From cf757d946467684ef49a558215d90a46ef3e4302 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 10 Mar 2025 21:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-03-10T21:00:20.174126+00:00 --- CVE-2022/CVE-2022-349xx/CVE-2022-34908.json | 12 +- CVE-2022/CVE-2022-349xx/CVE-2022-34909.json | 12 +- CVE-2022/CVE-2022-434xx/CVE-2022-43454.json | 33 ++++ CVE-2022/CVE-2022-47xx/CVE-2022-4757.json | 22 ++- CVE-2022/CVE-2022-486xx/CVE-2022-48610.json | 29 +++ CVE-2022/CVE-2022-48xx/CVE-2022-4829.json | 22 ++- CVE-2022/CVE-2022-495xx/CVE-2022-49590.json | 185 +++++++++++++++-- CVE-2022/CVE-2022-495xx/CVE-2022-49591.json | 120 +++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49593.json | 165 +++++++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49594.json | 141 ++++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49595.json | 177 +++++++++++++++-- CVE-2022/CVE-2022-495xx/CVE-2022-49596.json | 176 ++++++++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49597.json | 141 ++++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49598.json | 153 ++++++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49599.json | 129 +++++++++++- CVE-2023/CVE-2023-00xx/CVE-2023-0043.json | 22 ++- CVE-2023/CVE-2023-02xx/CVE-2023-0278.json | 22 ++- CVE-2023/CVE-2023-02xx/CVE-2023-0279.json | 22 ++- CVE-2023/CVE-2023-03xx/CVE-2023-0331.json | 22 ++- CVE-2023/CVE-2023-05xx/CVE-2023-0535.json | 22 ++- CVE-2023/CVE-2023-240xx/CVE-2023-24045.json | 32 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27768.json | 62 +++++- CVE-2024/CVE-2024-277xx/CVE-2024-27769.json | 72 ++++++- CVE-2024/CVE-2024-277xx/CVE-2024-27770.json | 72 ++++++- CVE-2024/CVE-2024-277xx/CVE-2024-27771.json | 62 +++++- CVE-2024/CVE-2024-277xx/CVE-2024-27772.json | 62 +++++- CVE-2024/CVE-2024-277xx/CVE-2024-27773.json | 72 ++++++- CVE-2024/CVE-2024-277xx/CVE-2024-27774.json | 72 ++++++- CVE-2024/CVE-2024-441xx/CVE-2024-44179.json | 29 +++ CVE-2024/CVE-2024-441xx/CVE-2024-44192.json | 41 ++++ CVE-2024/CVE-2024-442xx/CVE-2024-44227.json | 25 +++ CVE-2024/CVE-2024-544xx/CVE-2024-54463.json | 21 ++ CVE-2024/CVE-2024-544xx/CVE-2024-54467.json | 41 ++++ CVE-2024/CVE-2024-544xx/CVE-2024-54469.json | 37 ++++ CVE-2024/CVE-2024-544xx/CVE-2024-54473.json | 21 ++ CVE-2024/CVE-2024-545xx/CVE-2024-54546.json | 21 ++ CVE-2024/CVE-2024-545xx/CVE-2024-54558.json | 25 +++ CVE-2024/CVE-2024-545xx/CVE-2024-54560.json | 33 ++++ CVE-2024/CVE-2024-555xx/CVE-2024-55581.json | 6 +- CVE-2024/CVE-2024-561xx/CVE-2024-56184.json | 21 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56185.json | 21 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56186.json | 21 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56187.json | 21 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56188.json | 21 ++ CVE-2025/CVE-2025-06xx/CVE-2025-0604.json | 6 +- CVE-2025/CVE-2025-10xx/CVE-2025-1015.json | 8 +- CVE-2025/CVE-2025-13xx/CVE-2025-1391.json | 6 +- CVE-2025/CVE-2025-226xx/CVE-2025-22603.json | 90 +++++++++ CVE-2025/CVE-2025-248xx/CVE-2025-24813.json | 8 +- CVE-2025/CVE-2025-253xx/CVE-2025-25306.json | 68 +++++++ CVE-2025/CVE-2025-256xx/CVE-2025-25614.json | 43 +++- CVE-2025/CVE-2025-256xx/CVE-2025-25620.json | 39 +++- CVE-2025/CVE-2025-266xx/CVE-2025-26695.json | 29 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26696.json | 29 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27136.json | 82 ++++++++ CVE-2025/CVE-2025-276xx/CVE-2025-27615.json | 68 +++++++ CVE-2025/CVE-2025-276xx/CVE-2025-27616.json | 76 +++++++ CVE-2025/CVE-2025-276xx/CVE-2025-27636.json | 53 ++++- CVE-2025/CVE-2025-279xx/CVE-2025-27913.json | 21 ++ README.md | 90 +++++---- _state.csv | 207 +++++++++++--------- 61 files changed, 3191 insertions(+), 270 deletions(-) create mode 100644 CVE-2022/CVE-2022-434xx/CVE-2022-43454.json create mode 100644 CVE-2022/CVE-2022-486xx/CVE-2022-48610.json create mode 100644 CVE-2024/CVE-2024-441xx/CVE-2024-44179.json create mode 100644 CVE-2024/CVE-2024-441xx/CVE-2024-44192.json create mode 100644 CVE-2024/CVE-2024-442xx/CVE-2024-44227.json create mode 100644 CVE-2024/CVE-2024-544xx/CVE-2024-54463.json create mode 100644 CVE-2024/CVE-2024-544xx/CVE-2024-54467.json create mode 100644 CVE-2024/CVE-2024-544xx/CVE-2024-54469.json create mode 100644 CVE-2024/CVE-2024-544xx/CVE-2024-54473.json create mode 100644 CVE-2024/CVE-2024-545xx/CVE-2024-54546.json create mode 100644 CVE-2024/CVE-2024-545xx/CVE-2024-54558.json create mode 100644 CVE-2024/CVE-2024-545xx/CVE-2024-54560.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56184.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56185.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56186.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56187.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56188.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22603.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25306.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26695.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26696.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27136.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27615.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27616.json create mode 100644 CVE-2025/CVE-2025-279xx/CVE-2025-27913.json diff --git a/CVE-2022/CVE-2022-349xx/CVE-2022-34908.json b/CVE-2022/CVE-2022-349xx/CVE-2022-34908.json index 41e6a4aec43..83e8737d2fd 100644 --- a/CVE-2022/CVE-2022-349xx/CVE-2022-34908.json +++ b/CVE-2022/CVE-2022-349xx/CVE-2022-34908.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34908", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-27T13:15:10.107", - "lastModified": "2024-11-21T07:10:24.703", + "lastModified": "2025-03-10T20:15:12.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-349xx/CVE-2022-34909.json b/CVE-2022/CVE-2022-349xx/CVE-2022-34909.json index faa45006a72..c83f2837f2d 100644 --- a/CVE-2022/CVE-2022-349xx/CVE-2022-34909.json +++ b/CVE-2022/CVE-2022-349xx/CVE-2022-34909.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34909", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-27T13:15:10.190", - "lastModified": "2024-11-21T07:10:24.863", + "lastModified": "2025-03-10T20:15:13.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json new file mode 100644 index 00000000000..a702c1ab51b --- /dev/null +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43454.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2022-43454", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T20:15:13.593", + "lastModified": "2025-03-10T20:15:13.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A double free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/102741", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/102807", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/102808", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/102836", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4757.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4757.json index 022a1c98391..28964400308 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4757.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4757.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4757", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.267", - "lastModified": "2024-11-21T07:35:52.970", + "lastModified": "2025-03-10T19:15:35.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json new file mode 100644 index 00000000000..59ec8dd7585 --- /dev/null +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48610.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2022-48610", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T20:15:13.713", + "lastModified": "2025-03-10T20:15:13.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/102741", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/102807", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/102808", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4829.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4829.json index 7837bbbde1b..633d9f064f6 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4829.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4829.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4829", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.493", - "lastModified": "2024-11-21T07:36:01.690", + "lastModified": "2025-03-10T19:15:36.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json index 72190c15bd0..8517e5330e6 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49590", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.573", - "lastModified": "2025-02-26T07:01:34.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,202 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igmp: Se corrigen las ejecuciones de datos en torno a sysctl_igmp_llm_reports. Al leer sysctl_igmp_llm_reports, se puede cambiar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores. Esta prueba se puede empaquetar en un asistente, por lo que dichos cambios estar\u00e1n en la serie de seguimiento despu\u00e9s de que net se fusione con net-next. if (ipv4_is_local_multicast(pmc->multiaddr) && !READ_ONCE(net->ipv4.sysctl_igmp_llm_reports))" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3", + "versionEndExcluding": "4.9.325", + "matchCriteriaId": "443CB341-7435-4A5F-B08C-A31660B42A63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.290", + "matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1656ecaddf90e2a070ec2d2404cdae3edf80faca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/260446eb8e5541402b271343a4516f2b33dec1e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46307adceb67bdf2ec38408dd9cebc378a6b5c46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/473aad9ad57ff760005377e6f45a2ad4210e08ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a84b4afaca2573ed3aed1f8854aefe3ca5a82e72", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d77969e7d4ccc26bf1f414a39ef35050a83ba6d5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed876e99ccf417b8bd7fd8408ba5e8b008e46cc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6da2267e71106474fbc0943dc24928b9cb79119", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json index 4679ddae7ad..7d4cf2d566c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49591", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.667", - "lastModified": "2025-02-26T07:01:34.