1f24a1569c0e585aca9e3c5,2025-01-22T17:37:31.183000 CVE-2024-21070,0,0,8c69e86f327387e344a4a157732398076b6e10c698da182731e3238f871e4c5d,2024-12-06T17:08:50.733000 -CVE-2024-21071,0,0,ad9de5bdbf88b7ca7e98e8441723f697f87793b07a2985337f90fcea37bcfe55,2024-12-06T21:18:54.143000 +CVE-2024-21071,0,1,98ba86ec23aa4448542dbb9694cad9a5d659dff1a698e451bd9de1002956c26d,2025-03-26T15:15:48.580000 CVE-2024-21072,0,0,3ac71ebde404278590ff522ceda3046ad4c8241198899f7a8f9724077bcc2ed1,2024-12-06T21:13:10.447000 CVE-2024-21073,0,0,c01b594eaa263591053056bfcee1edb91ed63f3e7bf68e343858996c63ec24ff,2024-12-04T16:28:30.120000 CVE-2024-21074,0,0,8f4ec5b658a02500412292af4ee9e452284eb8282a132a7fe81ca7b52c84d377,2024-11-21T08:53:44.187000 @@ -249778,7 +249778,7 @@ CVE-2024-21127,0,0,67a10f5f0fc85cdc8789ba78da07daef45c209782b83e47ae52093c232bc7 CVE-2024-21128,0,0,c44ce21bcf71e11ff9e2e9ab22f575108d4bc20f3947f33ecd47d655ee6afb21,2024-12-10T14:43:26.337000 CVE-2024-21129,0,0,2c8e0b13d98477ae37358534ebfbe5e2257d99408b758e7e4434d44c0dbb5bfb,2024-11-21T08:53:50.347000 CVE-2024-2113,0,0,41b0f96e76e93eed3cae2f2e72bba8a01135ef4b0a02f5dee08a2bd1781b5f33,2025-01-23T19:15:23.377000 -CVE-2024-21130,0,0,d7e5f2ba7a349a01871ed99811d8326f2c33202d853400289e668060d42f27d9,2024-11-21T08:53:50.470000 +CVE-2024-21130,0,1,818d172a895500c2b148c652d94bc78fd5eefe88161296c8e3ef9fbb29725fae,2025-03-26T15:15:48.783000 CVE-2024-21131,0,0,82ebda074f809a1a68064798e632b773ed1eb2575acf313c66d554be3faf5e3b,2024-12-05T22:02:52.553000 CVE-2024-21132,0,0,987a799b19a7e7bd596caec84e5104553b08a672468aa5d0c46b6c2bb08b9bea,2025-03-17T22:15:12.270000 CVE-2024-21133,0,0,10f69656085c42e9a849d4dcabe83318eea049049395271942ef70a2534662e1,2024-11-21T08:53:50.837000 @@ -249811,7 +249811,7 @@ CVE-2024-21158,0,0,f78c67c7b7a2a8889d251d744d816fc3970c8c2c9af0b3bdf0fdbc5ec66e1 CVE-2024-21159,0,0,bbe3ce3a0b58a01f71158f43541300b4d6fdb30c4aebae8f8deafd5e31560cb8,2025-03-14T19:15:44.500000 CVE-2024-2116,0,0,8c6b9ce679687e5a6470a6b4b429a15c165f13f61e11f8d91ba5b3772cba32f2,2024-11-21T09:09:03.783000 CVE-2024-21160,0,0,682b113f0ab5e67f54e6f9c1540a647f198391e8c03fe35135f65b3d3e0f3bca,2024-11-21T08:53:54.043000 -CVE-2024-21161,0,1,1c1ccfb94a0118cd8f2f1e59ed4acd84701866eff7c401eaa2b4e60ce17bcfd4,2025-03-26T14:15:30.330000 +CVE-2024-21161,0,0,1c1ccfb94a0118cd8f2f1e59ed4acd84701866eff7c401eaa2b4e60ce17bcfd4,2025-03-26T14:15:30.330000 CVE-2024-21162,0,0,b167ca3f5e6eb1d829a66671152027eba0422ffba46e59b6bf288eebefc30ee8,2024-11-21T08:53:54.277000 CVE-2024-21163,0,0,3f9ff522a7e3208378a5962b8a62ba6fa5d09a853a4c6f834c9415a809343380,2025-03-17T19:15:21.793000 CVE-2024-21164,0,0,60ed2ad5154234319e608909d6aa6b8df5a629e4fa60a5cff387bbe8786b34cc,2025-03-18T19:15:42.340000 @@ -249835,7 +249835,7 @@ CVE-2024-2118,0,0,90cb76c5c814e7d67990c450cebf7bb6d1653c2e672663ac5cd14e6ab39eb8 CVE-2024-21180,0,0,b87fb7aa84c46c88b027098d3739fdadf84b3127cca6e21cc8407c52fd63302a,2024-11-21T08:53:56.423000 CVE-2024-21181,0,0,a60f1b0e57b0cd3e44233d07de0594e8054f38610c0cce1881bc557cb4ea1f48,2024-11-21T08:53:56.550000 CVE-2024-21182,0,0,c0ef1551cd608efb9923a47e75483009646ac3591abed59e9ff2ad6e0cf43351,2024-11-21T08:53:56.667000 -CVE-2024-21183,0,0,6249aa34dbb044e4f1eeff67db072798ecf143f18be834837f923e4eb3cce632,2024-11-21T08:53:56.780000 +CVE-2024-21183,0,1,ccf76df6ef2b2a6f291a2b546fdef7eb5ebda867e29558a4ef4d720ad7f5c94b,2025-03-26T15:15:48.967000 CVE-2024-21184,0,0,24425051df8220a39947a0a66cdd1a885e3fbd92924397baafaea753a30c1053,2024-11-21T08:53:56.900000 CVE-2024-21185,0,0,d11b8472760cc1a71cdf615720512123ec90591d3b9a4789f2cd9eb70aea98ef,2025-03-18T16:15:20.577000 CVE-2024-21188,0,0,b867f787163ea0fc535229c913fa94918dbe07ee8e34eb83d23b693ac18ed7bb,2025-03-13T20:15:17.120000 @@ -250837,7 +250837,7 @@ CVE-2024-2227,0,0,f4193cad275230e4a77caad12789eba12ab0bb05070cfcfc47b838d20d2627 CVE-2024-22270,0,0,686ed972793d7f5a552dfbb080535e83ba0afe88182341280195825995aa4303,2024-11-21T08:55:56.013000 CVE-2024-22271,0,0,75c1718838fa265bf8dac6e03c9384a09b6896e0d07a3322cc92b020117c5dd0,2024-11-21T08:55:56.137000 CVE-2024-22272,0,0,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000 -CVE-2024-22273,0,0,5e9e33d1e1e14feb4c5863d1baf1ed20326b2aa3742788726e4344e10c9149fc,2025-03-01T02:36:21.560000 +CVE-2024-22273,0,1,57d23372dcf9fbefdc38d1098eb55f47fbc7c3b9c8cc29f9336c883da00fab81,2025-03-26T16:15:19.423000 CVE-2024-22274,0,0,568316e85d4cace1f65225c3627bf29b9b513721d081155f7f0f0f60375a00ad,2024-11-21T08:55:56.530000 CVE-2024-22275,0,0,bc719934d47d6c144e92538461f9037d51dc70942f45443a583aba7da17d037b,2024-11-21T08:55:56.660000 CVE-2024-22276,0,0,a04a9e6d0ae5e9d579794d26ed880a69b39cf873a295c44f1908b9c4201e03dc,2024-11-21T08:55:56.780000 @@ -252494,7 +252494,7 @@ CVE-2024-24718,0,0,4d5e3410e61bbd02a288d90a0342880a4b5a72f157ac856479e80a9cb8712 CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000 CVE-2024-2472,0,0,b209d134dbd170e7e6b490589342ea2337c9cea4b16e58632262550a528f2274,2025-02-20T15:28:10.360000 CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000 -CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000 +CVE-2024-24721,0,1,094b45416d94e6a8b60b90bd33f19ec1daa039eb04c6f0f27291ad705c48c462,2025-03-26T16:15:19.597000 CVE-2024-24722,0,0,7b5845dda84394680d74b2cc018c3ce938b13ba0f12d7de4f088cff0c6fa2549,2025-03-25T16:15:18.830000 CVE-2024-24724,0,0,1d4f547e29f1ac6cd7eb5ae81fd8b236270fe4c23ef6bd5d247bd14b860d3f45,2024-11-21T08:59:35.290000 CVE-2024-24725,0,0,d017b08edcbd2a3884154e1dbc0dbc1ac3aa94a44515a00866c71ade3dc58c6c,2024-11-21T08:59:35.513000 @@ -253030,7 +253030,7 @@ CVE-2024-2541,0,0,5e4a53f51ba8752f74c9f57c8894c57856dd31a2758293bd1ba5d82829a52e CVE-2024-25410,0,0,34aa3a5dfa0b461c1402bfc8d040049deed5d9d55f98cca2b67ff82eb7e83a3f,2025-03-25T16:59:21.083000 CVE-2024-25411,0,0,139eeef6edada50361deb7799ace9009bc429357d81e031e0f6ba067fd7f71f4,2024-09-30T12:45:57.823000 CVE-2024-25412,0,0,d5179043597587363b5bafc5d06d1de914933f356a38962f7f4dc9de95c609e3,2025-03-13T17:15:29.430000 -CVE-2024-25413,0,1,ecb5621bbf7e3e04dceea8d9bde40a127e7c59c84eb6a988c7e0d2d9d20fc18a,2025-03-26T14:15:30.490000 +CVE-2024-25413,0,0,ecb5621bbf7e3e04dceea8d9bde40a127e7c59c84eb6a988c7e0d2d9d20fc18a,2025-03-26T14:15:30.490000 CVE-2024-25414,0,0,7418f702b21691b77dd56f68a3739785d38e6a10ad9224149c829d71e21a2d2e,2025-03-14T19:15:45.353000 CVE-2024-25415,0,0,8f911b9a1d1f98e52fdc9a7145ba7a1f87f3944fc95d6b97a9000411d18ab412,2025-01-13T14:19:37.827000 CVE-2024-25417,0,0,c29b6ab1323bd95346fedf8b44c41ad4566effb574b7f727557255b45f598d68,2024-11-21T09:00:46.457000 @@ -253723,7 +253723,7 @@ CVE-2024-26255,0,0,847195ce01c1207cc8d6e72f0230b73e61a17459b8f0aea992d668f4e99b2 CVE-2024-26256,0,0,2ace9b80acd1dd3709186c18a224e13e240b59b51c743a1e52cfc44e8c7b7b92,2025-01-08T16:03:05.373000 CVE-2024-26257,0,0,6bbf32f20548cfee7b6fe08b29c1830e10505a149e346718bf1ab9c7e655ca39,2024-12-05T19:11:37.323000 CVE-2024-26258,0,0,f44dbe4ece2a696fe76796e8cdd34f69e383db4a2848f8680d1714e4770f70a5,2024-11-26T08:15:04.673000 -CVE-2024-2626,0,0,187238078dced3a6eb09a09edaeaa9bf7f43988c2088701468fb3aeaed9e9f87,2024-11-21T09:10:09.767000 +CVE-2024-2626,0,1,ff32c79b81f7a128e0b7d23b7e1efe023e36cbc5862afe068128abc881e3a13d,2025-03-26T15:15:49.580000 CVE-2024-26260,0,0,1f90ca17c56815614464cb19e79726aeab2c86dc2d6ccc9d085e3a24d9763770,2025-01-23T19:55:55.470000 CVE-2024-26261,0,0,b4d31fea57f399e9dc0684ae2558c1666da2ae247eefdd4f884c6f1a31199668,2025-01-23T19:56:10.270000 CVE-2024-26262,0,0,e277816ae3debcc7ab807b771b0685b491300e697e41fab28532430348afd296,2025-01-23T19:56:40.100000 @@ -254965,7 +254965,7 @@ CVE-2024-2779,0,0,dacce2c27e96eef096b887cc0a7633872387d792cf54d816daebdb6ca6cf8c CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f431,2024-12-09T19:31:56.207000 CVE-2024-27791,0,0,cced26eba1922f922a989a68f8969cd506e95668cebd2d4731d8f0f634e4325a,2024-12-12T14:33:00.640000 CVE-2024-27792,0,0,9250caa2e43a6741d177d6e4ce22631bab55e30376cf1dbde675ce33436694e3,2025-03-13T15:15:42.490000 -CVE-2024-27793,0,1,d22abe8412fec76d7b57526eb5dd12ab49cdb6d769471bc72bb4ceb9e255116c,2025-03-26T14:15:30.717000 +CVE-2024-27793,0,0,d22abe8412fec76d7b57526eb5dd12ab49cdb6d769471bc72bb4ceb9e255116c,2025-03-26T14:15:30.717000 CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000 CVE-2024-27795,0,0,bc61503adf68bef3d0b5e26c5cbd2e390ccfc5f4b81aa9046af70ee4c1a76aca,2025-03-25T15:15:20.160000 CVE-2024-27796,0,0,29507f426e53036da7b53c85ed50d31725f49a7e326b571b9bcdf2b6bd7f5686,2024-12-09T19:22:11.867000 @@ -255568,7 +255568,7 @@ CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b48722 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 CVE-2024-2863,0,0,a5b592af60b81b1b665877763bf56c5ec2758267e95bafeacc6ae0c7642054e8,2024-11-21T09:10:42.503000 CVE-2024-28635,0,0,c36a286d2efa57f8f3dd16aa9309abc49ed3e74dfced2793f6c7b8905b7e167f,2024-11-21T09:06:42.367000 -CVE-2024-28639,0,0,c3d818d5c7f5eb0feffae38930cd9ee930ce1e830fa6140cd69a998011b8b07b,2024-12-16T22:56:31.737000 +CVE-2024-28639,0,1,e7a0e0b3ab0a4c3b57de2dc0a84196d1068993c21df426fe3caa9e5c75427b24,2025-03-26T15:15:49.150000 CVE-2024-2864,0,0,3c502f13e25ec0d6338270f38aa63b5e89435a030dae1785f088aeae83e8039f,2024-11-21T09:10:42.620000 CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e45d,2024-11-21T09:06:42.733000 CVE-2024-2865,0,0,5829b9f895a4ba79b3592f650e6f3b7b48b361c5424fd86986d5cdb1471edc67,2024-11-21T09:10:42.747000 @@ -255729,7 +255729,7 @@ CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff CVE-2024-2887,0,0,70a96806611abc951986b04e22c239259f8682e359651c93ff6f67c8b4acffc6,2024-12-20T13:48:51.147000 CVE-2024-28870,0,0,1948db6c1330344e0305cc9883b822c2b1c7846eda6f6ae64a39b3f568697ade,2024-11-21T09:07:05.013000 CVE-2024-28871,0,0,66beb860b668b240441f397870a5def3e52a27283cc1f106699d7ed5d3fb58ea,2024-11-21T09:07:05.180000 -CVE-2024-28872,0,0,8ec05321c564ebf02cf9ea5ae2ff11b0deea8154abde72d5969c0c62b8cb8210,2024-11-21T09:07:05.323000 +CVE-2024-28872,0,1,efd605e2b04b121c2231623009b4fa909abf78c19ec3893f1988cbfc577adb70,2025-03-26T15:15:49.380000 CVE-2024-28875,0,0,4dfb9c16f5bf82bf68888163d531fb859006c6398976e17b2766ff7841ca461a,2024-11-13T18:10:05.647000 CVE-2024-28876,0,0,275454f6648ae48abb7dd0bb2572cfbc3374f282a0e739572d5d9f74b7aeb1a2,2024-09-06T18:35:00.337000 CVE-2024-28877,0,0,70e500b76ecc62e6234b65a66cb44bb6349214814b90198f358629164177defb,2025-03-01T02:05:56.853000 @@ -259089,7 +259089,7 @@ CVE-2024-33227,0,0,3fbc4ebf1d23195453495f6c1cce636ed1dc862a1d19c9994ba9b2fd5a19b CVE-2024-33228,0,0,4ff4c4d7ddc1074e5b4192589b22e052d29851c95e677aa6861377786c6cb040,2024-11-21T09:16:40.857000 CVE-2024-3323,0,0,180d6f1e89bef845d0f58006ebd3f1d76afb6eb7e2839fcc43d7d8b2c850159b,2024-11-21T09:29:23.787000 CVE-2024-33231,0,0,a47f041b83b7d6fc91b5ead0a32e9e7a9ac19ef2c483a3b7f9c5a134053085d1,2024-11-19T21:57:32.967000 -CVE-2024-33247,0,0,c327dfec3341d6e1ad22073de33ee0854c160838f99c4dfd3df6bd69a54ac90d,2025-03-06T19:34:19.017000 +CVE-2024-33247,0,1,c56bff299b6f6029283ab45f5cfdb8ce6e0f330aad2f4f189aeef4fd3f9dd457,2025-03-26T15:15:49.923000 CVE-2024-3325,0,0,970662992d44c4496bd1cd63501302634c9c4877669706090d08eac5418f123d,2024-11-21T09:29:23.923000 CVE-2024-33250,0,0,4a20a6b53cc0cc2ba2056daf477d4e11c2d3162bfb1bc29c91792fbc22374429,2024-11-21T09:16:41.390000 CVE-2024-33253,0,0,2aa5aaf126e94e2ebb6e7920d3e43400587cc5bab3b143bfc2212ea050136444,2024-11-21T09:16:41.617000 @@ -259120,7 +259120,7 @@ CVE-2024-33300,0,0,fcfcc67a598fdec5020eaee48abef6ddc9c4f0ced0fdd6058b024ed4c721c CVE-2024-33302,0,0,57b80549fd8096e59e00a3e7e11124741f0adff181ffcd73a2aeb26a71758fd2,2024-11-21T09:16:46.207000 CVE-2024-33303,0,0,788999d70993e4029560429717cb0a5b52e1c75a670c402df99e894a2e38bb1f,2024-11-21T09:16:46.433000 CVE-2024-33304,0,0,29c021a3880698e20fcd7d239a85eabb88a80ce4d09af7c66815d1b48c062b25,2024-11-21T09:16:46.643000 -CVE-2024-33305,0,1,d872ba3229a671ba7898ca454c70b19f41ac4e35e9973c9cddb7f3043c93b4c1,2025-03-26T14:15:30.893000 +CVE-2024-33305,0,0,d872ba3229a671ba7898ca454c70b19f41ac4e35e9973c9cddb7f3043c93b4c1,2025-03-26T14:15:30.893000 CVE-2024-33306,0,0,c674ae8e870d8ea7b9496d624021eb490db8e79bf45d8ae6b6305d0dc1c3b509,2024-11-21T09:16:47.003000 CVE-2024-33307,0,0,ac7d56af44afb2c2b4a91577f9c8dba989c4554f34f5f7b59ad656ea25cfee5d,2024-11-21T09:16:47.213000 CVE-2024-33308,0,0,00a8a2c0784c175809445a9a47d85dd5333b912b9bfcfcc130d47e205cafb559,2024-11-21T09:16:47.373000 @@ -259153,7 +259153,7 @@ CVE-2024-33374,0,0,74f1d636f52a32c597b2978544934a629869471c51c9ae394bee1952eff3f CVE-2024-33375,0,0,8b9f6954db62e1201b0519745a8b070db578568bec1811c5590ccddf207e67c1,2025-03-13T14:15:26.580000 CVE-2024-33377,0,0,29f8e110cc22f81df8e9a24261e5d2f615523e4c26bc63c0f239422553649e90,2024-11-21T09:16:51.800000 CVE-2024-3338,0,0,aaca7ee1a3f34104491b6e4228027bd5fdc783b387ed9054553456cff4427f47,2025-01-28T18:09:40.723000 -CVE-2024-33382,0,0,daa43b1d7ff2d2bfabed375f4f82f5c5ca8a8e9d78e43e5ea3af98dbf1232506,2024-11-21T09:16:52.027000 +CVE-2024-33382,0,1,d4805cb020ac9b1f8db4027620c408b354d5f555ba1770589cfef3acddfab33c,2025-03-26T15:15:50.560000 CVE-2024-33383,0,0,9e2463eece43dfbfa8aebdf8f9e3371f9f6b21092fdc0e5bdb17c240e8d27450,2024-11-21T09:16:52.190000 CVE-2024-33386,0,0,c23af1c70fc3fe9ca218109ad8c4c43c7494439d5db75fee98f7665b96d71dd5,2024-05-16T09:15:13.600000 CVE-2024-33393,0,0,872b4aa0a904714599d1fa07ba1eef93484c03f03e9e08026f73897def40d8e6,2024-11-21T09:16:52.440000 @@ -260770,7 +260770,7 @@ CVE-2024-35550,0,0,d079bc591fef2ee47562226a6cef5cd7d71a01c9517a9642cbd679bc32eb2 CVE-2024-35551,0,0,ff5cc253fce064154dfaed4d5e5db73dc204620f6db0e89ce31937e1a09b3ef1,2025-03-25T16:15:22.753000 CVE-2024-35552,0,0,042aba9fb08df73d83660567b81407baa73700357ac5d736a4d062e42a1fe70b,2024-11-21T09:20:25.787000 CVE-2024-35553,0,0,115c0feea9424b7493ca7459fd25b73bc8bc20e87902d5c6eb78a00f40b37ec6,2024-11-21T09:20:26.017000 -CVE-2024-35554,0,0,a1d15cd013ee838bf9a7b676f532739f099be4f4add4d06322737677fed89479,2024-11-21T09:20:26.253000 +CVE-2024-35554,0,1,34b438c287c774a4e0509c63e4ec3f309af3b3046ae52fed2c1941a033788246,2025-03-26T16:15:19.830000 CVE-2024-35555,0,0,061be82ca6af357571f6ca2a78c4c2cad966fb4294440c1d63450145978c6e2c,2024-11-21T09:20:26.400000 CVE-2024-35556,0,0,8e886b3b0c0997fb8cd84b67dd9723579be606470e840b8497648081a27f714f,2024-11-21T09:20:26.620000 CVE-2024-35557,0,0,c469785e80af147960006495f555045a818b3a5f4863cf77e434cd6b8d5df7e3,2024-11-21T09:20:26.837000 @@ -262072,7 +262072,7 @@ CVE-2024-37114,0,0,0e338f534866d330a95b36232ba1ac57a12c5fc7a905167a67cb049f659de CVE-2024-37115,0,0,e783651c356206b0d0b31091b1d7fdfd8f50e51711b29e1739f1f53f55192af0,2024-11-21T09:23:13.233000 CVE-2024-37116,0,0,cf2143b54808e0aa7e8042d88b1d855be0847ac1fdf8dbc22640fe116a8cfd55,2024-11-21T09:23:13.350000 CVE-2024-37117,0,0,db6e34898cd1468733f11ea5de79282847ac1f5f907a8cc52b2cc65080ab13fc,2024-11-21T09:23:13.483000 -CVE-2024-37118,0,1,613312a0488d2b2f2e413fa130dac83c77460fac2193c3c1f1170ceca593a3fb,2025-03-26T14:15:31.097000 +CVE-2024-37118,0,0,613312a0488d2b2f2e413fa130dac83c77460fac2193c3c1f1170ceca593a3fb,2025-03-26T14:15:31.097000 CVE-2024-37119,0,0,b33708c838e59527facebb450a717de1c655f54d3e3de992a1177004b7a5ce61,2024-11-01T20:24:53.730000 CVE-2024-37120,0,0,d2171da3b8d523afb143949d3bcb23ff59f6918dac6368d589ddec24b7e960af,2024-11-21T09:23:14.157000 CVE-2024-37121,0,0,a18f9282725a0239063debc58ac94387d74058dfc6c6f36c75c46cdc5c5d0bc9,2024-11-21T09:23:14.317000 @@ -263084,7 +263084,7 @@ CVE-2024-38272,0,0,a428282e2328d115eecf027212d7fc44c92f6e65ea02e4ce22f32e52f49e0 CVE-2024-38273,0,0,583e36b17ccf9fd546e6b0c478617c872f29a6e7c94358acfe51e69d63fecdb5,2024-11-21T09:25:12.970000 CVE-2024-38274,0,0,14859913700373232d1af86c32719373e3e620e9eda58d5d2c9a70ab987de6d1,2024-11-21T09:25:13.803000 CVE-2024-38275,0,0,1e0d1b69d41da113a39375d1ef0adf52c5ccf90721d4eac00b4fba35587e90d9,2024-11-21T09:25:14.183000 -CVE-2024-38276,0,1,4eed17c921642b4e32f31f7232bcd28979704d3d93ebd0a1d7775251bc728751,2025-03-26T14:15:31.260000 +CVE-2024-38276,0,0,4eed17c921642b4e32f31f7232bcd28979704d3d93ebd0a1d7775251bc728751,2025-03-26T14:15:31.260000 CVE-2024-38277,0,0,6230d2e29114abb120b6de444e537d1a8333d5585a5b7abfd9c68149afd1cc24,2024-12-04T17:15:13.600000 CVE-2024-38278,0,0,b856e3395f4b8ae00a5aca2db9013fbf8a63a31489f5c2d30d69c2819fbe7a94,2024-11-21T09:25:15.127000 CVE-2024-38279,0,0,eeff22a05d58c637b41c8a0a9d81b68926d0e144c0c12891e0709d171d9db2bf,2024-11-21T09:25:15.470000 @@ -263252,7 +263252,7 @@ CVE-2024-38462,0,0,b488562b6e1e3080d85ed256a57dff6b8f4c4d3e9b77930531ac1876a124f CVE-2024-38465,0,0,0553ae590a5045c4a00ee690a5e30cab743003f2e2b850eae680f2615b0c9011,2025-03-14T01:15:39.683000 CVE-2024-38466,0,0,faf3d6c769d8d86583d648f5284021456d7899dd934ac364cd0e325b75bf8ed5,2025-03-19T20:15:18.590000 CVE-2024-38467,0,0,caf9acd7cc458a3d14ff8cb7e6429702effcc0ca3533a6066e1ff41ba88e568b,2024-11-21T09:26:00 -CVE-2024-38468,0,0,f9c8ba626246015283ec95ee672d5890382c7cb042b08d04e6efb4886ecbd5fe,2024-11-21T09:26:00.370000 +CVE-2024-38468,0,1,c1d496a853535ce65946f36778e82ede8c59680f7696d1f0a000757108ebfe1d,2025-03-26T16:15:20.060000 CVE-2024-38469,0,0,709e5cc6e5aa933183c1136a6638ff0b784482a2d42a0ee2e4cc71f144247f6b,2024-11-21T09:26:00.630000 CVE-2024-3847,0,0,21711e7b0912c812c2eee5766c676d73d26cd06684dcef9ab53e870dc31337d8,2024-12-19T15:08:38.647000 CVE-2024-38470,0,0,5e707236cb2e99d16551b25c24b90020007c67744e0b7a80bacccaf0b4dbbf90,2024-11-21T09:26:00.980000 @@ -264536,7 +264536,7 @@ CVE-2024-40101,0,0,5bdb2e8f2571881865018ae9258456ef3354760d07b9ba22859fe6143cbad CVE-2024-4011,0,0,023a65dd1f5eb72b47a28389dd0798106b90c6451db9a08d936ec1bf45bba714,2024-11-21T09:42:01.843000 CVE-2024-40110,0,0,b8e6266ff01e4f6fccf032090a514bfd36067c1dd2b23a05c2e6f0558c80bcae,2024-11-21T09:30:57.123000 CVE-2024-40111,0,0,80cd14bf03baf8d7fa3686700a06fa7ff2a7a3bff428d9889f26d90e74833388,2024-08-26T17:35:05.733000 -CVE-2024-40116,0,0,6325b2287e709ade72651c2c7576838314c4ef6cdaadf0e5eb18a74271662c2e,2024-11-21T09:30:57.560000 +CVE-2024-40116,0,1,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670222,2025-03-26T16:15:20.330000 CVE-2024-40117,0,0,2a65d8ca9f0e21ab04eb67f5b55ddbb907f00fc8747a1174398adffad7e2c4b6,2024-11-21T09:30:57.700000 CVE-2024-40119,0,0,350b537a9703bb479d3aeed53ee034530a7a303e34e5836f5efa11a1efa4ddeb,2024-11-21T09:30:57.907000 CVE-2024-4012,0,0,072e2e877b4c908d6a63775f432a4c14231de854a8f0ac87700711aa9cb1d6cc,2025-02-11T02:15:34.820000 @@ -264673,7 +264673,7 @@ CVE-2024-40540,0,0,5bd5a9100f91f5fa6a8f94b817d5fbe4f2c459da54494bef26a01b8f06865 CVE-2024-40541,0,0,c3887fea144be4e36d11aa92e4cf4212425a9879331d9fe2c45957fe7107c804,2024-11-21T09:31:16.680000 CVE-2024-40542,0,0,d9940a948ee9a7abb7ed0f1346a39634b30a8dcbe309032f4aebffd3a276c315,2024-11-21T09:31:16.900000 CVE-2024-40543,0,0,c3421b0474ba5e681dc31056d05767213d52bf65c917f76b410154340a0b2c30,2024-11-21T09:31:17.107000 -CVE-2024-40544,0,0,f7bce3d20391036e8ee9825d40303df24181556f12d11ee178f08af47247cc0d,2024-11-21T09:31:17.313000 +CVE-2024-40544,0,1,32f6fe0695b35bc82178ee1c732de2709ce6866b850b7e8b59083267eec1d14c,2025-03-26T16:15:20.577000 CVE-2024-40545,0,0,10cda9154c77b01a6617d455c4524864e033fe872e2dd2685f7b76f92dc03a63,2024-11-21T09:31:17.450000 CVE-2024-40546,0,0,8d574ea7bec4057a56c560025dcae101e82798387df870e1755786d9ea0f96f9,2024-11-21T09:31:17.650000 CVE-2024-40547,0,0,d2cbb70babaddcfcb4795263be2e6b340bcfd72a6fcd2086d1ba66505ceaf8f5,2025-03-13T13:15:41.050000 @@ -265401,11 +265401,11 @@ CVE-2024-41476,0,0,36071a8bb76fa7000bdd44fd6508ba17d20e4aae8303bd257093c61563aaa CVE-2024-4148,0,0,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000 CVE-2024-41481,0,0,8208c7d3079ff59622479471ec534e219ab8ebf8f0a17d77e9eb69a949649acb,2025-03-20T14:15:19.977000 CVE-2024-41482,0,0,0a596a5cf7b27067c86547cf8e385cb1be782f18b5f9b3af58ba9ccf7350b075,2025-03-25T17:16:04.003000 -CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000 +CVE-2024-4149,0,1,ce35c5dabaf9e62f62b27cc2db90363703ad2249bc96cfb9d4c9aa830d3e1498,2025-03-26T15:15:52.433000 CVE-2024-41492,0,0,d4569622d2ded7aa848fdcf6b8717deae380d497519daf4660cbe4b6bde4ae2b,2024-11-21T09:32:43.510000 CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000 CVE-2024-4151,0,0,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000 -CVE-2024-41511,0,0,bb04702719f78dbe27bfde7789933fae7dea1190d0ea2966cfe5a76ebec1292b,2024-10-07T19:37:09.727000 +CVE-2024-41511,0,1,7341e41898908c99a098782c8238000226ab2b8c28e6aa64fa9caacd7d694694,2025-03-26T15:15:51.120000 CVE-2024-41512,0,0,8ed9894a2356fc8a5e33ac367f8ff5afc2f0f1518d8c76c3254841044c9619e7,2024-10-07T19:37:09.920000 CVE-2024-41513,0,0,f407b983e55d5d0baada892820380826649691acec248a40ab1d73cdbfc4717d,2024-10-07T19:37:10.700000 CVE-2024-41514,0,0,05f5e3a1cfa1896b2e5ccfe5df123f76797c52ee91f200a727b709ddc09333a2,2024-10-07T19:37:11.483000 @@ -265421,7 +265421,7 @@ CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a8 CVE-2024-41550,0,0,f550993cd5b5dc9cc85253f185c4436ed9356e5f718dbcaa508d382b497c985f,2024-11-21T09:32:45.557000 CVE-2024-41551,0,0,e1d018116726b59a859c54c726d033d68adc85dd274a77d026bca8345fe434d1,2024-11-21T09:32:45.760000 CVE-2024-4156,0,0,6f9b01015adaa4ff0ac52ad6f60aa60b33aca22e2236ec15beacb1162f132472,2025-01-15T18:04:58.607000 -CVE-2024-41564,0,0,24f60296f7995573baa861824a54d1622bd6248d719f1fa88e107bb7ee60a876,2024-09-19T14:40:32.270000 +CVE-2024-41564,0,1,2bb2178918f188b17592dad4937334f566157fe1501db35a1853489ddbeda975,2025-03-26T15:15:51.477000 CVE-2024-41565,0,0,0ecfc74b71285a3bb92ec1970dd72d869ab39b938d1991389f1bf9e096dec42b,2025-03-19T15:15:48.870000 CVE-2024-4157,0,0,29d22a0a757cca99ea487ddaea2d2e53381fd88b5244509866bd98027aec7fca,2025-02-06T18:36:20.893000 CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913c6d,2024-08-29T13:32:21.020000 @@ -266362,7 +266362,7 @@ CVE-2024-42610,0,0,654fdc1095297ef20028e3cf1fb102c6fa17fbcd6956cf108f0012e5c09c2 CVE-2024-42611,0,0,116bcac36582d493948fef45f35eaa80fd008eef3b89011f6aaeb408da90e5bc,2024-08-21T13:11:27.467000 CVE-2024-42612,0,0,abac7d5d938599c249ed43a69d41c59973bda34fa909901e89c4eb33004b08a9,2024-08-21T14:35:12.920000 CVE-2024-42613,0,0,ea580196e513b4c1988c08abdbc574abfd629197ead80dd0483c02298dfc0a28,2024-08-21T13:11:06.807000 -CVE-2024-42616,0,0,d285164fd61a7378928bd77c36153786fe28c62bd1a38101b2948371b7f604c2,2024-08-21T13:10:56.257000 +CVE-2024-42616,0,1,78b52579990174304c586690e24d465b532630ddd510ee134d19dfd67ac5e9f3,2025-03-26T15:15:51.890000 CVE-2024-42617,0,0,d568abca0bfa0fee4bc3020c42f3020218ecd94a2095e7b3c1034f4d89c454e8,2024-08-21T13:09:48.897000 CVE-2024-42618,0,0,3b83859bc44da6ed5d9c37102fea10282bde377572f68809f9c64acd574c5845,2024-08-21T13:09:33.787000 CVE-2024-42619,0,0,29a1611fd8fc8abcf32a9a41fa6ab2a9cf8f36858ea1a396f71c0460be576ccd,2024-08-21T12:30:33.697000 @@ -268422,7 +268422,7 @@ CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303 CVE-2024-45346,0,0,556b0325369db812da5d3ca351593663eeefcc15146e049af11d00d6b0f23de3,2025-03-14T17:15:47.590000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,78f0543f36f54882e03e81f0faf12704615c89d5497f070efb8f0b2a49e7c790,2025-03-25T15:15:23.147000 -CVE-2024-45351,1,1,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000 +CVE-2024-45351,0,0,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000 CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000 CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000 CVE-2024-45367,0,0,64e84bc9ed60e849e1ae71705aae4a59b4ff0cb910f064adb8ff87e0d48d255e,2024-10-04T13:50:43.727000 @@ -270740,7 +270740,7 @@ CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 CVE-2024-48814,0,0,e0fd310be8f6c6c0398b3d476623ef8046cc307663b5065ef443208fabb22b0c,2025-01-03T20:15:27.807000 -CVE-2024-48818,0,0,7f6643c18e5363483fbdb3276d4aa6bc68cb8b70a5318b13559009438629a275,2025-03-25T20:15:22.320000 +CVE-2024-48818,0,1,91dadbbc2cfb558b8a8eaf462117df5454bce390b475d1964778026e33f573b7,2025-03-26T15:15:52.140000 CVE-2024-4882,0,0,dc37469f83c6f76dd10a96e5c23a6af6fb8abe948d7498605d4e6a451db926c5,2024-11-21T09:43:47.037000 CVE-2024-48821,0,0,f0cbfcee9159be9d30ea4c7fe6db07bb6253e3db4d3703b7a96dc956155f20b6,2025-03-24T18:15:19.720000 CVE-2024-48822,0,0,69f3cc78945ebd1f42b52e8f89d117d2566be2d6770d56a2268cf3b44c134d82,2025-03-18T19:15:45.140000 @@ -275300,10 +275300,10 @@ CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6 CVE-2024-55009,0,0,4d88f6b549f01d05c58601be5c8229fe460db1c49b9016496ca0b7d11afb4b4a,2025-03-24T17:45:45.890000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000 -CVE-2024-55028,0,0,4d36b322d82c52a6c87984d4643f88dbb32cbf0b6a0db95a134474d7722b34c1,2025-03-25T21:15:41.467000 +CVE-2024-55028,0,1,b7f81cfee32f5051ab02159e3f7f042ddffef22550a1322529959888d21bc660,2025-03-26T15:15:52.693000 CVE-2024-55029,0,0,8e9d17c32cb0f3056fbc5d475c3144cad63b54bc042ab61b48b2075b5cacd98b,2025-03-25T21:15:41.573000 CVE-2024-5503,0,0,9845e42fb1624974feec370d0d7a831f8d27d3205ac47bd2622c9c03ded76cc7,2024-11-21T09:47:49.763000 -CVE-2024-55030,0,0,57ccacde1345d480a77c08eea3e1cb590a19b7470bda9e2e8cb8cab49022b744,2025-03-25T21:15:41.687000 +CVE-2024-55030,0,1,95dd30a6dd192d61a769d1565886bdf6ac03c88eafe5a0a7a52eeae349544fb1,2025-03-26T15:15:52.960000 CVE-2024-5504,0,0,7dafb0f0cd419f596fa945f00f7adb9bf7572316e58a9dc5a4cc280c9eb8f4f3,2024-11-21T09:47:49.917000 CVE-2024-5505,0,0,ef8367efb8e62f4d28c1b33787b307fdb06367b98441e7dd6605a6aed68ed8eb,2024-11-21T09:47:50.067000 CVE-2024-55056,0,0,e4d25ddc6083015ebf135f83b6769cba5fcf3cff3f15e5f248fa5c5cc30a892e,2024-12-17T22:15:07.217000 @@ -276351,7 +276351,7 @@ CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000 CVE-2024-56898,0,0,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000 -CVE-2024-5690,0,1,14af1e261c62ea8d86b88db2c6193508d93346579e927b833ccae3d6b9c2bcad,2025-03-26T14:15:31.660000 +CVE-2024-5690,0,0,14af1e261c62ea8d86b88db2c6193508d93346579e927b833ccae3d6b9c2bcad,2025-03-26T14:15:31.660000 CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000 CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000 CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7888,2025-03-04T22:15:39.547000 @@ -278887,7 +278887,7 @@ CVE-2024-7800,0,0,314b20b4b05c83532bf162a23ffc99eb50e7574ab46f7ded33fe4926c17ff3 CVE-2024-7801,0,0,e5c6deb5a4496184d51e3590a07a7085301637c1bbacbb4c87c9dcfa4ff154b2,2024-10-17T15:19:27.053000 CVE-2024-7804,0,0,7e31f7ed2adf2595e5ccd9c8061d4b1de0a467008f86400fb2a8e99d18487c87,2025-03-20T10:15:37.767000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 -CVE-2024-7806,0,0,dbf893cfe7125e278727fc7e82a7c1f74aaf6df7ef810d579a679a72ee48bdb4,2025-03-20T16:15:14.117000 +CVE-2024-7806,0,1,e37819367eee09ad29841e00a48e7c8fc809aa8ca749e070ae0a73c6c976c9e4,2025-03-26T16:46:35.783000 CVE-2024-7807,0,0,2f79e8d22e5d6ed09b318ab38ea343291c76b7890ace2830ff2b3c8694390017,2025-01-09T18:15:29.543000 CVE-2024-7808,0,0,bb1828c81a3b84a8342519d95321b11078705fc2b1d99465e4e8c42d641f8bea,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,4de1a8a25d11d8e52025dd237836ebadcc65c1c2ee83865739b48b94d2bf4321,2025-02-18T17:36:46.073000 @@ -279090,12 +279090,12 @@ CVE-2024-8017,0,0,ea56c7bf8eb38e2d4e7e58ff92c306a35976ef8c44fc4a49e3b980f754a2fc CVE-2024-8018,0,0,b8c20f5a4f2fc5436d3ac38cb7a75fe37b9cb60fb1945631278f884d470a7c26,2025-03-20T10:15:38.887000 CVE-2024-8019,0,0,bb182db4bfbe05f6a84537c31baa0c2aaec5545cab87ab321e5da54100fe90a1,2025-03-20T10:15:39.010000 CVE-2024-8020,0,0,fa987960b8a774cbf037e063005c0b324f93d2e0a94f93a2b4ef65edcdce8a4a,2025-03-20T10:15:39.137000 -CVE-2024-8021,0,0,a055516974f1f21aa13cb03e5664f29ba4b7f7a9c0ea04cdf5cbdc8fa9977c2b,2025-03-20T14:15:21.883000 +CVE-2024-8021,0,1,c2837fa2a071bf22f340b435bd7de37ed9b3e5fb0c4834fe700c1037d6455dec,2025-03-26T16:39:28.747000 CVE-2024-8022,0,0,ee3d8b54bc0b0b17ad96b91114790ab25b5a536bbe36cb188cba8f36dec52123,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,61a92bc8448dc47a65d0bd143c811b4c703b14e871acdf616b3acef8aff34c21,2024-08-21T12:30:33.697000 CVE-2024-8024,0,0,30c9a8089ceeeda9655203bb74a7245fda58cdd04d0b9b62aa301e080c05ec58,2025-03-20T10:15:39.380000 CVE-2024-8025,0,0,70061881b166a3a1a51ca6087abec369478d3afe4c5d3b16bf1339b5559f41f2,2024-12-11T14:02:07.930000 -CVE-2024-8026,0,0,99f4d62e0ce927f6349397bb3b0db149412ded65157f863e01d4e9c6e5c6b899,2025-03-20T16:15:14.220000 +CVE-2024-8026,0,1,8a8ede881691417ae135689224ae8469f35004c05e468d6662f10654c2bb1781,2025-03-26T16:26:39.410000 CVE-2024-8027,0,0,db607212454b886b83e8d96a31fd4bb5ffb8ccd7da1d27d5e8ae3cd3289c152a,2025-03-20T10:15:39.627000 CVE-2024-8028,0,0,b582a171768bef2da12ed17733a2e5edc293c1b074e58cc845322f2edcc8ec9d,2025-03-20T10:15:39.750000 CVE-2024-8029,0,0,0aa06e5ae9d61613974b14b300a731c03abb2704cdf4bb2cf07d8e909a71ccf1,2025-03-20T10:15:39.870000 @@ -279119,7 +279119,7 @@ CVE-2024-8048,0,0,ff295b9c9c8fa93e0c6a3b5204f97237c28cc4185a00b44db9d7dce4c3cc3b CVE-2024-8049,0,0,274cda9f191d2467ab1f7fb567537911ee77e963260dcea32ea2b6e62622893b,2024-11-18T17:46:38.177000 CVE-2024-8051,0,0,8e9fee878d5e7631408c4906ee6d422d2dad39846c3e9dba922a4347408befb7,2024-09-27T18:19:41.863000 CVE-2024-8052,0,0,01bfdadf93739fc2d4fcd8ca2ee549a442e377fc63e756e286ed6ad0eef90332,2024-09-27T16:55:57.383000 -CVE-2024-8053,0,0,77d976713edbada3c7cd7a973e41ba208daea12d46660b2910f577775a05f079,2025-03-20T14:15:21.977000 +CVE-2024-8053,0,1,169d95c94960b5e7d9ae8a8a40db343b8e9737228e79ca7bbe9aa364fa18d8f1,2025-03-26T16:18:07.887000 CVE-2024-8054,0,0,7587a87813e515f4d1b36dbcf3c7051a83e94df022103a0c59749ae8c66becaa,2024-09-27T21:29:57.607000 CVE-2024-8055,0,0,defac75074f99c813190522e4786e6558148cab7b0432b3c8d8db6ce00cb167a,2025-03-20T10:15:40.127000 CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670dcc,2024-09-27T21:29:42.600000 @@ -279128,7 +279128,7 @@ CVE-2024-8058,0,0,6f6e6d86a899b2d6ecf84c7bb695389cf6cd8969a74da9d0894bff6a25056e CVE-2024-8059,0,0,1cb4facf7c91a3d9a97ccb8a1f3191711112656d77de35de0353c495e40da8b5,2024-09-14T11:47:14.677000 CVE-2024-8060,0,0,d8eff68c8d7c8efc7fc6e4c96b092be043e631d873a04f7fbd1039d53aea64b8,2025-03-20T10:15:40.373000 CVE-2024-8061,0,0,d98d52c81fe7de7b3205d434779877219f820f89cedd005ddfe4fa226d3dd735,2025-03-20T10:15:40.500000 -CVE-2024-8062,0,0,35ceb1d87170f35532b47d04949f14ddf5fa0b9e744b505406c88c4fbc053590,2025-03-20T16:15:14.310000 +CVE-2024-8062,0,1,f38c19e16ac199b6b86ab6fcae8332efb56fb95ec4e8e7b12f43cb9a51345726,2025-03-26T16:10:51.357000 CVE-2024-8063,0,0,912f022ab1916af943d6fab8dce07912505a7cf51770afc7479af7a56bb0d87d,2025-03-20T10:15:40.757000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8065,0,0,7754de9dad4899b80cd9247114c15089721daa8b0bff85b2022181822063d53e,2025-03-20T10:15:40.887000 @@ -281805,7 +281805,7 @@ CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b4750 CVE-2025-1408,0,0,0a01b5e9486d3003cf6a37adb1cb318494940890109f9521eca9987d98d841a3,2025-03-22T05:15:38.353000 CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000 CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000 -CVE-2025-1413,0,0,66d6334b5b3ce2a5ffd2689297e5c1bb234e6299d8a70ce39e1288c295632ed0,2025-02-28T09:15:11.850000 +CVE-2025-1413,0,1,5c3f38d9cc7b7010909c2af97131be7654555b0227082bf07ca01df8093ffd5a,2025-03-26T16:15:20.833000 CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 CVE-2025-1424,0,0,028aeccf06b420fd3ae1e41e07745fbc6608efab9b9570b82ad820d0434865c8,2025-03-04T16:15:36.663000 CVE-2025-1425,0,0,5581bc90886ae6a96bcdd3391932814fcfec4b3e066f6fbd2840021651a3a39d,2025-03-04T16:15:36.803000 @@ -282413,6 +282413,7 @@ CVE-2025-2094,0,0,3e5ee39cc0a675dd0c15afc2b6791944ec5d3c2ba160d1386794216358be78 CVE-2025-2095,0,0,71d9f913ad815fcab33ca1136e0d25e87c703f96f82d2dc64d2641467787effc,2025-03-07T23:15:16.010000 CVE-2025-2096,0,0,af6c5c76a3dad6f1c03117307233e51d4618ce9d8f85eb1cc544ed18018f06a5,2025-03-07T23:15:16.137000 CVE-2025-2097,0,0,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000 +CVE-2025-2098,1,1,762fea99f48c1af72f54459c46cd6cfe88c27337fa81f5962f8beff04e36ab62,2025-03-26T16:15:23.540000 CVE-2025-2103,0,0,66785fbbbc6e79524b79719e0582b7cace266d7eb12b69729c7b5d6a3a95ac8b,2025-03-21T15:06:58.433000 CVE-2025-2104,0,0,e1b2becb11199b91c54995f4dcab6f963f90bd1c000b7e47fc291eb2dd25a605,2025-03-13T05:15:28.303000 CVE-2025-2106,0,0,12e6a433d251be1a7b8caba06a5be90b0fd1db509f397a8d7d7499b4e464efdf,2025-03-13T02:15:13.097000 @@ -283186,8 +283187,9 @@ CVE-2025-22273,0,0,6c9d7725782f958c923a6ea8774468e0170596aa9881023a369fbcc7dbb76 CVE-2025-22274,0,0,9ed113d142012585656c9e3f5258e49cefb29c38570f54e9755e8c339f67d326,2025-03-05T16:15:38.243000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 -CVE-2025-2228,1,1,7c4dbf9df3e2041d0f72623d538d0cfea3524f59e553085385573320f86576ff,2025-03-26T13:15:36.373000 +CVE-2025-2228,0,0,7c4dbf9df3e2041d0f72623d538d0cfea3524f59e553085385573320f86576ff,2025-03-26T13:15:36.373000 CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000 +CVE-2025-22283,1,1,29e5eea62efa0d69cba2f2d3329548d518d155ebf0b4efbb3919d2ae3cb65c3d,2025-03-26T15:15:53.340000 CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000 CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000 CVE-2025-22289,0,0,c3fff7c693f7011a88fe12ae53f3272daabbb7eaba44f91bdfbd8cb84b6200ee,2025-02-16T23:15:09.567000 @@ -283758,7 +283760,7 @@ CVE-2025-2320,0,0,54ae946db1d94a75f9dee3622c14a5b8a38a4658dc5f404d7fbaa5736fae52 CVE-2025-23200,0,0,fcacc2d32c11a77659f45b1c51ab5a2465fad7ac9e692296dea6d4d1e65fa678,2025-03-25T15:12:30.793000 CVE-2025-23201,0,0,4d8c8be7d792ec95ab743052e2d6709ed532d05183a33bd3169c195787cd72a5,2025-03-25T14:57:12.250000 CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83bb0,2025-01-17T21:15:11.713000 -CVE-2025-23203,1,1,779e9fb4b3e6743c7670bff2c8e35aa04cae5b5468ccae62545313736f6b0e82,2025-03-26T14:15:32.250000 +CVE-2025-23203,0,0,779e9fb4b3e6743c7670bff2c8e35aa04cae5b5468ccae62545313736f6b0e82,2025-03-26T14:15:32.250000 CVE-2025-23204,0,0,852563d4629aa8d2f2c033762b9d2f2c48787d0793c09ac0c2cd01bbaa7239d7,2025-03-24T17:15:20.417000 CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000 CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000 @@ -283874,12 +283876,15 @@ CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda7 CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000 CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000 CVE-2025-23457,0,0,986871805bb278c802f2d565eaf70f336dd71bac5bf52dcdc838d471378e54a5,2025-01-27T14:15:28.373000 +CVE-2025-23459,1,1,d9a84827c34f52ce6392c5e6f9339929820323c3d673eb1fa93b8ee11260d5d1,2025-03-26T15:15:53.600000 CVE-2025-2346,0,0,dfe04d72071ce6bb23146ee2138a680ba4ba5b66b1f78d42526f36466bfdce9b,2025-03-16T20:15:11.603000 +CVE-2025-23460,1,1,68730ddf3712f00e2bb34d4e81597240aa664f127f5e6ead36f5e04b450768bd,2025-03-26T15:15:53.830000 CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000 CVE-2025-23462,0,0,f1d946acd1b6b97ba142139f225fbf51751f08a101be4aaf7927889e6462f843,2025-01-22T15:15:15.800000 CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 CVE-2025-23464,0,0,2d2dec24b28420bd0cc62f320b0cd789ea9ec6fe1293ce5d1d92b41bfb20ab9c,2025-03-03T14:15:36.070000 CVE-2025-23465,0,0,5453b3fbdaaf8a6c6dae1cf225d47e064bf67f3d39cf8a5f667393b17cc9666c,2025-03-03T14:15:36.213000 +CVE-2025-23466,1,1,0c68da93aa0f4a58ec7202b8661bdb844763b389d1cfa0f2e2a7b64aa7f6c357,2025-03-26T15:15:54.100000 CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000 CVE-2025-23468,0,0,146612e9c0cde7fecc23e59a0f5a84ad09e5f947fb41b9a85847d1878aa53ed4,2025-03-03T14:15:36.357000 CVE-2025-2347,0,0,6d75516c075b836c4a01e68c47692310fec13caea4697fda8bd7ced096f44e82,2025-03-16T21:15:37.617000 @@ -283961,8 +283966,11 @@ CVE-2025-23539,0,0,be303a20cbc7b1d2e02eab06e0eadfd1f1526947724f5c4802f240539d3fd CVE-2025-2354,0,0,e84136ea8fb6fb77175e6108c811f3104e930330b3255815d66f355819af2862,2025-03-17T00:15:12.873000 CVE-2025-23540,0,0,575604080a7e41dafefd577008aef472e583d091e6d52248a1f21517385238a3,2025-01-23T16:15:37.577000 CVE-2025-23541,0,0,a1bc5006e3c889ba7c285bf5fa18384216ad56e7a9867f658d1b550cc20b4769,2025-01-23T16:15:37.737000 +CVE-2025-23542,1,1,6e2d9872c37603f33a02be08baf13c8c1114cf325dfc0a8d6ee53430f49b5e5f,2025-03-26T15:15:55.610000 +CVE-2025-23543,1,1,fe787b758e2edda06393ab04c83168432443ed842a794a5809abf026deacd04f,2025-03-26T15:15:57.723000 CVE-2025-23544,0,0,4ed653671a235a9aa2508fedc1a9b552630d378203557455d39060521497ae62,2025-01-23T16:15:37.897000 CVE-2025-23545,0,0,a51f95b294effe458db270d2606087be8df680dcb349024e6c23e9e2892cfe53,2025-01-23T16:15:38.070000 +CVE-2025-23546,1,1,7dd19d90d2afafd9709ccd7d8375f4dabd7e81de1c5d82f220b37d6043ddf2b8,2025-03-26T15:15:57.993000 CVE-2025-23547,0,0,6f6ff07f3f424280073fce42bfdec78cd39e7aff8dc91e913640e544d32ed50a,2025-01-16T20:15:39.220000 CVE-2025-23548,0,0,e905040ef039a1c5ad85c3aa19f245ea1e7bac617283c354a7559da726c93724,2025-01-22T15:15:17.423000 CVE-2025-23549,0,0,0e187ab3540cad4ff05c9de83d915cce040ddf22d69d0f1c7a4c1b6a45a3bdb6,2025-03-03T14:15:40.613000 @@ -284032,6 +284040,7 @@ CVE-2025-23609,0,0,2d1ae51d827307d5688ebafc347a4adf6cd78f47bdcd33d55e01a23dfca2a CVE-2025-2361,0,0,70618654b4e9e66cd7decce6fb0803096f4baa51100e2a75b51be673a71f05da,2025-03-21T22:15:26.110000 CVE-2025-23610,0,0,0bcb81d57261851ef09d1ff4eef60d378fd3132dcc27872e262fb4f82499c82e,2025-01-22T15:15:19.473000 CVE-2025-23611,0,0,d85c3eaa2a359ab1dd0cf8fc2d813b125c4ab2ba5978c80ec826f8303b177a52,2025-01-22T15:15:19.610000 +CVE-2025-23612,1,1,735261d4ab39b71ec1e8e7076432f55e0920e69c0d617c6f23e5a74759931354,2025-03-26T15:15:58.283000 CVE-2025-23613,0,0,43926c9b1e96f0a71fe86cd36b5f0babf0459d8e1d39896f0c7bd144e4f07310,2025-03-03T14:15:43.860000 CVE-2025-23614,0,0,36691364b676964b65f6a3791ab255bbea85c7108423915a116f27407f31bc3a,2025-02-03T15:15:22.270000 CVE-2025-23615,0,0,ede0e0c26e76f23c55904f6cb505796accbaebe174753effb440d24cf3c99ea6,2025-03-03T14:15:43.997000 @@ -284053,10 +284062,13 @@ CVE-2025-23629,0,0,01b9b5cb6314ff066c0384dbc296f566c2de494bce7708202e96de9eafd12 CVE-2025-2363,0,0,9abac84208905b4c2f99f60e00657d9fe808e6ad265c94606dc1fcda4654ba46,2025-03-17T06:15:25.387000 CVE-2025-23630,0,0,eeae9b548f90cb80fe09928d6af68398fad99a026c84c09866f64bbbceca5e8f,2025-01-22T15:15:19.877000 CVE-2025-23631,0,0,486c44b1477ef022b6afd511bfe7371c7a5e1239049e868a97d94bc96c8d247a,2025-01-22T15:15:20.013000 +CVE-2025-23632,1,1,84a37ee51a4a636f1703d77986e8ba01ee2648c8fb3b459efcf2105ade018db9,2025-03-26T15:15:58.530000 +CVE-2025-23633,1,1,e99555baa3fa16d48c9c15f5395b1891a956f6e66bd8da7df8e10439605d3d61,2025-03-26T15:15:58.753000 CVE-2025-23634,0,0,48e783563d53ec984be5a175a9f79a779ede5638e8c7f47318c460f317ddeb1f,2025-01-23T16:15:38.840000 CVE-2025-23635,0,0,37219eaebcaf3c95cdd30f56d8e0031cbfd6f4aaee3ea55f7fbb76a80836830f,2025-03-03T14:15:44.413000 CVE-2025-23636,0,0,e471135e103e9f1102462023b0c8331f734cc9749182a76b579e62c7d60e2121,2025-01-23T16:15:38.983000 CVE-2025-23637,0,0,b42ce519797a1817c2b62d7ca7bb179191fd50d636f74ef0ccaecacad055e0a9,2025-03-03T14:15:44.553000 +CVE-2025-23638,1,1,e9dd08d5790e457cbaa025e2f97b1ae1cb6cba39d7f4f30bbe653802c13fd2f9,2025-03-26T15:15:58.940000 CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000 CVE-2025-2364,0,0,5c312b04e0df9c622ba1f443d00b1462589018150930a082b5cb2a248fccff3b,2025-03-17T06:15:25.683000 CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000 @@ -284087,6 +284099,7 @@ CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1 CVE-2025-23663,0,0,3b16fc5cd07873df17f7adf46ae853f4e8ae4c12979739b879112e0d5296e236,2025-03-03T14:15:44.693000 CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 +CVE-2025-23666,1,1,9a8085cf59e759cc3858e2f5748f2a1692154518295d3ee3c98ef6b5dd9d01f1,2025-03-26T15:16:00.870000 CVE-2025-23668,0,0,447d6cc5f5b3f62673ad968834c74d2e9518d05227dc3654233c5c4a54f289f5,2025-03-03T14:15:44.833000 CVE-2025-23669,0,0,d1bc630e712a78731f318fb10d255700aeb84fda668fd5568dd1716510645cc3,2025-01-27T15:15:12.423000 CVE-2025-2367,0,0,4d73770789db1facbca63b2d8cd60986d4545ac6ded14131c05ca81384a93d38,2025-03-17T08:15:11.283000 @@ -284101,6 +284114,7 @@ CVE-2025-23677,0,0,4f1d78d3726e731bfdb135ac6135bd5100b5ae0cb26c60d465015a36da99e CVE-2025-23678,0,0,9070a09dd2eb20f51e2be62ec561b8270cc7eb4237f6eb49d0590f00449b80ff,2025-01-22T15:15:20.703000 CVE-2025-23679,0,0,605904da624c6d61b6f79440676d8b8f5ed42e36d8e30bd2573ed441e38c8caa,2025-01-22T15:15:20.840000 CVE-2025-2368,0,0,9c0966e2341375fba186854ccd8546fef6822618e3b692cd4ee08027a7e24e47,2025-03-17T08:15:11.493000 +CVE-2025-23680,1,1,9c39263ebcd001913fea05c7643d68e57bd3d9ef162a2b21476d34c90ce76a09,2025-03-26T15:16:02.850000 CVE-2025-23681,0,0,f163c52d273d1d7a5f132a356a6eb42ef72b66e82cae27dbeef89ea694e8a3b1,2025-01-22T15:15:20.977000 CVE-2025-23682,0,0,5a2b91d4ab77287a6b2315a23f445649f10628cbef22963db89fe1e3e45dad15,2025-01-22T15:15:21.123000 CVE-2025-23683,0,0,11ab818cdded601704d5457da26238366cc9a2cdec8e1cfa4e95b50fb941a5bd,2025-01-22T15:15:21.260000 @@ -284126,6 +284140,7 @@ CVE-2025-23700,0,0,d6b854ba2a7ba8f802de41aae9e17aa6b7e882f7d5fe1274a9929cac1e98d CVE-2025-23701,0,0,e59b3ab6fdf37256033e4fff48d732e2f6885469aa12acc75ecdd961fe6019fb,2025-01-22T15:15:22.250000 CVE-2025-23702,0,0,c6087cb20ed5d5e18a0f143ed78da44b9304f988bd02c1f96e1ffd07550520eb,2025-01-16T20:15:45.213000 CVE-2025-23703,0,0,80d20080ae636ff64d3abc90ff0d9b20e73943a9d0425a8d457e36c9952ac466,2025-01-16T20:15:45.350000 +CVE-2025-23704,1,1,93ded4ec0e3383a63bb61f5785a2e1adf5a0c44b5eab4892312e3fd634e4f071,2025-03-26T15:16:03.380000 CVE-2025-23706,0,0,1c58de75e6405013dc186ef4d25aefeacede7fb99c2053dd68a64490798cf7f0,2025-01-22T15:15:22.387000 CVE-2025-23708,0,0,eca4a26e61bfe7d5a4e9902977260b188ae344ef1b45725f171e324e5412b97a,2025-01-16T20:15:45.493000 CVE-2025-23709,0,0,e1c3380e956af79f5cad205fcce83fd1f43f70a0f6bfc4c7acffa78387fad54e,2025-01-22T15:15:22.510000 @@ -284134,6 +284149,7 @@ CVE-2025-23710,0,0,45dbc592fe3473641cdbf2e1a14db4016a63a47b44096e0e2c864d61e4448 CVE-2025-23711,0,0,2fcdef9ca63b638205dcb9063506c231a8c0b85956b4bdb5e0ed4971a83681b5,2025-01-24T11:15:10.813000 CVE-2025-23712,0,0,94aa96484213156f9d49bbdc6963c4fd02ab0d8cdee27a020eca5b412a516f8b,2025-01-16T20:15:45.800000 CVE-2025-23713,0,0,e91ea4a4691cd6ea54cef5c014a380cbfb6e447d22416c2178d1e94d8d5e41a9,2025-01-16T20:15:45.940000 +CVE-2025-23714,1,1,2825866e33556a853fd8015a4b5ae50bb21564bebe4fa83704773c44ef51284a,2025-03-26T15:16:03.907000 CVE-2025-23715,0,0,0640be33a6d521fa9ce6237978250a0e811e0054ca0a5799459a317b8874e4f3,2025-01-16T20:15:46.083000 CVE-2025-23716,0,0,5171367fa24c2ec535ec8ea7104719d68a955f76a3c2d0f044290181daa866e4,2025-03-03T14:15:45.270000 CVE-2025-23717,0,0,79ec33c46c47146faede274dbb2e9b9df8747f6c2068f93e33c80d094e53ab2c,2025-01-16T20:15:46.247000 @@ -284147,6 +284163,7 @@ CVE-2025-23724,0,0,85759521dcceb6293655a1d413ae191700de02fc83895c480951d54c5ee55 CVE-2025-23725,0,0,b40e5b6eb6e24477dabcc116432421fc90ad60ce2752a67c8fd0c42466cd8176,2025-01-23T16:15:39.530000 CVE-2025-23726,0,0,a0fe614e020ba83fd462ec8b650e58782b0f231ad13d901184fdc4a3771c9110,2025-03-03T14:15:45.723000 CVE-2025-23727,0,0,06939e0ba718c2d1654b535cb4acdd19bc47301ebc0414aba09b8f3cba82ca80,2025-01-23T16:15:39.660000 +CVE-2025-23728,1,1,8409d4a88916a0f24d0646d66a28c96695ebec6ed62eb8f99145255ca7e50d0e,2025-03-26T15:16:04.433000 CVE-2025-23729,0,0,cf1c2fd2efceda0b2319b0d4ce7dee8c6bda7b3cf825d2b54b8fdeafbe7c4d3c,2025-01-23T16:15:39.790000 CVE-2025-2373,0,0,380defb7bc84301be16272190656571d01437643e78dda7d3eb6485a92c756f0,2025-03-17T11:15:38.113000 CVE-2025-23730,0,0,6a3d7db8e71ff2248054b5e3980c0318785193417fad4c6b63c6b17ed4394eb7,2025-01-23T16:15:39.933000 @@ -284154,6 +284171,7 @@ CVE-2025-23731,0,0,7b8447e98cf75bdd89bd1daf32a2cac60c92c405281240a88eada8c988c06 CVE-2025-23732,0,0,a319b2653140b4341d08717a159e17e281e96faa4531ef7eaf2b0aebc3064bd0,2025-01-22T15:15:22.640000 CVE-2025-23733,0,0,ba14d7b711147bcf408bf8e6bd2e361fbeeaf786be070e9273bee40e739e6a4d,2025-01-23T16:15:40.073000 CVE-2025-23734,0,0,d08399ebf6e8fdb4054e549d4b1f5dfafe09daa5e675446b005341c5933da542,2025-01-24T11:15:10.967000 +CVE-2025-23735,1,1,935ee2ad4c637a373f4014d2b3d79447a677b87f0d07983ee3d808221b2e53ad,2025-03-26T15:16:06.437000 CVE-2025-23736,0,0,493a042cb31b6b5306b02facd810c198708aca4614c0f820934b8a65f42b454b,2025-03-03T14:15:46.003000 CVE-2025-23737,0,0,607d60dbc000683cdb744c3f8a0ff459baac89a608490796576d67926bb66926,2025-01-24T11:15:11.103000 CVE-2025-23738,0,0,45681ac312c33efad51ea49920fadb51fe5ad8b4e9d1c3051a360c48a0a94bdc,2025-03-03T14:15:46.157000 @@ -284369,6 +284387,7 @@ CVE-2025-23933,0,0,5314812bb5bb73b3b9600ea0aa8e888771464c5c0299b578bc9a093b69f0f CVE-2025-23934,0,0,a8cb5365e4d11290f220de8207cb9b17a94fa7b952841219eee098e5e9d7f9bb,2025-01-16T21:15:35.367000 CVE-2025-23935,0,0,ca08ce402e61c79c9cce49de15d3ecbafe399b661fba20811ddb663494117ab8,2025-01-27T10:15:09.193000 CVE-2025-23936,0,0,98ce9dfbd803e0feff46465ce5ff38cf3522df4082c1a68d72eabd4f11de5228,2025-01-16T21:15:35.677000 +CVE-2025-23937,1,1,85f04f65e9840b01373d7d34c0a04c105e73a2e224ec47f3477f9fb9cf8a9c9d,2025-03-26T15:16:06.673000 CVE-2025-23938,0,0,438b15ad1eea423b560430fc5288274b54ffb3c0766a3e5d562d307b1f9edc22,2025-01-22T15:15:25.967000 CVE-2025-23939,0,0,b227fdb5ca72e62491a5d98a4ab01cce82bbd9f83860732763526745b1f362c4,2025-01-16T21:15:35.910000 CVE-2025-23940,0,0,9e516bed5aa526650bb86798b45bda26374c4c5498fa69a2ccaa76e3d1fb0ffa,2025-01-16T21:15:36.087000 @@ -284384,6 +284403,7 @@ CVE-2025-23949,0,0,d90495090ae00e6e58d5cfea56b4f220cf8c7c1a45a835ce24e1ea30c09f9 CVE-2025-2395,0,0,8db22957e69f6bbc9dec5c4ad48012ffedb8bf0219d8dbf60bb6e01857e50bd6,2025-03-17T06:15:25.910000 