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,127 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: microchip: ksz_common: Se corrige el error de p\u00e9rdida de recuento de referencias. En ksz_switch_register(), debemos llamar a of_node_put() para la referencia devuelta por of_get_child_by_name() que ha aumentado el recuento de referencias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "37654B03-0BD2-4BDB-8E49-08840D5ECD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4165e02716518bbbe9c9104b39530d40928bc7ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88ec2ff42da3ac93b2437dc52fe25cd4372148e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a14bd7475452c51835dd5a0cee4c8fa48dd0b539", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json index 53bfc0a680f..a3a0bc6449a 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49593", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.853", - "lastModified": "2025-02-26T07:01:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,180 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_probe_interval. Al leer sysctl_tcp_probe_interval, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1", + "versionEndExcluding": "4.14.290", + "matchCriteriaId": "BB72A895-C527-4FD1-AB91-6F4B520F2542" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a85388f1d94a9f8b5a529118a2c5eaa0520d85c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73a11588751a2c13f25d9da8117efc9a79b1843f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80dabd089086e6553b7acfcff2ec223bdada87a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b14cc8afbbcbc6dce4797913c0b85266b897f541", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b3798d3519eda9c409bb0815b0102f27ec42468d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c61aede097d350d890fa1edc9521b0072e14a0b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e6b6f027e2854a51f345a5e3e808d7a88001d4f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json index 448ca2d0172..315fdc6bb33 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49594", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.947", - "lastModified": "2025-02-26T07:01:34.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_mtu_probe_floor. Al leer sysctl_tcp_mtu_probe_floor, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "7E96E649-47EC-458E-8AC7-5A642A2EF7A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/033963b220633ed1602d458e7e4ac06afa9fefb2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e92d4423615a5257d0d871fc067aa561f597deb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc36c37f5fe066c4708e623ead96dc8f57224bf5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5bece4df6090395f891110ef52a6f82d16685db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2ecbf3f0aa88277d43908c53b99399d55729ff9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json index 0098c137b45..84cb2e51d56 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49595", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.040", - "lastModified": "2025-02-26T07:01:35.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,194 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_probe_threshold. Al leer sysctl_tcp_probe_threshold, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1", + "versionEndExcluding": "4.9.325", + "matchCriteriaId": "59349928-C040-410F-9AEF-F0E37775F4F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.290", + "matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/44768749980d53bc01980d9c060f736808d11af0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92c0aa4175474483d6cf373314343d4e624e882a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96900fa61777402eb5056269d8000aace33a8b6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b5dc7ad6da1373d3c60d4b869d688f996e5d219", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b04817c94fbd285a967d9b830b274fe9998c9c0b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d452ce36f2d4c402fa3f5275c9677f80166e7fc6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f524c3e7f6cdad66b3b6a912cef47b656f8b0de3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa5fb2cf9393db898772db8cb897ed5fd265eb78", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json index 59dc1083876..63aede77ab4 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49596", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.133", - "lastModified": "2025-02-26T07:01:35.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,187 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se corrigen las ejecuciones de datos en torno a sysctl_tcp_min_snd_mss. Al leer sysctl_tcp_min_snd_mss, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16.69", + "versionEndExcluding": "3.17", + "matchCriteriaId": "142E4A1F-B3D2-42A7-B6C0-CFFCA71E9DE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4.182", + "versionEndExcluding": "4.5", + "matchCriteriaId": "80679710-597A-438F-916F-EB59ACAC536F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.182", + "versionEndExcluding": "4.10", + "matchCriteriaId": "EBFC612F-00B5-4DB2-955B-F7FBE68B0DFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.127", + "versionEndExcluding": "4.15", + "matchCriteriaId": "BA040817-C3CC-4162-9719-DAC2271AAFC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.52", + "versionEndExcluding": "4.20", + "matchCriteriaId": "3E9FBBF0-D54E-42D5-B04A-66E62644978C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1.11", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "17831D82-0E1D-4A6E-9D29-A098431016D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d8a39feb58910a7f7746b1770ee5578cc551fe6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0fc9357282df055e30990b29f4b7afa53ab42cdb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78eb166cdefcc3221c8c7c1e2d514e91a2eb5014", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97992e8feff33b3ae154a113ec398546bbacda80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdb96b69f5909ffcdd6f1e0902219fc6d7689ff7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json index 3382a78dafb..3e6fb3d305c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49597", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.220", - "lastModified": "2025-02-26T07:01:35.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_base_mss. Al leer sysctl_tcp_base_mss, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.17", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "39FC5A69-1DAE-4AD2-B4AB-14DD87E3ED97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d7dea651b7fe0322be95054f64e3711afccc543", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/514d2254c7b8aa2d257f5ffc79f0d96be2d6bfda", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88d78bc097cd8ebc6541e93316c9d9bf651b13e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ca18116bc16ec31b9a3ce28ea1350badfa36128", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json index 73e3360a7d7..8cae144ad21 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49598", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.310", - "lastModified": "2025-02-26T07:01:35.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_mtu_probing. Al leer sysctl_tcp_mtu_probing, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.17", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "7949E902-CD08-4402-A5D4-69B7306B4EF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/77a04845f0d28a3561494a5f3121488470a968a4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e8fc428a7f680f1c4994a40e52d7f95a9a93038", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aabe9438fdfe004e021d5a206227ec105dbe2416", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0920ca09d9ce19980c8391b9002455baa9c1417", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f47d00e077e7d61baf69e46dde3210c886360207", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f966773e13cdd3f12baa90071b7b660f6c633ccb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json index 067a2b56da9..64a556da653 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49599", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.403", - "lastModified": "2025-02-26T07:01:35.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:23:01.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_l3mdev_accept. Al leer sysctl_tcp_l3mdev_accept, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "5.10.137", + "matchCriteriaId": "9871FC5B-B802-4E9A-99C3-65D7CE6FF883" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08a75f10679470552a3a443f9aefd1399604d31d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1d9c81833dec46ccb52a1d0db970fefb7c4fa071", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d38d86b818104cf88961f3aebea34da89364a8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ba9cd43b5776c27d25e5a32dde9e80bdeb1c6a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0043.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0043.json index 30c3bd5d497..8fcd95d0499 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0043.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0043.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0043", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.580", - "lastModified": "2024-11-21T07:36:26.947", + "lastModified": "2025-03-10T19:15:36.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0278.