CVE-2025-23950,0,0,4ac29c4dd1a428d4afa0ee44a692bfd3a045bfda7b0c1933c7ec004bbdec77a8,2025-01-16T21:15:36.817000 CVE-2025-23951,0,0,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb84b,2025-01-16T21:15:36.983000 +CVE-2025-23952,1,1,66ea2c896add7384e048b04be089c4c4e7f5e464057466d899663244d259b6eb,2025-03-26T15:16:06.913000 CVE-2025-23953,0,0,f6f03bfe88f28bb6450de0d0a10e28b0ddc76002765b30baa9464de96156821e,2025-01-22T15:15:26.670000 CVE-2025-23954,0,0,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144287,2025-01-16T21:15:37.133000 CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000 @@ -284395,6 +284415,7 @@ CVE-2025-23960,0,0,fef5413834349b73f28bcc0fec0108a4368773674c1a2ae5d7728e978b829 CVE-2025-23961,0,0,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000 CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 +CVE-2025-23964,1,1,6889c307d06c290637cb1ab96d1695a73195f8888bdc52e3742b0cf71e80a34c,2025-03-26T15:16:07.173000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000 @@ -284807,6 +284828,7 @@ CVE-2025-24686,0,0,97742af3eda9d56646da5ea63ea29d8b115553c2b1043bb2326cc5cadc437 CVE-2025-24687,0,0,11d3d0659ecf4c039f736e74dabe04e8b6a481e88fe64abc5509f1c1b498a5e0,2025-01-24T18:15:42.283000 CVE-2025-24688,0,0,b24311e7a9891067f09c432bc1a81e9feeb9adac508b88240dc400596e99de7d,2025-02-14T13:15:49.910000 CVE-2025-24689,0,0,70a27061e8b0633b0958a705695b21ab3e50470132d440b4823f73ecd6b6d393,2025-01-27T15:15:16.073000 +CVE-2025-24690,1,1,ec38efcd8491ae4a1addf80c1f4313e83707d81805389381ca6daca2ead1fdec,2025-03-26T15:16:07.407000 CVE-2025-24691,0,0,a9ecb50c9c5d82c8ecfc70917b5c56e667dfa57f33c8e4cb10ee7b326b2f95b1,2025-01-24T18:15:42.433000 CVE-2025-24692,0,0,4f3862dd5d5dfdfb8e9ec9276452e566888a0246b5bd370541ff930cf3e495a6,2025-02-14T13:15:50.050000 CVE-2025-24693,0,0,c7bef0dbde3fa8449c3a078a65549f5280577af242006cc996d29313a11fb18f,2025-01-24T18:15:42.597000 @@ -284901,7 +284923,7 @@ CVE-2025-24804,0,0,f7d104b626bdf579e836087298c08c14a0ce3cc2eea658e65d733074620ff CVE-2025-24805,0,0,ec139300c8aba94d67e6328d56741782b279b0f8fae86fc167a59b6e24537407,2025-02-05T19:15:46.487000 CVE-2025-24806,0,0,09fa1e87d8fedd5d28ff5cb9bac6bc7267715c2451739d08475197db5a3aa60a,2025-02-19T18:15:24.467000 CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2f91,2025-02-21T15:26:57.507000 -CVE-2025-24808,1,1,0aa13ed25a26648a2b5dcde507dfbc4d121d040e062cdf4833c05f1c70d9015e,2025-03-26T14:15:32.417000 +CVE-2025-24808,0,1,eb8c03a85e5a0b4334ba1721c4f793b5b4f69a07bcb40be207ceebe068e6f853,2025-03-26T15:16:07.630000 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 @@ -284989,6 +285011,7 @@ CVE-2025-24967,0,0,1c50949fac013da6e9270ba4035d03fad3fe3bacaf2e070d29068d518d318 CVE-2025-24968,0,0,e07f901cf7b356f85243eb69a8d49d189b396867f0cba0e1d10bbb82d5ac61c1,2025-02-04T20:15:50.997000 CVE-2025-24970,0,0,1ec79588f47d61fc7f5eddb1acee5b0ffee64dc90dbd9954713ce89fba4e7d11,2025-02-21T18:15:36.383000 CVE-2025-24971,0,0,793f718b4bfb5d7a7a1d927b157b1ca84e15924b7b8def879502f3162eb90333,2025-02-04T20:15:51.150000 +CVE-2025-24972,1,1,510d2c886f60e953834a66532fab06eaaeb447e7c62c4fd28b84209cf20c8a3a,2025-03-26T15:16:07.920000 CVE-2025-24973,0,0,4e0ec487b13ad29adffd9e40afc6f86ee9194b71c6b3a7da9dc820821aed9598,2025-02-11T16:15:52.020000 CVE-2025-24974,0,0,214e30f9ad1dadb8e549793c24ba043d3276d9cc0ee2f6629636929f8ed1e7c0,2025-03-21T15:40:04.130000 CVE-2025-24976,0,0,d3c2a0ec7f5c1f646ba24311fc47878f0806891920501766ac3a68c935b89720,2025-02-11T16:15:52.163000 @@ -285094,6 +285117,7 @@ CVE-2025-25130,0,0,fd90066c05794bf8a80f9a4a86278162cbcceaff0a4b0e424f0a8a94fffbe CVE-2025-25131,0,0,3de1761f5748603061958b384600ceb9ed047e5b8428dfde2abe96a44a7079f2,2025-03-03T14:15:52.777000 CVE-2025-25132,0,0,edd5f2fbc08e2b3bad0873af9a761d855e2808023b51db2d3982aeb907f20c7a,2025-03-03T14:15:52.917000 CVE-2025-25133,0,0,ca3eeda941991b09349dd2bfc23cd30c06dbd086407da3a24fa8e0bac6c986be,2025-03-03T14:15:53.060000 +CVE-2025-25134,1,1,a77b15be31169cc29e81154e78ac0848114dd93ef2501d7e171179d935106d37,2025-03-26T15:16:08.190000 CVE-2025-25135,0,0,238a7464065012476597d7378a7ce292977f12606cd0a077568b6ceec8b00845,2025-02-07T10:15:18.320000 CVE-2025-25136,0,0,42c0c261cf9eb8be4dc24ad7ec4abc766f8d93d01752ada40296d4ffa1184d99,2025-02-07T10:15:18.497000 CVE-2025-25137,0,0,c01f913cb4a985db4be7952c984b5d7b59a678a8ea405e7e0ca55ce742925c42,2025-03-03T14:15:53.200000 @@ -285143,7 +285167,7 @@ CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aa CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000 CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000 CVE-2025-25192,0,0,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000 -CVE-2025-25193,0,1,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e690105ec,2025-03-26T13:14:32.087000 +CVE-2025-25193,0,0,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e690105ec,2025-03-26T13:14:32.087000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000 CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000 @@ -285223,10 +285247,10 @@ CVE-2025-2536,0,0,6c8f59f7c1397de65b62b4e0ffba855ba6e95346e685349bc06dd79321df74 CVE-2025-25361,0,0,9f115844287b15ce6dc125807b19b8e446ec3f37878f01ccb8db0422e8bb780e,2025-03-07T20:15:37.673000 CVE-2025-25362,0,0,c8d9b00ad653f3fefb15ba0fdb75a1597ea822f23192e332e875ad1563a7f537,2025-03-06T15:15:17.277000 CVE-2025-25363,0,0,2ff7284dab4cf6e7dac449878bc4c3befcaefea48f9623fa86a7928dded159ae,2025-03-19T19:15:44.390000 -CVE-2025-25371,0,1,801e4b37189c9dad7fb5e2e3396fb3093f554bca1f5d91f21ec9b2ccbd67a971,2025-03-26T14:15:32.570000 -CVE-2025-25372,0,1,bd6c798a3d63a7e4b9e6386b41594605579638469d2ad087e0afb7050c816f73,2025-03-26T14:15:32.750000 -CVE-2025-25373,0,0,7e04f63e8920527d9c23c4bf431b95c25c533789674eda06c7715d56abc84e7f,2025-03-25T21:15:42.140000 -CVE-2025-25374,0,1,7d8ed1f91d3b52bd8231a49b1c9b1c1eed580edf57511466a9bc5a1b312dc6a8,2025-03-26T14:15:32.930000 +CVE-2025-25371,0,0,801e4b37189c9dad7fb5e2e3396fb3093f554bca1f5d91f21ec9b2ccbd67a971,2025-03-26T14:15:32.570000 +CVE-2025-25372,0,0,bd6c798a3d63a7e4b9e6386b41594605579638469d2ad087e0afb7050c816f73,2025-03-26T14:15:32.750000 +CVE-2025-25373,0,1,ff2573cf088a0ef098fe3d6ef81147a576c35fda0e4808d8eac6f06e4bda1b6b,2025-03-26T15:16:08.443000 +CVE-2025-25374,0,0,7d8ed1f91d3b52bd8231a49b1c9b1c1eed580edf57511466a9bc5a1b312dc6a8,2025-03-26T14:15:32.930000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-2538,0,0,f2c0784ab082ec7998020fccbee47813e4a5143320b7cba59c05b6b8071d6104,2025-03-25T14:15:29.270000 CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000 @@ -285609,7 +285633,7 @@ CVE-2025-2651,0,0,d9b1054ab98174b67980c64949f28fa7d8fe5cf8f88cc487ecefa60439ceb3 CVE-2025-26511,0,0,5821dfa9ec884c136a5cce2e30ef6411210f7cca8ca28def218ae523a096d84c,2025-02-14T00:15:07.667000 CVE-2025-26512,0,0,d76d0cc1f2586ce565eb21fc4ce7566cd96fc5d9a631265b823e2dc73c5c0cb8,2025-03-25T00:15:15.183000 CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000 -CVE-2025-2652,0,0,13ff8d5f1214168cc0bd9abab130757983a053df4956d56eb856ba4be1901ee2,2025-03-24T13:15:27.757000 +CVE-2025-2652,0,1,a1cb75b63ddf5989b6fa64191f54ac1403b781340529a95dec9b56887e6bee5d,2025-03-26T15:16:11.270000 CVE-2025-26520,0,0,ba194be47bd9d3f863191be1fe91614122666503cc65593c3b5d3845ece3a845,2025-03-03T14:52:47.173000 CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000 CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000 @@ -285626,12 +285650,18 @@ CVE-2025-26532,0,0,5e501a7d3709b2aa8c5be9125b3a76235831b0b4b3b67ef6bc1a6c982c27e CVE-2025-26533,0,0,a18d4f4a5a0ac1e162dfff41acb3a5f496590937464ceb83e8fe84ab406903e7,2025-02-24T21:15:11.057000 CVE-2025-26534,0,0,ab467a5c9c98bcf93d9b7ea4108c47f6694cf2610d3631b8a1fb0fc39b004fbd,2025-03-03T14:15:54.757000 CVE-2025-26535,0,0,565367cf0af5ec55fb84aa51b9f3cdbadac3508258cd3a35844455f68691b45e,2025-03-03T14:15:54.900000 +CVE-2025-26536,1,1,a56d2b36a8a05b598eea4731c51b3786aef285846bdef5c55dbb2bd152dab2df,2025-03-26T15:16:08.890000 +CVE-2025-26537,1,1,676eb24ce961fe85c6ea6027baac15f6d9d9a63d8968e476e8e21d29838e3670,2025-03-26T15:16:09.130000 CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 -CVE-2025-2654,0,1,9e79f29088bbaf11c5508f96c7fac0e9b201880a1d7548c53811e79a32728bf7,2025-03-26T14:54:37.560000 +CVE-2025-2654,0,0,9e79f29088bbaf11c5508f96c7fac0e9b201880a1d7548c53811e79a32728bf7,2025-03-26T14:54:37.560000 CVE-2025-26540,0,0,08a03edcb3fb5cbf83ab6f143d7641096163430d54f5e1cdf4c07f2284606837,2025-03-03T14:15:55.037000 +CVE-2025-26541,1,1,b323b84dc96d5a7b317847aec004012ea089375b5bba9ea149b211d4569b4b44,2025-03-26T15:16:09.357000 +CVE-2025-26542,1,1,4d5c79b673b643c35ece2503e8b04ff96b3f346384d2cbefe93db583a5521f2e,2025-03-26T15:16:09.613000 CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000 +CVE-2025-26544,1,1,5df6a71a177ff1b42dcc2823915584bbbb55294bb9e2cc8019d80d76fcda623a,2025-03-26T15:16:09.850000 CVE-2025-26545,0,0,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000 +CVE-2025-26546,1,1,d82b82adfb37f53bfc42f7ecad5a2ed2d39efca4b7db0b3d2a6f7fa7fa1b1f87,2025-03-26T15:16:10.050000 CVE-2025-26547,0,0,e08dcb76a1a156827a53523cfc389ec01817f240b8063496d38b458c276a6d4a,2025-02-13T14:16:20.347000 CVE-2025-26548,0,0,cd05686a0a50272445a28504e5b38420a263cc63ec3b3405ba9e595bd73a1de1,2025-03-15T22:15:12.933000 CVE-2025-26549,0,0,a91c3170bbcc373aaf39cde5374b44949bf89c60e7eb9052278e26cc0b4c7b8c,2025-02-13T14:16:20.663000 @@ -285645,10 +285675,15 @@ CVE-2025-26555,0,0,8898f939c1f3b06208fcbca27b512a2729f44c7c0bc288687ea9e89ae9c7e CVE-2025-26556,0,0,e936c6301d857291f0e6be084ca2e219cca4c6c69b351347c940407d6f2411cd,2025-03-15T22:15:13.553000 CVE-2025-26557,0,0,78fcbed318c980adb806849ae60b5051c97a5ad5bb4ce5ea0a885ea6b945f93d,2025-03-03T14:15:55.173000 CVE-2025-26558,0,0,a062ee3114c1fd8a9a3b12a23d155f52de34c21e7fb6b719fabc3bfc4229ad95,2025-02-13T14:16:22.130000 +CVE-2025-26559,1,1,6d2376a8f931c476209091c8d26b1c280602b593b2b8af44b333d7eed1961e99,2025-03-26T15:16:10.203000 CVE-2025-2656,0,0,52108aeffa7d95739dff2c789bc9a29cc2066db2585fc74beea27bb0a23b7e4b,2025-03-23T17:15:29.867000 +CVE-2025-26560,1,1,4118014d8c91c9e28ebeec913275f359d7b174b4af8a5312e2046a8390b5a1b8,2025-03-26T15:16:10.363000 CVE-2025-26561,0,0,9db6fc955870504ffcf58626e676807e01c595a1a1593cd3c1cecbb59b4da31a,2025-02-13T14:16:22.450000 CVE-2025-26562,0,0,78c3ae54a6c695c17d29fde5c9737279cebca6b65324878f65a4af2921bdd7d5,2025-02-13T14:16:22.607000 CVE-2025-26563,0,0,4748440159882f70493b76b915cfd5e07b6cb7c88518a748fc4f26c2e284470d,2025-03-03T14:15:55.310000 +CVE-2025-26564,1,1,f04e7b3f8a534e923ff792424f15a22bf405aaa30e388feb4e6c39246f1e3297,2025-03-26T15:16:10.533000 +CVE-2025-26565,1,1,db05c0a6d7175d826a23924e7305ac106d332439e20057bffe4b7d7d04abd2a4,2025-03-26T15:16:10.687000 +CVE-2025-26566,1,1,4029d95c77a631321ead107272c3997c4a2ecab784396547d2f928c120fdbe4f,2025-03-26T15:16:10.863000 CVE-2025-26567,0,0,9c52f3fc1e49f60743513ba1ed12dcbfda98a9640ff0dad0a481c93829413d86,2025-02-13T14:16:22.763000 CVE-2025-26568,0,0,6a192b29369c6b3335433454f2c2e808bd01940f79d2fba0874a491ae58acee8,2025-02-13T14:16:22.910000 CVE-2025-26569,0,0,9a179d6db4962531369c0769d72d435114b34b89fbe8cbd8217294dfd6d060d0,2025-02-13T14:16:23.070000 @@ -285656,12 +285691,19 @@ CVE-2025-2657,0,0,6059a3586066afefc3ce6837cbae0fd09f969bd39a57bdf4682860f827aceb CVE-2025-26570,0,0,133b85e85f99f07d5ae5ecac4283b448b37499dc43ecdd79dc648a2455c0535b,2025-02-13T14:16:23.223000 