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0278.json index 2c35b81390d..441dcf1ebc5 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0278.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0278.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0278", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.807", - "lastModified": "2024-11-21T07:36:52.977", + "lastModified": "2025-03-10T19:15:36.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0279.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0279.json index 615c09e7b18..ee4cabda606 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0279.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0279.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0279", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.883", - "lastModified": "2024-11-21T07:36:53.070", + "lastModified": "2025-03-10T19:15:37.140", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0331.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0331.json index 6d072336aa0..fd347170282 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0331.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0331.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0331", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.967", - "lastModified": "2024-11-21T07:36:59.217", + "lastModified": "2025-03-10T19:15:37.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0535.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0535.json index 33b82414e46..5219fb69a1c 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0535.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0535.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0535", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:12.313", - "lastModified": "2024-11-21T07:37:21.773", + "lastModified": "2025-03-10T19:15:37.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24045.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24045.json index eaa6d478287..c86689ba035 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24045.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24045.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24045", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T01:15:10.537", - "lastModified": "2024-11-21T07:47:18.897", + "lastModified": "2025-03-10T19:15:37.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27768.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27768.json index 93800b4f453..37102a7cfc6 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27768.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27768.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27768", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:08.290", - "lastModified": "2024-11-21T09:05:01.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] + } + ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27769.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27769.json index c2fea508c2e..54825b65e6d 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27769.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27769", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:08.547", - "lastModified": "2024-11-21T09:05:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] } ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27770.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27770.json index c04cd0ff84c..0b14e97767f 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27770.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27770.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27770", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:08.767", - "lastModified": "2024-11-21T09:05:01.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-23" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] } ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27771.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27771.json index e50a8825f41..b98a0a8bd1d 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27771.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27771", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:08.997", - "lastModified": "2024-11-21T09:05:01.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] + } + ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27772.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27772.json index cd0af67f927..6a83d853afc 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27772.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27772", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:09.210", - "lastModified": "2024-11-21T09:05:01.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] + } + ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27773.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27773.json index 4dfdb6f0b4e..1baf6f74b82 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27773.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27773", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:09.447", - "lastModified": "2024-11-21T09:05:02.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-348" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] } ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27774.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27774.json index 91e67925e40..967f458138d 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27774.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27774", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-03-18T14:15:09.703", - "lastModified": "2024-11-21T09:05:02.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T18:34:58.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-259" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.35.227", + "matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027" + } + ] + } + ] } ], "references": [ { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json new file mode 100644 index 00000000000..485d3e8e21c --- /dev/null +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44179.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-44179", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:37.960", + "lastModified": "2025-03-10T19:15:37.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sequoia 15. An attacker with physical access to a device may be able to read contact numbers from the lock screen." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121246", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json new file mode 100644 index 00000000000..893f1d38abd --- /dev/null +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44192.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-44192", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.080", + "lastModified": "2025-03-10T19:15:38.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121240", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121241", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121248", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121249", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json new file mode 100644 index 00000000000..74546415798 --- /dev/null +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44227.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44227", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.187", + "lastModified": "2025-03-10T19:15:38.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to cause unexpected system termination or corrupt kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json new file mode 100644 index 00000000000..6abfadab837 --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54463.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54463", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.290", + "lastModified": "2025-03-10T19:15:38.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved entitlements. This issue is fixed in macOS Sequoia 15. An app may be able to access removable volumes without user consent." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json new file mode 100644 index 00000000000..a725dac00d2 --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54467.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-54467", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.387", + "lastModified": "2025-03-10T19:15:38.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cookie management issue was addressed with improved state management. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121240", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121241", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121248", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121249", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json new file mode 100644 index 00000000000..e2fd517b976 --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54469.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-54469", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.493", + "lastModified": "2025-03-10T19:15:38.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121234", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121247", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121249", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json new file mode 100644 index 00000000000..4e9f6defe99 --- /dev/null +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54473.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54473", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.600", + "lastModified": "2025-03-10T19:15:38.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json new file mode 100644 index 00000000000..95e3d64ad9e --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54546.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54546", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.697", + "lastModified": "2025-03-10T19:15:38.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15. An app may be able to cause unexpected system termination or corrupt kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json new file mode 100644 index 00000000000..e1bd00fdebd --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54558.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54558", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.790", + "lastModified": "2025-03-10T19:15:38.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A clickjacking issue was addressed with improved out-of-process view handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to trick a user into granting access to photos from the user's photo library." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json new file mode 100644 index 00000000000..7313f586829 --- /dev/null +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54560.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54560", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-10T19:15:38.883", + "lastModified": "2025-03-10T19:15:38.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/121238", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121240", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121248", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/121250", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55581.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55581.json index e85c09219ef..c38980c4b61 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55581.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55581.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55581", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T22:15:14.137", - "lastModified": "2025-03-04T20:15:36.677", + "lastModified": "2025-03-10T20:15:13.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56184.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56184.json new file mode 100644 index 00000000000..e3600118b2a --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56184.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56184", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T19:15:38.983", + "lastModified": "2025-03-10T19:15:38.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56185.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56185.json new file mode 100644 index 00000000000..4f11739da63 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56185.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56185", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T19:15:39.097", + "lastModified": "2025-03-10T19:15:39.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ProtocolUnsolOnSSAdapter::GetServiceClass() of protocolcalladapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56186.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56186.json new file mode 100644 index 00000000000..96e23d1e361 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56186.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56186", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T19:15:39.193", + "lastModified": "2025-03-10T19:15:39.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In closeChannel of secureelementimpl.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56187.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56187.json new file mode 100644 index 00000000000..44bf3ce350b --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56187.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56187", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T19:15:39.293", + "lastModified": "2025-03-10T19:15:39.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ppcfw_deny_sec_dram_access of ppcfw.c, there is a possible arbitrary read from TEE memory due to a logic error in the code. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56188.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56188.json new file mode 100644 index 00000000000..3782b5b67b7 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56188.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56188", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T19:15:39.393", + "lastModified": "2025-03-10T19:15:39.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "there is a possible way to crash the modem due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json index 558496591c9..bb1248698af 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0604.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0604", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-22T15:15:14.827", - "lastModified": "2025-03-10T18:15:30.100", + "lastModified": "2025-03-10T19:15:39.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2544", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:2545", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json index 9d30b21737c..7c25bfa8ab3 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1015", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.363", - "lastModified": "2025-02-06T22:15:40.247", + "lastModified": "2025-03-10T19:15:39.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the \u201cOther\u201d field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7." + "value": "The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the \u201cOther\u201d field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135." }, { "lang": "es", @@ -114,6 +114,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json index f16617434dd..66d445221b2 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1391", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-17T14:15:08.413", - "lastModified": "2025-03-10T18:15:30.410", + "lastModified": "2025-03-10T19:15:39.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:2544", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:2545", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22603.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22603.json new file mode 100644 index 00000000000..4e322dcac8b --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22603.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-22603", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-10T19:15:39.970", + "lastModified": "2025-03-10T19:15:39.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Versions prior to autogpt-platform-beta-v0.4.2 contains a server-side request forgery (SSRF) vulnerability inside component (or block) `Send Web Request`. The root cause is that IPV6 address is not restricted or filtered, which allows attackers to perform a server side request forgery to visit an IPV6 service. autogpt-platform-beta-v0.4.2 fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://boatneck-faucet-cba.notion.site/SSRF-of-AutoGPT-153b650a4d88804d923ad65a015a7d61", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Significant-Gravitas/AutoGPT/blob/2121ffd06b26a438706bf642372cc46d81c94ddc/autogpt_platform/backend/backend/util/request.py#L11", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Significant-Gravitas/AutoGPT/commit/26214e1b2c6777e0fae866642b23420adaadd6c4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-4c8v-hwxc-2356", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json index 84a8998cd9a..48c478d6605 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24813", "sourceIdentifier": "security@apache.org", "published": "2025-03-10T17:15:35.067", - "lastModified": "2025-03-10T17:15:35.067", + "lastModified": "2025-03-10T19:15:40.123", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -32,6 +32,10 @@ { "url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/03/10/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25306.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25306.json new file mode 100644 index 00000000000..f1bbd7ba3d0 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25306.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-25306", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-10T19:15:40.230", + "lastModified": "2025-03-10T19:15:40.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Misskey is an open source, federated social media platform. The patch for CVE-2024-52591 did not sufficiently validate the relation between the `id` and `url` fields of ActivityPub objects. An attacker can forge an object where they claim authority in the `url` field even if the specific ActivityPub object type require authority in the `id` field. Version 2025.2.1 addresses the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + }, + { + "lang": "en", + "value": "CWE-441" + }, + { + "lang": "en", + "value": "CWE-1025" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/misskey-dev/misskey/releases/tag/2025.2.1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/misskey-dev/misskey/security/advisories/GHSA-6w2c-vf6f-xf26", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json index cc41b511ae9..d019016ede1 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25614.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25614", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T15:15:37.330", - "lastModified": "2025-03-10T15:15:37.330", + "lastModified": "2025-03-10T20:15:14.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation, which allows teachers to update the personal data of fellow teachers." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/armaansidana2003/CVE-2025-25614", @@ -20,6 +55,10 @@ { "url": "https://github.com/changeweb/Unifiedtransform", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/armaansidana2003/CVE-2025-25614", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json index 4c2508a5f24..6e8d3d24ea4 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25620.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25620", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T15:15:37.490", - "lastModified": "2025-03-10T15:15:37.490", + "lastModified": "2025-03-10T19:15:40.