CVE-2025-26571,0,0,b105d2cdbd20e2d2ded790a7a4b9a9a9137ec6330f85d27581834a218d316787,2025-02-13T14:16:23.360000 CVE-2025-26572,0,0,9140f77702f57a3238ad2beba036e4bc493e3ef2ab92220731d09a747095ca2b,2025-02-13T14:16:23.507000 +CVE-2025-26573,1,1,89e18cabc6f66e8b88f61661c12c283684ed43d94dbe65bb725e96f2c350677a,2025-03-26T15:16:11.040000 CVE-2025-26574,0,0,aee7747cfbd0c681f024ac4ed76ba08f83fb65ed9950f90b478784b8baf8c654,2025-02-13T14:16:23.653000 +CVE-2025-26575,1,1,103461f42c9df0cd38b31c89374ac577729bca8f1c7f3aa6dc1293feb687b9e0,2025-03-26T15:16:11.203000 +CVE-2025-26576,1,1,4ac26ef1d441254e4798391dca79fe739027099f9487216407b6fd944eb5db43,2025-03-26T15:16:11.363000 CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f9a6,2025-02-13T14:16:23.797000 CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 +CVE-2025-26579,1,1,29a849d143812c6d21ff8bc1fe9252040f08454a2cdeb116ab5bf05c74dbb0ed,2025-03-26T15:16:11.557000 CVE-2025-2658,0,0,a610f7662b1e2f0956fcf506a78680755e3de43250034fe19f8378ae1e47ba6b,2025-03-23T18:15:14.533000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 +CVE-2025-26581,1,1,3df0863e7f004d8b3a05cc158d639f9e306e5f9be8cc2eb5292e22a86faa34cd,2025-03-26T15:16:11.720000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 +CVE-2025-26583,1,1,60065d4710e1a3ea011bf9e78d305daa13233cb11c5221b33c0a4fc68e736f1a,2025-03-26T15:16:11.903000 +CVE-2025-26584,1,1,7d5c364229faee3e7508d4b503dc157b82202fb931d0b148c11e9b1f2547585f,2025-03-26T15:16:12.063000 CVE-2025-26585,0,0,92032c09be1592164acb96287b82c62eb88a8f0bba053ae93a1e251b4204853d,2025-03-03T14:15:55.470000 CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8cc20,2025-03-03T14:15:55.640000 CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000 @@ -285731,11 +285773,13 @@ CVE-2025-26706,0,0,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e74 CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000 CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000 CVE-2025-2671,0,0,ff323274946feee978f3035f65d2b13b8471bd80748e845b932a8fcd6a7349f8,2025-03-23T22:15:13.513000 -CVE-2025-2672,0,1,1ad4f5c720df57a16e54455c07c8ba01830bc9ccd3c6fc6d0f2dc7c0cdc8b322,2025-03-26T14:37:30.087000 -CVE-2025-2673,0,1,44164d43dd7a4b78996de070528755e6da7c21ce7c771f342d11af93caf1eb75,2025-03-26T14:15:40.467000 -CVE-2025-2674,0,1,234b19a0f4d2045310cc995f98433e6e71ee9c2c3ff27b3472c279a410384106,2025-03-26T14:09:08.730000 +CVE-2025-2672,0,0,1ad4f5c720df57a16e54455c07c8ba01830bc9ccd3c6fc6d0f2dc7c0cdc8b322,2025-03-26T14:37:30.087000 +CVE-2025-2673,0,0,44164d43dd7a4b78996de070528755e6da7c21ce7c771f342d11af93caf1eb75,2025-03-26T14:15:40.467000 +CVE-2025-26739,1,1,75fc575a14cfbe8fadd1c46a72d3c765ba9458568d3ed1060899814a74f524dd,2025-03-26T15:16:12.233000 +CVE-2025-2674,0,0,234b19a0f4d2045310cc995f98433e6e71ee9c2c3ff27b3472c279a410384106,2025-03-26T14:09:08.730000 CVE-2025-26742,0,0,d153ad3877dccd4a4de0cc8817c1b7a7991210fc5c296b3ca1c8b12dcf86929e,2025-03-25T15:15:24.803000 -CVE-2025-2675,0,1,a44c23b3c6eb403feede7f07b62a3195c75d0aaf189d379810936f38997636fe,2025-03-26T14:03:31.380000 +CVE-2025-26747,1,1,66c4ae6b8c7f7b667723674624e6f60db32c8d5286e64394ef3ef406a7c4f1a6,2025-03-26T15:16:12.390000 +CVE-2025-2675,0,0,a44c23b3c6eb403feede7f07b62a3195c75d0aaf189d379810936f38997636fe,2025-03-26T14:03:31.380000 CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000 CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000 CVE-2025-26752,0,0,de5f26c0c725b106ce7f39cb1c013f91e7db3ad53711569dd4e04f93f6febcc6,2025-02-25T15:15:23.597000 @@ -285746,7 +285790,7 @@ CVE-2025-26756,0,0,a7d018e1af803d931a8df90ebdc612d9159f81541f17aec331fcf30be95f9 CVE-2025-26757,0,0,80d208c1ae63305798dd96e121d883ba1652b7f9f061f31e63f086130d7d717b,2025-02-22T16:15:31.493000 CVE-2025-26758,0,0,25b40533aee409aa2cd331b2ce18cbaf3edeb379df8662b725fd0ff6cbb28f34,2025-02-17T12:15:28.407000 CVE-2025-26759,0,0,711cfe1a3f1e64585c04ae86c12c769c732825e1fb249553e9081d3ae4e51992,2025-02-16T23:15:10.777000 -CVE-2025-2676,0,1,f651abf35c4fd02355a5eedd8dc46ad5582fdbba97477491fd397ab68e7704ef,2025-03-26T13:55:26.630000 +CVE-2025-2676,0,0,f651abf35c4fd02355a5eedd8dc46ad5582fdbba97477491fd397ab68e7704ef,2025-03-26T13:55:26.630000 CVE-2025-26760,0,0,6ce75bdb24ca7f76541cf2fd588811a129a1da7e93670a47e5e982b0f015f1a0,2025-02-22T16:15:31.633000 CVE-2025-26761,0,0,00fb3a7da1af944660d71a3efffc99fa612b6b6a3bd94f13b9ebbbe6b2a8b567,2025-02-16T23:15:10.920000 CVE-2025-26763,0,0,51c2f2b0f162ff62e0ae405c36d1c1d4c6cd19c1cec4a143ce94453f0be82b6c,2025-02-22T16:15:31.773000 @@ -285756,7 +285800,7 @@ CVE-2025-26766,0,0,6fee40560b10bf615ff77815533156ec331161a872ec1edc4de985dac44c7 CVE-2025-26767,0,0,a90bd9c7131cd1561c4ae5dbfe01302d49d2ae2d85536054fa888129574ed5cd,2025-02-16T23:15:11.350000 CVE-2025-26768,0,0,17051f6b50700105d1cdeb1d93490b73181876c37bff4a770dbbca224df2a05b,2025-02-16T23:15:11.487000 CVE-2025-26769,0,0,ce08a6c04d6d9d7cfe6a08cbac2855cb075ac725570fcbdc709512ac38778cfe,2025-02-17T12:15:28.550000 -CVE-2025-2677,0,1,38d8cf48265c9b7e92bbc3a46f3b767ff2a93a7fc7e35c0cd70297734f40d657,2025-03-26T13:48:38.670000 +CVE-2025-2677,0,0,38d8cf48265c9b7e92bbc3a46f3b767ff2a93a7fc7e35c0cd70297734f40d657,2025-03-26T13:48:38.670000 CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000 CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a37cd,2025-02-17T12:15:28.833000 CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000 @@ -285766,15 +285810,15 @@ CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c04 CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000 CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000 CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000 -CVE-2025-2678,0,1,7e1a91aed29821d8f3580fde3c82f83b41d6d7459dd9f3cbdc7289217ba1ab54,2025-03-26T13:42:31.437000 +CVE-2025-2678,0,0,7e1a91aed29821d8f3580fde3c82f83b41d6d7459dd9f3cbdc7289217ba1ab54,2025-03-26T13:42:31.437000 CVE-2025-26788,0,0,5fac6b93304aa80bc7a573b7eaa3933fb509b5a737cf70fd7551789f71a19205,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2c79,2025-02-14T08:15:31.357000 -CVE-2025-2679,0,1,fc23340601b0242e345b387da555239ec620056960eb96b4e1c5fddfa9cab616,2025-03-26T13:35:46.297000 +CVE-2025-2679,0,0,fc23340601b0242e345b387da555239ec620056960eb96b4e1c5fddfa9cab616,2025-03-26T13:35:46.297000 CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000 CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 CVE-2025-26796,0,0,b75ca789edaf2db40a83c7e39a3f34d24eef54f2ef7ca40bedf7bca90f834758,2025-03-24T14:15:18.500000 -CVE-2025-2680,0,1,d89af0b1d5f61ae6f7142eb8ca029333ffc853877a743fe92926b40a93040da0,2025-03-26T13:23:41.867000 +CVE-2025-2680,0,0,d89af0b1d5f61ae6f7142eb8ca029333ffc853877a743fe92926b40a93040da0,2025-03-26T13:23:41.867000 CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 CVE-2025-2681,0,0,78ee3ddf825d238c6f883ba830d0eb70659b8c1893a974fe40f8558dd8fa6674,2025-03-24T17:37:02.203000 CVE-2025-26816,0,0,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000 @@ -285789,6 +285833,7 @@ CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90c CVE-2025-2686,0,0,a76c164685b9183ddc211fba13468fcb67d255bf9600859ed63ab700bebcf6b6,2025-03-24T06:15:13.127000 CVE-2025-26865,0,0,392cafa9196f9e16f10dbe623eb410cd729a2dc1013d61e7dc7061610b7c87ad,2025-03-11T20:15:17.917000 CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000 +CVE-2025-26869,1,1,f7de0f4999daeca8a62754d5ce60d1352801da1fb4493531b12da01811228a14,2025-03-26T15:16:12.553000 CVE-2025-2687,0,0,850f691f48ceddfc7027789a26e9d3b3215ee022410935c673f1cb2eebf07e10,2025-03-24T17:25:06.777000 CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000 CVE-2025-26875,0,0,1eb25a80831e545b4298e6aed92aca9e86c317dc16ff78bda859574fde302510,2025-03-15T22:15:13.690000 @@ -285816,7 +285861,7 @@ CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702 CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000 CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 -CVE-2025-2691,0,0,d3cf3b445ffd6cd1fb54bf67ce61da9ddd2b735665621fd9256db3c167a23eb3,2025-03-24T13:15:28.787000 +CVE-2025-2691,0,1,3e0c7bb9b74b91cc1c7f226007a0a4b2765523a838b6451534f4d7af5747b3db,2025-03-26T15:06:35.310000 CVE-2025-26910,0,0,ca74ac486aa989f6f999598f8bf14014c34c48339b6905c0296af8a29556b3ef,2025-03-10T15:15:37.660000 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 CVE-2025-26912,0,0,e79b24db34788e23307e263a850245edf07e94d4a7f854cf9650116a3ca5b4f5,2025-02-25T15:15:26.530000 @@ -285827,10 +285872,13 @@ CVE-2025-26916,0,0,f758c32d09b38a24f4c348c15aba8cb3a44ed6c4ea3664e23dee9d5858835 CVE-2025-26917,0,0,3fc39fec66986a8b7bd40f698f506534d61e59c6582e491b1216365ddb3f6932,2025-03-20T12:25:42 CVE-2025-26918,0,0,e0fc59a79e46c5fcf8cafd0b2b3657455a0238ac9b7d59603d1a8c12f6ce4a03,2025-03-17T17:57:36.580000 CVE-2025-26921,0,0,89fff991fd2a17b2631799c0a10d97acc3e948cef9b5fa5a4ad29105c2269245,2025-03-15T22:15:14.517000 +CVE-2025-26922,1,1,1df2c1d2024e342f9133f809900b10be7658d02b72b0f19495a857450ab9ad5e,2025-03-26T15:16:12.713000 +CVE-2025-26923,1,1,bfa8d8d45a3dd96206a612b10d667947875878eb13427ae2c7e7095a08d23848,2025-03-26T15:16:12.877000 CVE-2025-26924,0,0,cb1c2780be4c3aefb0ede4d6931acf4ab096ee32b7e90b61d12e0b5ed023ed5c,2025-03-15T22:15:14.663000 CVE-2025-26925,0,0,d5e509c3100c8df66ee25704b916843165e5ea195a85927b6d7f6a9a10386673,2025-02-26T14:15:11.743000 CVE-2025-26926,0,0,46670274056f543a2d8d831b8a506aef43cfadd1396d409b955b63f1e76e669c,2025-02-25T15:15:26.930000 CVE-2025-26928,0,0,861f1ddc85c79a1a8d63021b4a752a7980136fff79059fb765bfdd66a75382c5,2025-02-25T15:15:27.067000 +CVE-2025-26929,1,1,e89ca10a3899685dd7ff5cc4a85ea5a5cd12fe946b03439dbdf15f839e79e205,2025-03-26T15:16:13.043000 CVE-2025-26931,0,0,7680a16e5e4bc5cb7d571ec7522e8eb1da81a45543fb23fce8deb347b9f39cce,2025-02-25T15:15:27.200000 CVE-2025-26932,0,0,30e11ffe0fff9feb38697cc84d4135950611987600314e1279c1b8624ccdcf60,2025-02-25T15:15:27.337000 CVE-2025-26933,0,0,c72fd5b233eb6a6c742b9899ed4e432e73eabce6ba195da01f5e87528d188c44,2025-03-10T15:15:37.997000 @@ -285840,6 +285888,7 @@ CVE-2025-26937,0,0,fed4f7fb03e7e7397a66feffa07ed44235873cf8d6e3b0b63bd6710ca35b7 CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb222e,2025-02-25T15:15:27.747000 CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000 CVE-2025-26940,0,0,027a042a9996f74c1b536a3ee0cf90caed7b08e7a2e9d51808cb5cb94c96159d,2025-03-15T22:15:14.810000 +CVE-2025-26941,1,1,ac54e8ebf372d12d71c511e07044af07ea9407a48c117e849de852c326d1f039,2025-03-26T15:16:13.210000 CVE-2025-26943,0,0,880198cc8338519544198ca562f39ac104b8bef0a8c121e384075bf4aedbb34a,2025-02-25T15:15:28.030000 CVE-2025-26945,0,0,6b5c2fad0a9b8f40f34855e800ac09994d07fec61ef015d056c7f881c616332e,2025-02-25T15:15:28.177000 CVE-2025-26946,0,0,df781d5aa26b91c3cad6d895bb9f19c76a8ac0bc37b086b89e10307c3390056d,2025-02-25T15:15:28.320000 @@ -285872,6 +285921,7 @@ CVE-2025-26981,0,0,3c198cc5da3d6f650a9e99b4d0dde322351720ee3c085612f1fbc577072a1 CVE-2025-26983,0,0,d6a859f29d624b201143fae24b6b474b6dfa136735775ba5e00cc884a212ebed,2025-02-25T15:15:31.043000 CVE-2025-26984,0,0,850870a6d13166bab30d2f61af8dc6fc95f6d7238517ef3ceb04f89d1f9a98a1,2025-03-07T20:35:00.770000 CVE-2025-26985,0,0,5fb0ce30a005f045393ce6a9e4877e64e68127385c508c29b67962ad383bc902,2025-02-25T15:15:31.183000 +CVE-2025-26986,1,1,d628314fa8a05542c08eee201b6fd59566eb82c0b57ff383d0cd2be88bacd587,2025-03-26T15:16:13.373000 CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d560be,2025-02-25T15:15:31.313000 CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000 CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000 @@ -285886,6 +285936,8 @@ CVE-2025-27000,0,0,1ac554f083699af2e8a7ca7e5b9fee0cf63423d6e7b9eac2cf80407f8bbcf CVE-2025-2701,0,0,f52af690ae241a70e2d868aa2a2c224f9b58c7f9bca32767e7f0be53336d72b3,2025-03-24T09:15:13.950000 CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b34a,2025-02-22T16:15:32.497000 CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000 +CVE-2025-27014,1,1,b17608cb0241e0d0ed079ddea29315d980d835bb4eee838ad69e103e06734e7c,2025-03-26T15:16:13.527000 +CVE-2025-27015,1,1,4655e997afd310de7f78038400b69afa026a0f852647788fa4a55807549269b7,2025-03-26T15:16:13.683000 CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d458ee,2025-02-18T20:15:34.013000 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 CVE-2025-27018,0,0,94651ace51e56fbcc25f172f4073521c7860458186a53a829906ba80fd471017,2025-03-25T18:15:34.683000 @@ -285991,6 +286043,7 @@ CVE-2025-27263,0,0,0d6473ce6be397da70ae29bc260e636ca3c6169d6fa59d6f77401b8f5578c CVE-2025-27264,0,0,57766bee671a71e603c6190f5ecce6b6ab03f589b571849a06d4f3626124f857,2025-03-03T14:15:58.123000 CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000 CVE-2025-27266,0,0,0b43dda3510df1a6caf90e315ec8e9c1ba742b051a50a212ca0413260e31120b,2025-02-24T15:15:14.443000 +CVE-2025-27267,1,1,18f5467e9609269d4c4aeaf48ebf10dbfdf8695e21425f88c05974c1680b1500,2025-03-26T15:16:13.850000 CVE-2025-27268,0,0,3174702840ac51701223fd78f030265fdecc7c2ffadea0a55057ef38d207fc0b,2025-03-03T14:15:58.260000 CVE-2025-27269,0,0,cda17c6a54559232936df28b8cf7711d2616fcb290267724b2af86f894a9aa65,2025-03-03T14:15:58.403000 CVE-2025-2727,0,0,504a3c3d133064790fac63e9fc7120de3cdddde660e3cc7f6ef0d34962caa686,2025-03-25T03:15:16.450000 @@ -286079,6 +286132,9 @@ CVE-2025-27400,0,0,3420eb7304b08f9fb1c25aec87192bc56067f699b82d2cfeb510bc8097e34 CVE-2025-27401,0,0,f4a40e6f24af923d22cbd4869ba6e62f802add03358279293f26a3440d2f2d83,2025-03-04T17:15:19.547000 CVE-2025-27402,0,0,ef47d48bfaf1f7969fb8808de0077363418ad8a4d4aaaf238d494e9d3e9d6ba8,2025-03-04T17:15:19.703000 CVE-2025-27403,0,0,2365358c45cf7b9698020c0be4d333c042cd80bd76b375b8fa4c18b6d6dddf3a,2025-03-11T15:15:45.570000 +CVE-2025-27404,1,1,168af5a1b97d1100c8d294638a9e98f1d711210738e6bbfa2653164787dd8a3d,2025-03-26T15:16:14 +CVE-2025-27405,1,1,d871d53ebc1a791b3f0c719d14315395a2427b6e83debdc4ffb24225e1776003,2025-03-26T16:15:22.983000 +CVE-2025-27406,1,1,8127f00c25c2e13af640432550c6cde66a5dc07e98301d524db3b267983331ce,2025-03-26T16:15:23.147000 CVE-2025-27407,0,0,1d15654ef204c91cd32beae5fe1b20af01b3f98dc702fb1b2edea51c8a7ee1cf,2025-03-12T21:15:42.560000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000 @@ -286143,7 +286199,7 @@ CVE-2025-2754,0,0,a326bc3858285141a99f7245126546f196cdca853219c40a22fbd6bab233bc CVE-2025-2755,0,0,2be4e1e06353a961288a1ac89a57890790aa2d17e4e656d7cb4215a8ecda9be5,2025-03-25T09:15:17.983000 CVE-2025-27551,0,0,9fbc2489ec80e9de647c2e8ff1734eff43438393501575b7372498c02dea54d9,2025-03-26T11:15:38.943000 CVE-2025-27552,0,0,57a3ef3068d58ee4a0b541b28f35dc104129aded6f6e2313b1880a5379244811,2025-03-26T11:15:39.063000 -CVE-2025-27553,0,0,183dc3a86b8b1f61354b767d69fc5cfccf39fac83a814abf975899e48ebf1d50,2025-03-24T14:15:18.687000 +CVE-2025-27553,0,1,be38c67801a9877330489d9f3815400618d03a685f0f7b09a4a8dcdc269b6cdb,2025-03-26T15:22:59.280000 CVE-2025-27554,0,0,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a7754d,2025-03-01T06:15:34.693000 CVE-2025-2756,0,0,58b5bd5add05519b3703c9867b1ef41f7806d55535cab28fb5b5ea6f68937930,2025-03-25T10:15:16.627000 CVE-2025-2757,0,0,50a4e494f69ed3370c82ac525cf6a129eaf9845acd3fb8519ece62c6c1c89803,2025-03-25T10:15:16.887000 @@ -286269,14 +286325,15 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000 CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000 CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000 -CVE-2025-27830,0,1,591d304aa3413454e6c36f403d57e6e7fb68dd3e87c7475e01da8a6cc7ee321c,2025-03-26T14:15:33.113000 -CVE-2025-27831,0,1,a856c87addb965c8d40d0fec7d4afbf3a702b291a038c6e068c8005453755f7a,2025-03-26T14:15:33.290000 -CVE-2025-27832,0,1,f9356ac13ae89841b48c3557e37745524f648c2c9dd9a4890cf23e515298b004,2025-03-26T14:15:33.483000 -CVE-2025-27833,0,1,475cd4728a7a1a1a0747a86c93b884ca8116e42396c94a241c7a930af361307e,2025-03-26T14:15:33.680000 -CVE-2025-27834,0,1,89a3f5a622cd820cd9e0d428b7820c2a7c682650c72c84824fec35fd0c9090a4,2025-03-26T14:15:33.867000 -CVE-2025-27835,0,1,91cae51ecf99354b5ec210871fc28ef49c2dd1e14b195c8c2246a12caff661ea,2025-03-26T14:15:34.057000 -CVE-2025-27836,0,1,14e100902788579e844a415137e5577df44c2a330e72f88e240d32b8e8d8328c,2025-03-26T14:15:34.253000 -CVE-2025-27837,0,1,ffcf6acdc5938d9300228367dc8e762a2ebbd0b34f218cd6fb26e12c8e2bf13c,2025-03-26T14:15:34.440000 +CVE-2025-2783,1,1,d2f63cb2227e5ed65f8713e70beeee33aafb5dd9e66e87bef710bddefbd847a0,2025-03-26T16:15:23.693000 +CVE-2025-27830,0,0,591d304aa3413454e6c36f403d57e6e7fb68dd3e87c7475e01da8a6cc7ee321c,2025-03-26T14:15:33.113000 +CVE-2025-27831,0,0,a856c87addb965c8d40d0fec7d4afbf3a702b291a038c6e068c8005453755f7a,2025-03-26T14:15:33.290000 +CVE-2025-27832,0,0,f9356ac13ae89841b48c3557e37745524f648c2c9dd9a4890cf23e515298b004,2025-03-26T14:15:33.483000 +CVE-2025-27833,0,0,475cd4728a7a1a1a0747a86c93b884ca8116e42396c94a241c7a930af361307e,2025-03-26T14:15:33.680000 +CVE-2025-27834,0,0,89a3f5a622cd820cd9e0d428b7820c2a7c682650c72c84824fec35fd0c9090a4,2025-03-26T14:15:33.867000 +CVE-2025-27835,0,0,91cae51ecf99354b5ec210871fc28ef49c2dd1e14b195c8c2246a12caff661ea,2025-03-26T14:15:34.057000 +CVE-2025-27836,0,0,14e100902788579e844a415137e5577df44c2a330e72f88e240d32b8e8d8328c,2025-03-26T14:15:34.253000 +CVE-2025-27837,0,0,ffcf6acdc5938d9300228367dc8e762a2ebbd0b34f218cd6fb26e12c8e2bf13c,2025-03-26T14:15:34.440000 CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 @@ -286295,39 +286352,57 @@ CVE-2025-27933,0,0,24ec7f24d322eb846bfd18b4b43f0ee70ec8f725ee61aa37066b1ad3bad15 CVE-2025-28010,0,0,6260ea576a8c0d7bd0a38d2f3c79cf58da9a7c5443332c696e69e06a75d63ce4,2025-03-19T15:15:54.430000 CVE-2025-28011,0,0,904ac06066433043222ace0eb3e8530f1f0d607436509b286714603b0a427d36,2025-03-19T19:15:47.517000 CVE-2025-28015,0,0,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9631,2025-03-19T19:15:47.650000 +CVE-2025-2819,1,1,acbdd40072154ca830b290ceacb5b4dfa8632a0dc4fb036216485a9f43aa9098,2025-03-26T15:16:21.970000 +CVE-2025-2820,1,1,db88335214767762df1b2f8e431df8129ca3f932fce4bd110305a19756d1fc23,2025-03-26T15:16:22.167000 +CVE-2025-2825,1,1,b15a61c0602cf7f76f6635c77c2428d6797e48a9b09eb7201f156a5676664d28,2025-03-26T16:15:23.883000 +CVE-2025-28855,1,1,4db828b50fe7399322efecca76ae8c3c8fddb5716d3003bb0863fd5f591a616d,2025-03-26T15:16:14.167000 CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000 CVE-2025-28857,0,0,e1c738bc9844b1bfe2c67596adaf7c2a8564c2cc541068f87b173d55a262a1b8,2025-03-19T13:41:38.270000 +CVE-2025-28858,1,1,d9c0536605519a9e0efb0290f242739f29af6a16577a81e331d9fecf12e8440f,2025-03-26T15:16:14.317000 CVE-2025-28859,0,0,1a821bc58dbd31b9f48e7a0ed4774a6a9b375dee8d99a0455626f76a2b5564f8,2025-03-19T14:01:43.707000 CVE-2025-28860,0,0,66dc2154f8e6a7d5fe774501386200cf25568fdb5590c8e79b061d6b8471f51a,2025-03-19T14:06:00.333000 CVE-2025-28861,0,0,8f06dd797c877ac540417e774f13db9bcbfcb5efd0679398413b1a7d851d0a33,2025-03-19T14:08:16.920000 CVE-2025-28862,0,0,262a0346545485f6d48b7aaaaae4bfd67403a534df363d75e6b444693b4d15c9,2025-03-19T14:13:16.610000 CVE-2025-28863,0,0,30697552adbf533d5aedc6bffbf20d0c5bb50d79e9020ff1669e6e6b9af3055d,2025-03-19T14:14:18.080000 CVE-2025-28864,0,0,fa24a3929b56ed50394276a64f3f8bff3c17a1ca074b88848c593735e282f43a,2025-03-19T14:16:41.287000 +CVE-2025-28865,1,1,345e50549895d2f32a86bcff3d8036bb75b15cd6385f89b07b3ad2c7d32316d1,2025-03-26T15:16:14.460000 CVE-2025-28866,0,0,6216179861a4260f9ff8f846c033be3d21e175874bd3a83d400d670ba4d4e4a8,2025-03-19T14:17:39.090000 CVE-2025-28867,0,0,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000 CVE-2025-28868,0,0,ff7436085d2b667e3d4ee6f08d9a645abff66da4d3ac58d61718d8d07e56a857,2025-03-19T15:49:31.903000 +CVE-2025-28869,1,1,e5a25db645a66451c2c4621acb4978254d3586deee72e478c931a614d084865c,2025-03-26T15:16:14.617000 CVE-2025-28870,0,0,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000 CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000 CVE-2025-28872,0,0,f3b7d21384421d1eeb12498b153df5e281517aad4a4d3aff96a3e023ae3b23ad,2025-03-11T21:15:44.757000 +CVE-2025-28873,1,1,384b73360bb12bc2927d43d66b471fc7f3f84f580469da34781f28f8e5f770fd,2025-03-26T15:16:14.767000 CVE-2025-28874,0,0,5b1e3f881e3414f9e94dd8091c8ef20595070049cc3ec53a1b47a753e8c62b1d,2025-03-11T21:15:44.907000 CVE-2025-28875,0,0,b6f200d76c136ff41a244010473c1ec8f8b3af373091396c8df248c0280a2187,2025-03-11T21:15:45.053000 CVE-2025-28876,0,0,729852af40c150459500d7eb4dd5abf36585fe08e1dadb1466cf78deafeec599,2025-03-11T21:15:45.200000 +CVE-2025-28877,1,1,2bd44e0237865d6b94df1356c69e51feaa088fc2b7def7afddb86ba1d98b4b3e,2025-03-26T15:16:14.917000 CVE-2025-28878,0,0,542215dae80b702c8c9aee8ecd4b8ab78df7acbd9b9508855102ca1c8d32b733,2025-03-11T21:15:45.353000 CVE-2025-28879,0,0,5bd953cfa52219aac88bb16a9e09e1510b5bf7a56e150dde8ed47528ce76635c,2025-03-17T17:40:29.660000 +CVE-2025-28880,1,1,cce0dc2cddafe1b584038137de142bee6b8b4edaa5f7322c9fbd86830cc7f859,2025-03-26T15:16:15.070000 CVE-2025-28881,0,0,c868390814b3bfb6893a2dd8d4ebc68e3e97fd80f9964fd17a15484244aa8f6f,2025-03-11T21:15:45.647000 +CVE-2025-28882,1,1,861d3dcf67039a59ea07384ce5d1e4efe70a04c3a700005ab723f0eacc6082d3,2025-03-26T15:16:15.227000 CVE-2025-28883,0,0,7230011f8ed980c5ab692e6507745e2c739333083ad722b67b3924a0f8867c76,2025-03-11T21:15:45.803000 CVE-2025-28884,0,0,771cff37d2145b21e6b9ddfcac196ddf32439965fe8c1aeaed10bf05974a52e7,2025-03-11T21:15:45.960000 +CVE-2025-28885,1,1,8d601a3f1aa3b78d45b951e209df9dd13a8837edbc4631730ca1cbc1812d5c2e,2025-03-26T15:16:15.380000 CVE-2025-28886,0,0,8829096276344aa5296745d321667067925dd057c12550ef0a399cb1c9566caa,2025-03-11T21:15:46.113000 CVE-2025-28887,0,0,57bd8f01d02ed8afd5599ea32c65ee4847f50f38cef546351412e6715f07165d,2025-03-11T21:15:46.270000 +CVE-2025-28889,1,1,ce00f63c752166ee9f0a05101916c34925d4d4ea97cc83245c48429134f4d60c,2025-03-26T15:16:15.543000 +CVE-2025-28890,1,1,09e3ae2af2b2ce36ba69d9ec5ebeb2337c2ac830b784ea5b20a098028f3ecb04,2025-03-26T15:16:15.700000 CVE-2025-28891,0,0,a1b5bb5f2f1783066a2dc188201e0fee55eed7b8b66d4a435f23c2884b26ac7b,2025-03-11T21:15:46.420000 CVE-2025-28892,0,0,8aa9cbc46d03648f41dcf59189028804e3b767a8c273cd789a68b3e54bc7fd91,2025-03-11T21:15:46.570000 +CVE-2025-28893,1,1,e9181df5cfba75b61ef9d9efd7374d4bf73783d68a4c910667953fa5919ed835,2025-03-26T15:16:15.873000 CVE-2025-28894,0,0,30f2c87bf73f446c8311ee160ed3b076c7918286da1bc2bb0abaf75e061b7b6a,2025-03-11T21:15:46.723000 CVE-2025-28895,0,0,d843ee31eca9d74d839eae14bc0f4c4fe2bc2e6a5a1ca623c3c6d81ae48f17cf,2025-03-11T21:15:46.873000 CVE-2025-28896,0,0,6e6a2fa3cde195ce87392bd7667516c083ecc1dc25f056878eda15e50fea74f2,2025-03-11T21:15:47.010000 CVE-2025-28897,0,0,b9be4fc485f3486e720bfb05c055043e37c0d9f5d96c1d8a54257acf1fac99df,2025-03-11T21:15:47.163000 +CVE-2025-28898,1,1,740d672f1a406cf6b64cd2ff12a009e3842e09f4161a6382fadd7bab217c8f2d,2025-03-26T15:16:16.030000 +CVE-2025-28899,1,1,2ab9228c0fdeb88e3f04d79ea4e5bd356fe1b1fba4cbf2d4925a05b74871153e,2025-03-26T15:16:16.190000 CVE-2025-28900,0,0,fed3bb83935a97bb6bcbaae18b7594a3620ff5c19cbcf2c9eb481741eb05f045,2025-03-11T21:15:47.313000 CVE-2025-28901,0,0,51ce41c5f42dd489e9c4b813887e6ff8e81a44c31a938903e1d90133cd1b5c03,2025-03-11T21:15:47.470000 CVE-2025-28902,0,0,fc2faabc0e3a80f192c6819497732bc38ae75103642686e8bdb9fd66a48e4b48,2025-03-11T21:15:47.627000 +CVE-2025-28903,1,1,8f7b45602e94b5354840df2038464923f1933dc78bc487e1398776dfb8d20170,2025-03-26T15:16:16.340000 CVE-2025-28904,0,0,4012b933f6c34b41d5a068f0a0bb1c183547caac9be27dd188a136480b9c00f4,2025-03-25T19:15:45.827000 CVE-2025-28905,0,0,0befafb2921ef19e3be08443748f6975a8b75f9b1324cd5287ab89d170d18d6a,2025-03-11T21:15:47.780000 CVE-2025-28906,0,0,71d4a45ea57ea31b9c7ff7f1044657ad234dba2e04a5868ce4f234775b1d3bc0,2025-03-11T21:15:47.933000 @@ -286335,38 +286410,48 @@ CVE-2025-28907,0,0,61ad82de5710b4f4da58f9f96146922cba286e42f369d7ad156a305fd9593 CVE-2025-28908,0,0,ebd453d34a4b132bab9cfda8de0e96d00b4586a99d7e9c5fe13c9127ceb9e73e,2025-03-11T21:15:48.230000 CVE-2025-28909,0,0,04189e51ced450c8a2084b8e9e55c70ef4c60636074c10364824cc2cfc4bece7,2025-03-11T21:15:48.383000 CVE-2025-28910,0,0,5d857d23d0acb81955efc8d871e8e454c5445f6e66a327bacd6f17ba20cea46b,2025-03-11T21:15:48.650000 +CVE-2025-28911,1,1,dbb5e07614d2a7bfecdb30d8eb17cb43f2e1485110ffefcde7bbc74685b34a8f,2025-03-26T15:16:16.493000 CVE-2025-28912,0,0,c02e4a7b437330942683784124a6ff88ddc10066051152f5d889c6e0775cd22a,2025-03-11T21:15:48.833000 CVE-2025-28913,0,0,f1b54740735dd55a5db7678c3d1201d0dd05252b3c1177150706e45b324ebb96,2025-03-11T21:15:49.010000 CVE-2025-28914,0,0,5cbb74f84b8a99d21a9c885af4cf470ffa9bc1cb1a55fe202b741b21181cb04f,2025-03-11T21:15:49.173000 CVE-2025-28915,0,0,2b9036514e1203b444b0dc5bf8d974a3cbbfda09e72f223c22bf02e0e39854ee,2025-03-11T21:15:49.323000 +CVE-2025-28916,1,1,4f04049fed478a0c6f55a3ee547bc89e741fc14ef45e05f86bec548fbe3f3673,2025-03-26T15:16:16.653000 +CVE-2025-28917,1,1,2c1123a0619ec2bb106c29c4904a4abfde6d5d726a2c44fbbe763549e4186828,2025-03-26T15:16:16.803000 CVE-2025-28918,0,0,fdafb0cadbdc8702c914c4b18f3da98b888fc45b917f3a8f53be26fb090f5d81,2025-03-11T21:15:49.477000 CVE-2025-28919,0,0,e6672d722a11dcfca58aa36b7a671c1f514123681fc1ee91277ee2808176f84d,2025-03-11T21:15:49.623000 CVE-2025-28920,0,0,1b39516a58e980ceafff6c35c5258f2defea2070ea7dcb67965a1cfa09291c9e,2025-03-11T21:15:49.780000 +CVE-2025-28921,1,1,ecc1dd771d3346bcf6daec70118e5b2b83574649921790899c033d11f2f0778a,2025-03-26T15:16:16.943000 CVE-2025-28922,0,0,2a34783987ce2da8a6d7f97c25f9b57365e5fab3264e58b957c07ae86bb16f03,2025-03-11T21:15:49.930000 CVE-2025-28923,0,0,e2f82832b1a3327d2fe28213e6f216781d62db26ec769bf8d14a863fd0259a25,2025-03-11T21:15:50.087000 +CVE-2025-28924,1,1,f1ebe978b9ab5099411d95aed9f1a9d694ca7161ba28fb833ef853bd0a2a6166,2025-03-26T15:16:17.100000 CVE-2025-28925,0,0,217477699e7c34590f625bff3ba776c2e548d0985ff796613e5d534609189382,2025-03-11T21:15:50.240000 CVE-2025-28926,0,0,dba33388b9fe1b25ba60fd9933869a14d64c19612cf44d537fff64539866410c,2025-03-11T21:15:50.397000 CVE-2025-28927,0,0,7c4fe5de3f7a7a17acfb2700f9efb48d5a7f3f4ff74de848517b6129e53ac21e,2025-03-11T21:15:50.547000 +CVE-2025-28928,1,1,87964af945b34e34195c725eb9586748a5282f29b72d24afbe49dfa1dd0c182f,2025-03-26T15:16:17.307000 CVE-2025-28929,0,0,f39ff4f6d13286ff3acb9354d3dc6ee0c2796d8891d3dfaf4da4fffcbe7233af,2025-03-11T21:15:50.690000 CVE-2025-28930,0,0,4f892790ea817a6436f396d358b3a0b1a39254e689af932c4a350bf69f6b2c9f,2025-03-11T21:15:50.847000 CVE-2025-28931,0,0,7525b42cf7d4026a36fc8fe4b00bf5284b342bf79ea11571e52e2299a2fe5889,2025-03-11T21:15:51 CVE-2025-28932,0,0,e33bb3e103fb13347f61332f1a16ef7deade707e596e5db5cc0806524e20f6a9,2025-03-11T21:15:51.150000 CVE-2025-28933,0,0,3bd8ba1257117d4bdfdf6ac3bffb1dcd7c32c7a19110fa79d4107fc1ab9039fb,2025-03-11T21:15:51.290000 +CVE-2025-28934,1,1,13e747ac5e710a76f3b096551db3390a7500079ba44eda0c37b2b89a26e5f0fd,2025-03-26T15:16:17.517000 +CVE-2025-28935,1,1,e824493ce9a0a444568f032eb59cea3a7a31ab6df6d9275fdcb909d26080da4f,2025-03-26T15:16:17.727000 CVE-2025-28936,0,0,e0748efe94f9e87f1a4ee118151d5c6a6ac1718d4970d7fec8dc0c697f190d40,2025-03-11T21:15:51.443000 CVE-2025-28937,0,0,24b63620a96e95e9837654a27ce16db045c42f21433afde2a1f40204ef66676c,2025-03-11T21:15:51.587000 CVE-2025-28938,0,0,d0b972cff3707558963cda7df0cb3176337d8e9d89978c6ecfdc3400da0cdb89,2025-03-11T21:15:51.737000 +CVE-2025-28939,1,1,441cc6ee2333cf3ee744ab7d4f4e212b0d1654deab5743d56039d8cf00790cce,2025-03-26T15:16:17.923000 CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf5146510b8,2025-03-11T21:15:51.887000 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 +CVE-2025-28942,1,1,a27b0b69e756b6614bcbd6bc7fcba1d6d92459ec390026dee90d738d2d0f73a3,2025-03-26T15:16:18.107000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 -CVE-2025-29100,0,0,3266d6c7f545c747c09fad662e8e3733fc5844d32a6b1437c2501b071d469cc1,2025-03-24T21:15:17.673000 +CVE-2025-29100,0,1,2c8184695bd8430527de0e3fc54ceef0d17cde5ebea6e88541ee358afbb2a96c,2025-03-26T15:16:18.333000 CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000 CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000 CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000 -CVE-2025-29135,0,0,e4ed0da779b25f2d3d1317cfc43dc8c5ffc5cbeac1a3d9f88579c808d9cf3c3c,2025-03-24T21:15:17.787000 +CVE-2025-29135,0,1,c47a91f7bccca2bb14e4271d784093c1f55a63b16f7949ea335513029310fb88,2025-03-26T15:16:20.343000 CVE-2025-29137,0,0,720ba11d924de175b1bf67482cc142061a1b9799fd3947bba36e81cdb29bc0c0,2025-03-19T21:15:41.063000 CVE-2025-29149,0,0,3dd29d77e95d83f510c5f3e866c7ae52aef2c96904dab4225703805c3512428a,2025-03-25T17:38:10.577000 CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000 @@ -286378,12 +286463,12 @@ CVE-2025-29226,0,0,598431993e1dea28d2a41edf1a133ff19583a46461026345d090d7abff0d6 CVE-2025-29227,0,0,15031612a342f1663453dfb027586c6db2ea2f4e163dcc47110f16a263fdb927,2025-03-21T19:15:46.310000 CVE-2025-29230,0,0,82fd9baf0d57bfe253b1907c4d74fadd09e960a1c557455f486f92c59e6e235a,2025-03-21T18:15:38.943000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 -CVE-2025-29310,0,0,2050096ca01ea852d26d6e1ddd815a6b6e7bff56b1feb17c1c95290a1cde390b,2025-03-24T21:15:17.893000 -CVE-2025-29311,0,0,1347f446d158af8dcffa7bbea6482476c9b74a7a7905f4e3b1ccce702b251a58,2025-03-24T21:15:18.003000 -CVE-2025-29312,0,0,62bcc2a8ceb38088ab948e4d1bd36b4b587bfd625922f8f6354ef83c23134885,2025-03-24T21:15:18.113000 +CVE-2025-29310,0,1,37389f3174377d4308a4534c99b344162e5065f4492c4ff35344fc616bafaab9,2025-03-26T15:16:20.583000 +CVE-2025-29311,0,1,27049ca9dd8937445dc0c529de9a9586f994711a2528842dc1f02c4f13709c3a,2025-03-26T15:16:20.817000 +CVE-2025-29312,0,1,42d137a1bb8de5fbfbf7f406099b891c2cfd3adff77cce48a06130c9153524e7,2025-03-26T15:16:21.063000 CVE-2025-29313,0,0,4e69655a6bf74c3974e5e23caea45d767223da90166a6849d63304c7f8248342,2025-03-25T18:15:34.843000 CVE-2025-29314,0,0,9ec69725511e36fbc7ae0c09f2b0708dcb1445bfd096c35de7159f46329b27bd,2025-03-25T15:15:25.260000 -CVE-2025-29315,0,0,14874e9314b4d61e5e74fb3f4d789ec1f55994bfba7d2025f826352476895a91,2025-03-24T21:15:18.440000 +CVE-2025-29315,0,1,a003eca6b4fa16f4dc964f4701d983f3939526dfed83a5f735d53689260db62e,2025-03-26T15:16:21.323000 CVE-2025-29357,0,0,ddd0f218f7f0a63a4864093fc2a3ded7f064b1382e370d0ee41cc0a1c1a3ddb4,2025-03-19T15:15:54.690000 CVE-2025-29358,0,0,a8d36a5564152d109431aa78a5e6e1517012072c02c933f71eaf5428f38f12d6,2025-03-19T19:15:48.350000 CVE-2025-29359,0,0,eb4d89bfed21500a3b4ef12a77f1e825f418222c50327ada53f234cba0318903,2025-03-19T19:15:48.480000 @@ -286428,7 +286513,7 @@ CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5b CVE-2025-29789,0,0,1c633e11107467992fc71529da9430044de9bd0ee056bad183e53d21d3a98dc7,2025-03-25T21:15:43.363000 CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000 CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000 -CVE-2025-29806,0,1,a0731b88c2dc4e18b008ec219ba55467523f3caa42666518a3bc46a169274d95,2025-03-26T14:50:45.523000 +CVE-2025-29806,0,0,a0731b88c2dc4e18b008ec219ba55467523f3caa42666518a3bc46a169274d95,2025-03-26T14:50:45.523000 CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000 CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000 CVE-2025-29891,0,0,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000 @@ -286474,7 +286559,7 @@ CVE-2025-30114,0,0,d883ee76dc63f6c7ce0070032d90c1cd1c42fa11e799ba7dac918f27d75b1 CVE-2025-30115,0,0,4365903303faf0ea7680dc9989331d89abf8ffa0e681c9db0de96a5098c10449,2025-03-21T14:15:17.373000 CVE-2025-30116,0,0,f127e2c972852b5c937eece39e26a7a7d038fc15d41ac87b6e4c103cbd4677f0,2025-03-25T19:15:46.030000 CVE-2025-30117,0,0,f2848c723174ae6913274a313c525a3160dfb0080d5f9ad1ceea829a51c7ee69,2025-03-25T19:15:46.190000 -CVE-2025-30118,0,0,90ce0477cfc912c9490e317f23bba63b39f55139dc144e3d5999000084c37660,2025-03-25T20:15:22.447000 +CVE-2025-30118,0,1,da869abb4a9b40dad74066354577f858a84d84229433522f9cd67ac9f4fbff91,2025-03-26T15:16:22.327000 CVE-2025-30122,0,0,c1d95302660e92c024ec5fc6b6a580530031934f019c4b2b9b52ef0f1377e16a,2025-03-21T14:15:17.523000 CVE-2025-30123,0,0,2971729320ad92fd03f998696461ed7cc92e08495aa1f702cd91222eaa49f43d,2025-03-21T18:15:39.737000 CVE-2025-30132,0,0,6dd8c4b2ac9edac69820a35ebc388d786aab74afcd8113c3b2124d47b6d5313e,2025-03-21T14:15:17.687000 @@ -286505,7 +286590,7 @@ CVE-2025-30213,0,0,07d038b7f8cbba366d7d7089646b379e2d42b8eacb99af017cd5481988eed CVE-2025-30214,0,0,45af31722af71f686115a72cd03f20a765bbb57d5c106731d43d97862d46ec16,2025-03-25T15:15:26.460000 CVE-2025-30216,0,0,3c250555862a00c85e62f5af912e4703f1addd59a33c81c242c247fcda4637ab,2025-03-25T20:15:22.567000 CVE-2025-30219,0,0,66bcfd7287f996f51dac83b22863b0043a284b85a69d60a646aeb12737a881d2,2025-03-25T23:15:36.560000 -CVE-2025-30222,0,1,8ac52073be044af5c89f8460a87904edf3bd6e6d29d9ffdf89ef9b568874274d,2025-03-26T14:15:34.817000 +CVE-2025-30222,0,0,8ac52073be044af5c89f8460a87904edf3bd6e6d29d9ffdf89ef9b568874274d,2025-03-26T14:15:34.817000 CVE-2025-30234,0,0,cf20660d6d37e637116a40ce9b3055465db9a1b9c87663c91728f3bae499e866,2025-03-19T05:15:41.353000 CVE-2025-30235,0,0,9222f9a2278ce550ac692bab27bb8a819d1de8dee62df51cf264df3162d55e58,2025-03-19T06:15:16.043000 CVE-2025-30236,0,0,3f73c2c498a83243d93d66190e1e818a0ccbcdd521592f269afac288686f067a,2025-03-19T07:15:34.313000 @@ -286525,6 +286610,7 @@ CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1 CVE-2025-30521,0,0,5628833c406d1038fd02b2ad092f3ee38f7ae3a566edf44ce6916cf9500b6088,2025-03-24T14:15:20.170000 CVE-2025-30522,0,0,61dbd18ac9fc8876e53d5dee51de98728b6ba5e3b815da5c48323d330287f281,2025-03-24T14:15:20.397000 CVE-2025-30523,0,0,d29e9b0538f54e9c1cd8a883e758c4212290e8cae097817f9490384414251d35,2025-03-24T14:15:20.593000 +CVE-2025-30524,1,1,95ddf85daa49cb2a522f5e22f3c0ef50643f5ab7913fdf7552447f914405e2a0,2025-03-26T15:16:22.580000 CVE-2025-30525,0,0,bfec53d727fa2348c2ec09f07094131e639ec29c7c5aa2ef071d41c52079a430,2025-03-24T14:15:20.757000 CVE-2025-30526,0,0,233a73b1c552feb3513375edad31518a379b983453d8c5a040bec010e7718952,2025-03-24T14:15:20.920000 CVE-2025-30527,0,0,6dede3b1b3f4acadafd9e7644473b8454c0df86f1f67ada80578c1a93fdbeb31,2025-03-24T14:15:21.083000