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/armaansidana2003/CVE-2025-25620", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json new file mode 100644 index 00000000000..5ae724902c2 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-26695", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-10T19:15:40.567", + "lastModified": "2025-03-10T19:15:40.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883039", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json new file mode 100644 index 00000000000..9a6df229a60 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-26696", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-03-10T19:15:40.670", + "lastModified": "2025-03-10T19:15:40.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain crafted MIME email messages that claimed to contain an encrypted OpenPGP message, which instead contained an OpenPGP signed message, were wrongly shown as being encrypted. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864205", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27136.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27136.json new file mode 100644 index 00000000000..217c70a3f54 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27136.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27136", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-10T19:15:40.770", + "lastModified": "2025-03-10T19:15:40.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LocalS3 is an Amazon S3 mock service for testing and local development. Prior to version 1.21, the LocalS3 service's bucket creation endpoint is vulnerable to XML External Entity (XXE) injection. When processing the CreateBucketConfiguration XML document during bucket creation, the service's XML parser is configured to resolve external entities. This allows an attacker to declare an external entity that references an internal URL, which the server will then attempt to fetch when parsing the XML. The vulnerability specifically occurs in the location constraint processing, where the XML parser resolves external entities without proper validation or restrictions. When the external entity is resolved, the server makes an HTTP request to the specified URL and includes the response content in the parsed XML document. This vulnerability can be exploited to perform server-side request forgery (SSRF) attacks, allowing an attacker to make requests to internal services or resources that should not be accessible from external networks. The server will include the responses from these internal requests in the resulting bucket configuration, effectively leaking sensitive information. The attacker only needs to be able to send HTTP requests to the LocalS3 service to exploit this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Robothy/local-s3/commit/d6ed756ceb30c1eb9d4263321ac683d734f8836f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Robothy/local-s3/security/advisories/GHSA-g6wm-2v64-wq36", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27615.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27615.json new file mode 100644 index 00000000000..5fe8adfe748 --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27615.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-27615", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-10T19:15:40.917", + "lastModified": "2025-03-10T19:15:40.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "umatiGateway is software for connecting OPC Unified Architecture servers with an MQTT broker utilizing JSON messages. The user interface may possibly be publicly accessible with umatiGateway's provided docker-compose file. With this access, the configuration can be viewed and altered. Commit 5d81a3412bc0051754a3095d89a06d6d743f2b16 uses `127.0.0.1:8080:8080` to limit access to the local network. For those who are unable to use this proposed patch, a firewall on Port 8080 may block remote access, but the workaround may not be perfect because Docker may also bypass a firewall by its iptable based rules for port forwarding." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umati/umatiGateway/blob/abe73096a17307327f0d6dc0ed4db1fb93464521/README.md?plain=1#L34-L35", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umati/umatiGateway/commit/5d81a3412bc0051754a3095d89a06d6d743f2b16", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umati/umatiGateway/pull/101", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umati/umatiGateway/security/advisories/GHSA-qf9w-x9qx-2mq7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27616.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27616.json new file mode 100644 index 00000000000..379f9637aa2 --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27616.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2025-27616", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-10T19:15:41.080", + "lastModified": "2025-03-10T19:15:41.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Prior to versions 0.25.3 and 0.26.3, by spoofing a webhook payload with a specific set of headers and body data, an attacker could transfer ownership of a repository and its repo level secrets to a separate repository. These secrets could be exfiltrated by follow up builds to the repository. Users with an enabled repository with access to repo level CI secrets in Vela are vulnerable to the exploit, and any user with access to the CI instance and the linked source control manager can perform the exploit. Versions 0.25.3 and 0.26.3 fix the issue. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + }, + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/go-vela/server/commit/257886e5a3eea518548387885894e239668584f5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/go-vela/server/commit/67c1892e2464dc54b8d2588815dfb7819222500b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/go-vela/server/releases/tag/v0.25.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/go-vela/server/releases/tag/v0.26.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/go-vela/server/security/advisories/GHSA-9m63-33q3-xq5x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27636.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27636.json index 1dcb304ceaa..0f3f99bd5c5 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27636.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27636.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27636", "sourceIdentifier": "security@apache.org", "published": "2025-03-09T13:15:34.403", - "lastModified": "2025-03-10T14:15:25.827", - "vulnStatus": "Received", + "lastModified": "2025-03-10T19:15:41.240", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bypass/Injection vulnerability in Apache Camel-Bean component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3.\n\nUsers are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.\n\nThis vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components\n\n * camel-servlet\n * camel-jetty\n * camel-undertow\n * camel-platform-http\n * camel-netty-http\n\n\nand in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular:\u00a0\n\n * The bean invocation (is only affected if you use any of the above\u00a0together with camel-bean component).\n\n * The bean that can be called, has\u00a0more than 1 method implemented.\nIn these conditions an attacker could be able to forge a Camel header name and make the bean component invoking other methods in the same bean.\n\nThe vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with \"Camel\", \"camel\", or \"org.apache.camel.\".\u00a0\n\n\nMitigation:\u00a0You can easily work around this in your Camel applications by removing the\u00a0headers in your Camel routes. There are many ways of doing this, also\u00a0globally or per route. This means you could use the removeHeaders EIP, to filter out anything like \"cAmel, cAMEL\" etc, or in general everything not starting with \"Camel\", \"camel\" or \"org.apache.camel.\"." + }, + { + "lang": "es", + "value": "Vulnerabilidad de bypass/inyecci\u00f3n en el componente Apache Camel-Bean en determinadas condiciones. Este problema afecta a Apache Camel: desde la versi\u00f3n 4.10.0 hasta la <= 4.10.1, desde la versi\u00f3n 4.8.0 hasta la <= 4.8.4, desde la versi\u00f3n 3.10.0 hasta la <= 3.22.3. Se recomienda a los usuarios que actualicen a la versi\u00f3n 4.10.2 para 4.10.x LTS, 4.8.5 para 4.8.x LTS y 3.22.4 para las versiones 3.x. Esta vulnerabilidad solo est\u00e1 presente en la siguiente situaci\u00f3n. El usuario est\u00e1 utilizando uno de los siguientes servidores HTTP a trav\u00e9s de uno de los siguientes componentes Camel * camel-servlet * camel-jetty * camel-undertow * camel-platform-http * camel-netty-http y en la ruta, el intercambio se enrutar\u00e1 a un productor de camel-bean. Por lo tanto, SOLO el componente camel-bean est\u00e1 afectado. En particular: * La invocaci\u00f3n del bean (solo se ve afectada si usas cualquiera de los anteriores junto con el componente camel-bean). * El bean que se puede llamar tiene m\u00e1s de 1 m\u00e9todo implementado. En estas condiciones, un atacante podr\u00eda falsificar un nombre de encabezado de Camel y hacer que el componente bean invoque otros m\u00e9todos en el mismo bean. La vulnerabilidad surge debido a un error en el mecanismo de filtrado predeterminado que solo bloquea los encabezados que comienzan con \"Camel\", \"camel\" u \"org.apache.camel\". Mitigaci\u00f3n: puedes solucionar esto f\u00e1cilmente en tus aplicaciones Camel eliminando los encabezados en tus rutas Camel. Hay muchas formas de hacer esto, tambi\u00e9n globalmente o por ruta. Esto significa que puedes usar el EIP removeHeaders para filtrar cualquier cosa como \"cAmel, cAMEL\", etc., o en general todo lo que no comience con \"Camel\", \"camel\" u \"org.apache.camel\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-178" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://camel.apache.org/security/CVE-2025-27636.html", @@ -28,6 +67,14 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/03/09/1", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://camel.apache.org/security/CVE-2025-27636.txt.asc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC/blob/main/src/main/java/com/example/camel/VulnerableCamel.java", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json new file mode 100644 index 00000000000..99b714334f9 --- /dev/null +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-27913", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T20:15:14.500", + "lastModified": "2025-03-10T20:15:14.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.passbolt.com/incidents/host-header-injection", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2e4381719d0..6e3c829542e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-10T19:00:20.273143+00:00 +2025-03-10T21:00:20.174126+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-10T18:34:58.663000+00:00 +2025-03-10T20:23:01.223000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284627 +284652 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `25` -- [CVE-2024-52812](CVE-2024/CVE-2024-528xx/CVE-2024-52812.json) (`2025-03-10T18:15:29.207`) -- [CVE-2024-53307](CVE-2024/CVE-2024-533xx/CVE-2024-53307.json) (`2025-03-10T18:15:29.373`) -- [CVE-2024-55199](CVE-2024/CVE-2024-551xx/CVE-2024-55199.json) (`2025-03-10T18:15:29.757`) -- [CVE-2025-1296](CVE-2025/CVE-2025-12xx/CVE-2025-1296.json) (`2025-03-10T18:15:30.237`) -- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-10T17:15:35.067`) +- [CVE-2022-43454](CVE-2022/CVE-2022-434xx/CVE-2022-43454.json) (`2025-03-10T20:15:13.593`) +- [CVE-2022-48610](CVE-2022/CVE-2022-486xx/CVE-2022-48610.json) (`2025-03-10T20:15:13.713`) +- [CVE-2024-44179](CVE-2024/CVE-2024-441xx/CVE-2024-44179.json) (`2025-03-10T19:15:37.960`) +- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-10T19:15:38.080`) +- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-10T19:15:38.187`) +- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-10T19:15:38.290`) +- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-10T19:15:38.387`) +- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-10T19:15:38.493`) +- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-10T19:15:38.600`) +- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-10T19:15:38.697`) +- [CVE-2024-54558](CVE-2024/CVE-2024-545xx/CVE-2024-54558.json) (`2025-03-10T19:15:38.790`) +- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-10T19:15:38.883`) +- [CVE-2024-56184](CVE-2024/CVE-2024-561xx/CVE-2024-56184.json) (`2025-03-10T19:15:38.983`) +- [CVE-2024-56185](CVE-2024/CVE-2024-561xx/CVE-2024-56185.json) (`2025-03-10T19:15:39.097`) +- [CVE-2024-56186](CVE-2024/CVE-2024-561xx/CVE-2024-56186.json) (`2025-03-10T19:15:39.193`) +- [CVE-2024-56187](CVE-2024/CVE-2024-561xx/CVE-2024-56187.json) (`2025-03-10T19:15:39.293`) +- [CVE-2024-56188](CVE-2024/CVE-2024-561xx/CVE-2024-56188.json) (`2025-03-10T19:15:39.393`) +- [CVE-2025-22603](CVE-2025/CVE-2025-226xx/CVE-2025-22603.json) (`2025-03-10T19:15:39.970`) +- [CVE-2025-25306](CVE-2025/CVE-2025-253xx/CVE-2025-25306.json) (`2025-03-10T19:15:40.230`) +- [CVE-2025-26695](CVE-2025/CVE-2025-266xx/CVE-2025-26695.json) (`2025-03-10T19:15:40.567`) +- [CVE-2025-26696](CVE-2025/CVE-2025-266xx/CVE-2025-26696.json) (`2025-03-10T19:15:40.670`) +- [CVE-2025-27136](CVE-2025/CVE-2025-271xx/CVE-2025-27136.json) (`2025-03-10T19:15:40.770`) +- [CVE-2025-27615](CVE-2025/CVE-2025-276xx/CVE-2025-27615.json) (`2025-03-10T19:15:40.917`) +- [CVE-2025-27616](CVE-2025/CVE-2025-276xx/CVE-2025-27616.json) (`2025-03-10T19:15:41.080`) +- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-10T20:15:14.500`) ### CVEs modified in the last Commit -Recently modified CVEs: `55` +Recently modified CVEs: `34` -- [CVE-2024-26640](CVE-2024/CVE-2024-266xx/CVE-2024-26640.json) (`2025-03-10T16:58:35.783`) -- [CVE-2024-27767](CVE-2024/CVE-2024-277xx/CVE-2024-27767.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-28793](CVE-2024/CVE-2024-287xx/CVE-2024-28793.json) (`2025-03-10T18:13:04.007`) -- [CVE-2024-38319](CVE-2024/CVE-2024-383xx/CVE-2024-38319.json) (`2025-03-10T18:13:04.007`) -- [CVE-2024-42733](CVE-2024/CVE-2024-427xx/CVE-2024-42733.json) (`2025-03-10T17:15:34.673`) -- [CVE-2024-43291](CVE-2024/CVE-2024-432xx/CVE-2024-43291.json) (`2025-03-10T17:06:30.757`) -- [CVE-2024-49281](CVE-2024/CVE-2024-492xx/CVE-2024-49281.json) (`2025-03-10T17:06:30.757`) -- [CVE-2024-51747](CVE-2024/CVE-2024-517xx/CVE-2024-51747.json) (`2025-03-10T17:06:30.757`) -- [CVE-2024-51748](CVE-2024/CVE-2024-517xx/CVE-2024-51748.json) (`2025-03-10T17:06:30.757`) -- [CVE-2024-54001](CVE-2024/CVE-2024-540xx/CVE-2024-54001.json) (`2025-03-10T17:06:30.757`) -- [CVE-2024-57011](CVE-2024/CVE-2024-570xx/CVE-2024-57011.json) (`2025-03-10T17:20:52.287`) -- [CVE-2024-57012](CVE-2024/CVE-2024-570xx/CVE-2024-57012.json) (`2025-03-10T17:20:52.287`) -- [CVE-2024-57013](CVE-2024/CVE-2024-570xx/CVE-2024-57013.json) (`2025-03-10T17:20:52.287`) -- [CVE-2024-57014](CVE-2024/CVE-2024-570xx/CVE-2024-57014.json) (`2025-03-10T17:20:52.287`) -- [CVE-2024-57015](CVE-2024/CVE-2024-570xx/CVE-2024-57015.json) (`2025-03-10T17:20:52.287`) -- [CVE-2024-57016](CVE-2024/CVE-2024-570xx/CVE-2024-57016.json) (`2025-03-10T17:23:12.970`) -- [CVE-2024-57017](CVE-2024/CVE-2024-570xx/CVE-2024-57017.json) (`2025-03-10T17:23:12.970`) -- [CVE-2024-57018](CVE-2024/CVE-2024-570xx/CVE-2024-57018.json) (`2025-03-10T17:23:12.970`) -- [CVE-2024-57019](CVE-2024/CVE-2024-570xx/CVE-2024-57019.json) (`2025-03-10T17:23:12.970`) -- [CVE-2024-57020](CVE-2024/CVE-2024-570xx/CVE-2024-57020.json) (`2025-03-10T17:25:21.297`) -- [CVE-2024-57021](CVE-2024/CVE-2024-570xx/CVE-2024-57021.json) (`2025-03-10T17:25:21.297`) -- [CVE-2024-57022](CVE-2024/CVE-2024-570xx/CVE-2024-57022.json) (`2025-03-10T17:25:21.297`) -- [CVE-2025-0604](CVE-2025/CVE-2025-06xx/CVE-2025-0604.json) (`2025-03-10T18:15:30.100`) -- [CVE-2025-1391](CVE-2025/CVE-2025-13xx/CVE-2025-1391.json) (`2025-03-10T18:15:30.410`) -- [CVE-2025-2097](CVE-2025/CVE-2025-20xx/CVE-2025-2097.json) (`2025-03-10T18:15:30.680`) +- [CVE-2022-49596](CVE-2022/CVE-2022-495xx/CVE-2022-49596.json) (`2025-03-10T20:23:01.223`) +- [CVE-2022-49597](CVE-2022/CVE-2022-495xx/CVE-2022-49597.json) (`2025-03-10T20:23:01.223`) +- [CVE-2022-49598](CVE-2022/CVE-2022-495xx/CVE-2022-49598.json) (`2025-03-10T20:23:01.223`) +- [CVE-2022-49599](CVE-2022/CVE-2022-495xx/CVE-2022-49599.json) (`2025-03-10T20:23:01.223`) +- [CVE-2023-0043](CVE-2023/CVE-2023-00xx/CVE-2023-0043.json) (`2025-03-10T19:15:36.813`) +- [CVE-2023-0278](CVE-2023/CVE-2023-02xx/CVE-2023-0278.json) (`2025-03-10T19:15:36.980`) +- [CVE-2023-0279](CVE-2023/CVE-2023-02xx/CVE-2023-0279.json) (`2025-03-10T19:15:37.140`) +- [CVE-2023-0331](CVE-2023/CVE-2023-03xx/CVE-2023-0331.json) (`2025-03-10T19:15:37.300`) +- [CVE-2023-0535](CVE-2023/CVE-2023-05xx/CVE-2023-0535.json) (`2025-03-10T19:15:37.457`) +- [CVE-2023-24045](CVE-2023/CVE-2023-240xx/CVE-2023-24045.json) (`2025-03-10T19:15:37.617`) +- [CVE-2024-27768](CVE-2024/CVE-2024-277xx/CVE-2024-27768.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-27769](CVE-2024/CVE-2024-277xx/CVE-2024-27769.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-27770](CVE-2024/CVE-2024-277xx/CVE-2024-27770.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-27771](CVE-2024/CVE-2024-277xx/CVE-2024-27771.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-27772](CVE-2024/CVE-2024-277xx/CVE-2024-27772.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-27773](CVE-2024/CVE-2024-277xx/CVE-2024-27773.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-27774](CVE-2024/CVE-2024-277xx/CVE-2024-27774.json) (`2025-03-10T18:34:58.663`) +- [CVE-2024-55581](CVE-2024/CVE-2024-555xx/CVE-2024-55581.json) (`2025-03-10T20:15:13.987`) +- [CVE-2025-0604](CVE-2025/CVE-2025-06xx/CVE-2025-0604.json) (`2025-03-10T19:15:39.487`) +- [CVE-2025-1015](CVE-2025/CVE-2025-10xx/CVE-2025-1015.json) (`2025-03-10T19:15:39.590`) +- [CVE-2025-1391](CVE-2025/CVE-2025-13xx/CVE-2025-1391.json) (`2025-03-10T19:15:39.860`) +- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-10T19:15:40.123`) +- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T20:15:14.280`) +- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T19:15:40.393`) +- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T19:15:41.240`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 300f614e778..98c485902ad 100644 --- a/_state.csv +++ b/_state.csv @@ -202490,8 +202490,8 @@ CVE-2022-34902,0,0,3bca642036a7f5fbef7abb4384927b60af66690baf9b9711fd545cc79d136 CVE-2022-34903,0,0,a6056b96bd3a0cfd0bd50472138c4b711587fbfdb78b1d8479eb2f1688841410,2024-11-21T07:10:24.240000 CVE-2022-34906,0,0,e6188b730417ea61c7bb7ebf52009083f4a7cb4dbce27bcd12f7111ffbae3126,2024-11-21T07:10:24.403000 CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749a7f,2024-11-21T07:10:24.560000 -CVE-2022-34908,0,0,e372e6e4ad38103870ef9ceb4a9207d87f8f4045404cf5bfa60880c2b13c9b58,2024-11-21T07:10:24.703000 -CVE-2022-34909,0,0,fd35bc802b835478546da3a07bd2709024c072e0e0f1103ce5b1115076dcdc59,2024-11-21T07:10:24.863000 +CVE-2022-34908,0,1,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000 +CVE-2022-34909,0,1,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000 CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000 CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000 CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000 @@ -209145,6 +209145,7 @@ CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000 CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000 CVE-2022-43453,0,0,4f8c5d12a19e347f8b683823fe4c9b502d990c3ba9469f4d44b1e31891759592,2024-11-21T07:26:30.987000 +CVE-2022-43454,1,1,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000 CVE-2022-43455,0,0,aaccf1a4be0effdcaae7be22449e0e567213a4864803d6bbd5e5433738917292,2024-11-21T07:26:31.147000 CVE-2022-43456,0,0,fbf810802e6cc72a9300d2ad1e1d21e5a78d5e972cf037e0fa480b8014daaec2,2024-11-21T07:26:31.287000 CVE-2022-43457,0,0,b586d9b5fcc21f59bbb92dab9cd16bed2028800e4d392addb7775ca1d72d60f3,2024-11-21T07:26:31.470000 @@ -212063,7 +212064,7 @@ CVE-2022-4756,0,0,9e970853f5aac5d7f6051f102cceedd8f99418abe211ab6b4e2528e717d24f CVE-2022-47560,0,0,5616db9aa528c40205c29824050b905c2e88ea51b1e926c93bed02b5e4ec18c6,2024-11-21T07:32:11.777000 CVE-2022-47561,0,0,454b37f7fd9c11c3656067782562c54987945e78afe479ca0f20e9d7f49ec371,2024-11-21T07:32:11.913000 CVE-2022-47562,0,0,64dac3d60c8b8f4b61b8e11f0539d75ff755f60ed046d7be0cc3bfc35090556c,2024-11-21T07:32:12.047000 -CVE-2022-4757,0,0,7dc15139d98de2a86a5975751588909bbbe292abf740d3b5b31da8de45a4f307,2024-11-21T07:35:52.970000 +CVE-2022-4757,0,1,330572b2a7a9b16380e3b74ff77c810eb772321907280c2d376b71a676376ea7,2025-03-10T19:15:35.827000 CVE-2022-47577,0,0,9550a922f1829c9398ee175ef3ac239bec1ad3c7148c35d57f01a11d7f1789f1,2024-11-21T07:32:12.187000 CVE-2022-47578,0,0,37fbfce9feaf52d993443117ac1a6355cd7a044484cc92ee5e869312941de9d0,2024-11-21T07:32:12.360000 CVE-2022-4758,0,0,46b648ad13c452add0819ad569687b406e8aabbc253f4a165ea41d12a6100cca,2024-11-21T07:35:53.073000 @@ -212242,7 +212243,7 @@ CVE-2022-47943,0,0,6fed2aad337ab091392ac44913487de3665a0a14f1640eac5a709d8bd7b00 CVE-2022-47945,0,0,57405884bdcd1ba6eb1c80919085ce13225e24da51371e79eb0b976df43e466f,2024-11-21T07:32:36.703000 CVE-2022-47946,0,0,512ed265f5f8e2053f93c8b548e53ea74178f3bdd6c19af0a1fcbc931faca672,2024-11-21T07:32:36.927000 CVE-2022-47949,0,0,490a763e6d17ab1fc8c624b1038948c1372fdf786573e9cb1855d758b34eda63,2024-11-21T07:32:37.143000 -CVE-2022-4795,0,1,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000 +CVE-2022-4795,0,0,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000 CVE-2022-47950,0,0,003354ded967d7f0656182efcdefcb02844991e48622def15771f5148d7f730b,2024-11-21T07:32:37.363000 CVE-2022-47951,0,0,481e357c755abcd47148b16b7b723bb646738cb20fb8e6121dbb931406f4c0c1,2024-11-21T07:32:37.573000 CVE-2022-47952,0,0,2f28f68ee06c7145a4aa6bad466be343ed19ade0a3002280dd2cc93acd595e0e,2024-11-21T07:32:37.827000 @@ -212427,7 +212428,7 @@ CVE-2022-48286,0,0,77447f216a75ff09875f502d3b5b8f406aecac089ebe16a6b1b5f93ee2e96 CVE-2022-48287,0,0,ffb9477554bfe338b59efc3476dab3f4d74daacb476ffb0f751ed5564e9297b5,2024-11-21T07:33:05.610000 CVE-2022-48288,0,0,53624dc7dedd158cf2e34bcf6d37d3940a853ce7cfc5079c02d9b9beb2969500,2024-11-21T07:33:05.757000 CVE-2022-48289,0,0,b5b366f7e746d95cd74726054f258dc90ba5d828687acb098d0143f33c425f64,2024-11-21T07:33:05.897000 -CVE-2022-4829,0,0,8b9ddff4b04c3f527cf1c36861c9e9abbc4e90d34d328f8934fb482e6d66cc92,2024-11-21T07:36:01.690000 +CVE-2022-4829,0,1,e5f3aa7a40b91297255520e914921393171a19d737b7a0a40f3947128bdd2489,2025-03-10T19:15:36.653000 CVE-2022-48290,0,0,a18a7f7669377ff6d4a7ef738b38d89f2aa8b56899df8cbcaaa74e53e24c5978,2024-11-21T07:33:06.020000 CVE-2022-48291,0,0,8898f1361b36f884e0d5e61d1f210ce1c6d76bbf224f42fe249a9b0dd9df6ef5,2024-11-21T07:33:06.130000 CVE-2022-48292,0,0,4580e619ac80f5659a384b768187cc9d60d1eda7933d4c8a5ea11acef9450061,2024-11-21T07:33:06.260000 @@ -212695,6 +212696,7 @@ CVE-2022-48604,0,0,b7085c3e4c6adaacb59f90e568dbbe0fd9c06f7150463b110ec956aae9dc3 CVE-2022-48605,0,0,62f58b311b31fd8465a30a0bc5b8c82e376d99607d50375aa101cb7b2383ea3c,2024-11-21T07:33:35.530000 CVE-2022-48606,0,0,406e74247ad44cf112fb89f83e3e3f708a37c22bdaa01292c5e45f29abdc351c,2024-11-21T07:33:35.700000 CVE-2022-4861,0,0,a170409b4bf98e036db6bbfc40d9107c61b3e888b36d479ce20ddb5f42750f64,2024-11-21T07:36:05.410000 +CVE-2022-48610,1,1,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000 CVE-2022-48611,0,0,edb96bcc230613f04296301d36f37901e8c9cc7fc1a031d550e89cb344ecc1ff,2024-12-10T17:47:45.803000 CVE-2022-48612,0,0,802646f609529dc06dd420914440c6667cb9853a2db61b3df6c56ea4499d0364,2024-11-21T07:33:36.023000 CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9932,2024-11-21T07:33:36.170000 @@ -213761,16 +213763,16 @@ CVE-2022-49587,0,0,045dfa49579766af5db3b307fa6fccc91442356d8f98685bbe7c4c2e730f7 CVE-2022-49588,0,0,61d955ab8edf8015c7901b53731f628af50ead0b2b76583321c7b0f958fb72e4,2025-02-26T07:01:34.367000 CVE-2022-49589,0,0,900e3190f8a3d5f8bc6be01817c676f63f99de109c6e984e75613d4201a664b2,2025-02-26T07:01:34.470000 CVE-2022-4959,0,0,e1112e964cfdf0ebbfe3fa4005ae2e8c4f9c407689379dbe03328e96b22503f5,2024-11-21T07:36:19.850000 -CVE-2022-49590,0,0,e901dd69c67dc719a295c49d0b508bca98a06b0bf33b9e656239520776a1187e,2025-02-26T07:01:34.573000 -CVE-2022-49591,0,0,cf3ff33bf8faedc1e67d17369ac2be6e3a5a1baf8540a23bdbb24c08298a0012,2025-02-26T07:01:34.667000 +CVE-2022-49590,0,1,20cd3c2daa264623e56a323e402735c867806a89472d26c1ed45d8d3ae8e100c,2025-03-10T20:23:01.223000 +CVE-2022-49591,0,1,0cc8543ea627147ea0bf828758a275a1f14ea9d390d5ffa1e7b74f404a8593b8,2025-03-10T20:23:01.223000 CVE-2022-49592,0,0,82cbcad0c742056132cc73616877773fbc05caff75355128651869e0512e1e9b,2025-02-26T07:01:34.760000 -CVE-2022-49593,0,0,e5f1303a652842d3b18f50e804cbd8b7648b3bc37458a06fe6db95793bb227fb,2025-02-26T07:01:34.853000 -CVE-2022-49594,0,0,cd4b7b4e5b4bbbf1c4c76df7cdb5a625b549e358714ddf40517b32b3e1240580,2025-02-26T07:01:34.947000 -CVE-2022-49595,0,0,422f7e67ccc1235d8f9da3cba0a8531a9af59ec4580cfa63212ec1ad1606679b,2025-02-26T07:01:35.040000 -CVE-2022-49596,0,0,2dd4161256225c6c674124c7459b85f3943c1f0aa622a2edb991ee572c0724e9,2025-02-26T07:01:35.133000 -CVE-2022-49597,0,0,9aae8a41dfa5e280af982ea517cc043e654120719e830ffaabcf01ba0c57e46a,2025-02-26T07:01:35.220000 -CVE-2022-49598,0,0,852460f00e7b8a6601c3cf4a55aa9bcd60ab4e99e5a0f42ec71331284fdc5767,2025-02-26T07:01:35.310000 -CVE-2022-49599,0,0,f7dd814f9c7e8eb79adfc8bf1928c5ea2c0239a0e501695d0bba13ec00d3f2ed,2025-02-26T07:01:35.403000 +CVE-2022-49593,0,1,a490d84d1db8d08c1bd74f1bbffbd14e057da73f802032361a953fc57bba4b2a,2025-03-10T20:23:01.223000 +CVE-2022-49594,0,1,68c11eaa5cee315d2058915886cf4743aec7164a60d951e32eded865eae0e0a5,2025-03-10T20:23:01.223000 +CVE-2022-49595,0,1,cb3cc118f10224c75b44427115256c50de660f489bf615954bd09294bb83f634,2025-03-10T20:23:01.223000 +CVE-2022-49596,0,1,337ae6121adf3254b498227e6016c5ad49661dd3458af5805aaecedbb5c23a5e,2025-03-10T20:23:01.223000 +CVE-2022-49597,0,1,087db79fce42e862ebc19f60a0cd8a4d276064edbfecda432de024386a2abe2b,2025-03-10T20:23:01.223000 +CVE-2022-49598,0,1,4513ae3cbce03da98d4d53eb6584e35a52b0ecf09877c7c7fcd58e1e04f9ada3,2025-03-10T20:23:01.223000 +CVE-2022-49599,0,1,dea4f25c68b18e3924ae0cebca86bba06c445790ab725462667c62f83f5b5d96,2025-03-10T20:23:01.223000 CVE-2022-4960,0,0,b445d73955b3452a42faaf28d577ad453defce902d7d2b7869afb976b59de9a5,2024-11-21T07:36:19.990000 CVE-2022-49600,0,0,647466d22b891d627008f8c35082b78b57ca04645a9e05693e095b90d2283105,2025-02-26T07:01:35.497000 CVE-2022-49601,0,0,82f26928b9b858df32635906b08bc3d0e34c32e5f4d185edb7cadc51b744f016,2025-02-26T07:01:35.603000 @@ -213960,7 +213962,7 @@ CVE-2023-0039,0,0,d8fc5a260515ca8bf2d6438e2d24484997e6b69319da7eb48b0fdfda987637 CVE-2023-0040,0,0,1c92c868dbbb373cc9e61bd563e0122ca4213b995b7eceebca4ef72e2b010054,2024-11-21T07:36:26.600000 CVE-2023-0041,0,0,d5260d420f1cd6c78adae2a5f84b81d66b97bb4962628ebb0c02b41c604a1529,2024-11-21T07:36:26.710000 CVE-2023-0042,0,0,9b1a6decc351f08b4eff07cee0d8cf1c5c59713d547ae72a1b1cdb4625fb24f2,2024-11-21T07:36:26.833000 -CVE-2023-0043,0,0,d84f4a83da715b89809f0d18897b893dbcab6f95fe4a94206704aa05f0816dd0,2024-11-21T07:36:26.947000 +CVE-2023-0043,0,1,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000 CVE-2023-0044,0,0,5e0b3bc76f4e520dfb3a7d3f8757c01f27c22cbe64833773e8a4716039c15539,2024-11-21T07:36:27.050000 CVE-2023-0045,0,0,0b3fb0f7f170c454540ecd2b56095b147720cad9a83cc54301e4003eb4127273,2025-02-13T17:15:52.813000 CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000 @@ -214143,7 +214145,7 @@ CVE-2023-0225,0,0,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000 CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000 CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000 -CVE-2023-0230,0,1,c888c4e4e602f029814ba8a085aca6cf28a9ef06b8915eb3955bcefa69bbd019,2025-03-10T18:15:25.660000 +CVE-2023-0230,0,0,c888c4e4e602f029814ba8a085aca6cf28a9ef06b8915eb3955bcefa69bbd019,2025-03-10T18:15:25.660000 CVE-2023-0231,0,0,db877aacf7fbd4ab292656ffa763c993cd207348eea4e2a4a5be93a66b63d92e,2024-11-21T07:36:47.330000 CVE-2023-0232,0,0,b38904e9121f618269c5c08599e7497bb10e3ac65e24b8d2e080a9d12cef4f40,2024-11-21T07:36:47.437000 CVE-2023-0233,0,0,1d93dc703aecdfcb31bf431fa450ffba327ed668daa1f122d3d0796177d316f5,2025-01-14T19:15:28.447000 @@ -214190,8 +214192,8 @@ CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923 CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000 CVE-2023-0276,0,0,c7487a428bcb8bea2b1c668b589a64212adff21c21ab0a4c676cd54cc33a9831,2025-02-04T19:15:26.810000 CVE-2023-0277,0,0,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000 -CVE-2023-0278,0,0,3a4b2bda32dda84a6dc747ab184d2c67d895ef254cbed08fe2c7b9e223c853e6,2024-11-21T07:36:52.977000 -CVE-2023-0279,0,0,551024725818964cc44503fe7f4c9317ea6df7b6af03ca92ead87091a210218e,2024-11-21T07:36:53.070000 +CVE-2023-0278,0,1,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564bf,2025-03-10T19:15:36.980000 +CVE-2023-0279,0,1,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000 CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000 CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000 CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000 @@ -214242,10 +214244,10 @@ CVE-2023-0327,0,0,6167212aceb2c31f3e634ebdc5e2fe015ef028aba2344b99409195bff6437f CVE-2023-0328,0,0,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000 CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000 CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000 -CVE-2023-0331,0,0,6bc9688deeae710cbf744fa07feeea2933d7392453d27f8553fbe1cb355de2dc,2024-11-21T07:36:59.217000 +CVE-2023-0331,0,1,274bc1369cae7fe09b0ee22ff916b8e440be2bc931740cb608cdf750fdecd31d,2025-03-10T19:15:37.300000 CVE-2023-0332,0,0,64542e438bcf827f156cc70cf5d07c1026d6770324516bf2f45d1e6076758c95,2024-11-21T07:36:59.323000 CVE-2023-0333,0,0,d93bc6bc1e86c850a7ca00b9aa76a2e4c088cb012f60fc9847e05a56a68ded9d,2024-11-21T07:36:59.453000 -CVE-2023-0334,0,1,175a7982408f35d772ed00c5568ef62db28b9c60519c9ae85f03fb928679ffdc,2025-03-10T18:15:25.830000 +CVE-2023-0334,0,0,175a7982408f35d772ed00c5568ef62db28b9c60519c9ae85f03fb928679ffdc,2025-03-10T18:15:25.830000 CVE-2023-0335,0,0,81a486779e4f7822f594ba6a10f491ec26797c357292ad9c92e7938c3e6233c4,2025-02-19T21:15:11.613000 CVE-2023-0336,0,0,a60a90bffcffedbaa055f52665a26980864469f014fcc57b5c3b697efa132078,2025-02-19T20:15:33.370000 CVE-2023-0337,0,0,112be93cad8209381e7b3eb1eece74b6aa7661c3bca890d8d8e3f3f821327549,2024-11-21T07:36:59.880000 @@ -214435,7 +214437,7 @@ CVE-2023-0531,0,0,a2b5fd3930f524cb401e124ec5786010c9cad4c621114fd4abdc2acf74f299 CVE-2023-0532,0,0,72ca8898990fb8610307e6516d129fcf16189811012a79289b01f939cac9bf59,2024-11-21T07:37:21.400000 CVE-2023-0533,0,0,c178517ebefc16ee41a2f59036c34ccd760249657d48f36ef9ada635b640a8f4,2024-11-21T07:37:21.523000 CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a25d,2024-11-21T07:37:21.653000 -CVE-2023-0535,0,0,097c1a72387a82081f06503b5910ccdb4d6c97aee981438d38ed487552857661,2024-11-21T07:37:21.773000 +CVE-2023-0535,0,1,3b217b841d5fdae261b9bfef38db6cfc982634658ef94aea978d026a27fc8091,2025-03-10T19:15:37.457000 CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000 CVE-2023-0537,0,0,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000 CVE-2023-0538,0,0,93bd0a7452675c80af54b0b64fee7d659b3b74c3f15a2d1e9d62100379c03b54,2025-02-27T16:15:35.693000 @@ -214448,7 +214450,7 @@ CVE-2023-0544,0,0,574b0c3977db6cc6752e6a2c2235836557bb5b6346992841309bc3d7974546 CVE-2023-0545,0,0,9a00641837b7d164ad8476424933e523d526dc5597557da2fce461330bb0a3db,2025-01-08T17:15:10.463000 CVE-2023-0546,0,0,3ae24fee2ec1c7b6260e454eaee0d81013301c86676e420b9d1df0bb072562a7,2025-02-11T21:15:10.067000 CVE-2023-0547,0,0,a0d2eb358d27126e81ef476edb803ca04858080782efb6ee5ebba720becbd1cf,2025-01-10T19:15:31.600000 -CVE-2023-0548,0,1,b9a98b7e80a5fd234336b65fbeeb6cd5d43dbc35e37a2dbe56ab6c787fe54530,2025-03-10T18:15:26.070000 +CVE-2023-0548,0,0,b9a98b7e80a5fd234336b65fbeeb6cd5d43dbc35e37a2dbe56ab6c787fe54530,2025-03-10T18:15:26.070000 CVE-2023-0549,0,0,f6480b7e8d69b059109f807f8d590797408269f596b27b454312db7225cb4af2,2024-11-21T07:37:23.113000 CVE-2023-0550,0,0,bec5b5445a12fbf0814f5101c2402888112304285a3256f9f16660f8b16d4d24,2024-11-21T07:37:23.237000 CVE-2023-0551,0,0,30c9be71559fae5c12b24bfc599fd34d69ea838008cf2e194ad4186361ffc482,2024-11-21T07:37:23.333000 @@ -219174,7 +219176,7 @@ CVE-2023-23891,0,0,9a467d5c8576278cd60800aa31195e66e21136dfb0f4b2951cf9c492fbe2a CVE-2023-23892,0,0,babd7b6eb254e5a1e48ab1ecee1f075091bb9524952f0370f061cce457d343e8,2024-11-21T07:47:02.940000 CVE-2023-23893,0,0,79a8b1e4c088a6b98234d52b61651bf5cebf3c590e29e2eb91b4549f46d3c09e,2024-12-09T13:15:21.793000 CVE-2023-23894,0,0,ac1fbc40c284c0f0382b0d62dc16300b41b03c54eb17701ef0abf4283ac91cae,2024-11-21T07:47:03.067000 -CVE-2023-23895,0,1,a41a2c4db86cbf592807ce9d37013568188d0f8cb0d021366c212538361ba2b6,2025-03-10T17:06:30.757000 +CVE-2023-23895,0,0,a41a2c4db86cbf592807ce9d37013568188d0f8cb0d021366c212538361ba2b6,2025-03-10T17:06:30.757000 CVE-2023-23896,0,0,323349cf0baac2bb680f396fcf57bee11f3b3efdbbe33857343c32da31079f52,2024-11-21T07:47:03.193000 CVE-2023-23897,0,0,8a120f9b5892c25b1345b6a3937aae72e10f21285071459a906a94ee359146eb,2024-11-21T07:47:03.320000 CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fcab74,2024-11-21T07:47:03.457000 @@ -219317,7 +219319,7 @@ CVE-2023-2404,0,0,e871d45a60e6005e1c4d45eb75a9edfef9fb129d460ff44788c0692638e391 CVE-2023-24040,0,0,002ab84f91c2eae9544026e8fa8d4517b3f52600ca19d17e1f95ceb1f9a2e8c9,2024-11-21T07:47:18.467000 CVE-2023-24042,0,0,d6d3ecc0a691c83cc86f03b6376ddddf48103b3dd6e853b135a9635e4d2c7d94,2024-11-21T07:47:18.610000 CVE-2023-24044,0,0,16a8553bd0666dab543a312b7317e79c35107a001bc50445b44596eef0ef3155,2024-11-21T07:47:18.750000 -CVE-2023-24045,0,0,5c324b816d5a205767f0685dce0e15176f43d4d1a280a0b7d7f3b06ee8a1587c,2024-11-21T07:47:18.897000 +CVE-2023-24045,0,1,901b665cb2123c392752262b84c2e0694a98683ff59753e393bfb75068bd048c,2025-03-10T19:15:37.617000 CVE-2023-24046,0,0,56466e1ad08e92cf55b8d9678d21b3ed2227b04fa61598011e5b2d90bd51ec2b,2024-11-21T07:47:19.037000 CVE-2023-24047,0,0,a6b3942ab48c4dff8c51b327a9cd882f419b051667e55c995e894045226d3b1c,2024-11-21T07:47:19.280000 CVE-2023-24048,0,0,1daabdf121529baf332053607b6904a5f303bef930f5ace2d43503e61c89a753,2024-11-21T07:47:19.503000 @@ -219363,7 +219365,7 @@ CVE-2023-24108,0,0,aef70f73d56b6d18ff55fb4dfbd92c1419c67b181b553728caa0c072ada07 CVE-2023-2411,0,0,48e2dd8e32317ce67fe5cdde8c7bca570b474bf388ef23aded86e634b2dad07b,2024-11-21T07:58:33.810000 CVE-2023-24114,0,0,76e9f701e31cb5df44c27a2baf89ea3860585eaaf8f5278b384644755c3fc2f1,2024-11-21T07:47:24.707000 CVE-2023-24117,0,0,ce5ca96f7ef33bb88a08fedb0b5de8f644b7fe11f092c19dd5f0327669408df9,2025-03-07T17:15:16.737000 -CVE-2023-24118,0,1,b9815cd8fb0dcbcd37aca85bfc8a715d5eb93c97f2edc7018fb0fe882d3547e3,2025-03-10T17:15:33.840000 +CVE-2023-24118,0,0,b9815cd8fb0dcbcd37aca85bfc8a715d5eb93c97f2edc7018fb0fe882d3547e3,2025-03-10T17:15:33.840000 CVE-2023-24119,0,0,80cb6502119a1de14e9171897ca7f8e5f1afed7ddaf8a27c955cb5d859eb123f,2025-03-07T21:15:15.050000 CVE-2023-2412,0,0,f89ba170f161b8d62ce35271e8715f316d8fd52eb600a4af46dfcf59117e77a5,2024-11-21T07:58:33.947000 CVE-2023-24120,0,0,714454f747e49f6103cdc79930ee3cdcfb846f1571c6409973adf5184b191a0c,2025-03-07T21:15:15.243000 @@ -219507,7 +219509,7 @@ CVE-2023-24350,0,0,2be180a049d41eea8f344d8686f7513ad65df5af75c3508f4ed4cff9cc6f4 CVE-2023-24351,0,0,a6d7cb0038d3c7bf24d5605d870847f8a4e1a473e39b63b554a003784f394623,2024-11-21T07:47:43.237000 CVE-2023-24352,0,0,4c32ce69bfa33728c96d3e5c535b8f201a6567bd957f2db69e791a8c002ed675,2024-11-21T07:47:43.383000 CVE-2023-2436,0,0,2f2707775499ceab975728bb97e30831616245051d74f197f5448b7364446a2e,2024-11-21T07:58:36.907000 -CVE-2023-24364,0,1,61f926ce1df43404bece98f2dd55d5ca5a40dbcd0b2a60e5372dd4cd23603683,2025-03-10T18:15:26.323000 +CVE-2023-24364,0,0,61f926ce1df43404bece98f2dd55d5ca5a40dbcd0b2a60e5372dd4cd23603683,2025-03-10T18:15:26.323000 CVE-2023-24366,0,0,5d7db002c1457019f1582d6e2eb9871a01ac3c1ff77928c5a114a7191bcb3a47,2025-02-19T18:15:22.477000 CVE-2023-24367,0,0,bd2afe80ba273e0d4f82725134a30190fb13e39466ede74273078ca9c22f3c02,2023-11-07T04:08:26.813000 CVE-2023-24368,0,0,5900bc1b5bb4d3a71bee753000740d76a9c188b4b457ab1d2153e4af094e1845,2023-11-07T04:08:26.850000 @@ -219786,12 +219788,12 @@ CVE-2023-24646,0,0,d1a442ce7864479512c8fe6ab09faa0757c0ff18bf1c24a2e1724cfe374e8 CVE-2023-24647,0,0,97ec42b52dfa4f5d755188fee73924996a4b78591b876b6d5191063d70015aab,2024-11-21T07:48:16.253000 CVE-2023-24648,0,0,f1afb64de51d0b28938f329805bf49667b5ad8753e024c498107964d2cf939f5,2024-11-21T07:48:16.393000 CVE-2023-2465,0,0,2e484d3ef588499a8634f042b97e16c005480a38f269a79668612bd11ca7ca85,2024-11-21T07:58:40.380000 -CVE-2023-24651,0,1,488301ad46ce92451b7cd307f09d1a45eb6f2e0705322a23296c6314d9cff72a,2025-03-10T18:15:26.633000 -CVE-2023-24652,0,1,7c8a6ad52a57389247139a3adfe1f42c90279364bc95856593026e54f305437b,2025-03-10T18:15:26.870000 -CVE-2023-24653,0,1,956b5780900ec10ef24476deb9832642ac13bd1832e03bc3dfb8d14f9df9d112,2025-03-10T18:15:27.067000 -CVE-2023-24654,0,1,22ee38175d63edaac498acdfa539ed750af24589b6b4d0f7bd0cddcd58238fff,2025-03-10T18:15:27.313000 +CVE-2023-24651,0,0,488301ad46ce92451b7cd307f09d1a45eb6f2e0705322a23296c6314d9cff72a,2025-03-10T18:15:26.633000 +CVE-2023-24652,0,0,7c8a6ad52a57389247139a3adfe1f42c90279364bc95856593026e54f305437b,2025-03-10T18:15:26.870000 +CVE-2023-24653,0,0,956b5780900ec10ef24476deb9832642ac13bd1832e03bc3dfb8d14f9df9d112,2025-03-10T18:15:27.067000 +CVE-2023-24654,0,0,22ee38175d63edaac498acdfa539ed750af24589b6b4d0f7bd0cddcd58238fff,2025-03-10T18:15:27.313000 CVE-2023-24655,0,0,2c683583f12b22bfec0d853f0ded8bda91e3947d26c46f2146e03ff553b71ae0,2024-11-21T07:48:17.093000 -CVE-2023-24656,0,1,6125992e2f6efe3194f000bcb420a1fdaf47364a78f7c7c3083ba847105da4b5,2025-03-10T18:15:27.530000 +CVE-2023-24656,0,0,6125992e2f6efe3194f000bcb420a1fdaf47364a78f7c7c3083ba847105da4b5,2025-03-10T18:15:27.530000 CVE-2023-24657,0,0,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000 CVE-2023-2466,0,0,11706004b2e4425098ffba584a264c551af3b1fa100d938c14012cd19f192cc7,2024-11-21T07:58:40.510000 CVE-2023-2467,0,0,bcb3cc43170efb1f1f3187d2376deda032a3eae91db4c6ac796dc30649cef271,2024-11-21T07:58:40.630000 @@ -220287,10 +220289,10 @@ CVE-2023-25222,0,0,8088846710b2df8e157581112043c8bc6d9756975531b6619999896dc395f CVE-2023-25223,0,0,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601c4f,2025-03-05T16:15:36.693000 CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000 CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000 -CVE-2023-25231,0,1,02ddf549c9919d021a035a3f7398c3d0232dd0bba8bb5db63c5e6c460b9cb870,2025-03-10T18:15:27.743000 +CVE-2023-25231,0,0,02ddf549c9919d021a035a3f7398c3d0232dd0bba8bb5db63c5e6c460b9cb870,2025-03-10T18:15:27.743000 CVE-2023-25233,0,0,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000 -CVE-2023-25234,0,1,b7aa9eccbbcf990a69a87b6a08dd3b7662b3b8d873d320038671cb3c84516c29,2025-03-10T18:15:27.940000 -CVE-2023-25235,0,1,2804c9928db78a144ae918a9f7e60f4c8fd3fffaace6db42d67450c5ae822ba8,2025-03-10T18:15:28.137000 +CVE-2023-25234,0,0,b7aa9eccbbcf990a69a87b6a08dd3b7662b3b8d873d320038671cb3c84516c29,2025-03-10T18:15:27.940000 +CVE-2023-25235,0,0,2804c9928db78a144ae918a9f7e60f4c8fd3fffaace6db42d67450c5ae822ba8,2025-03-10T18:15:28.137000 CVE-2023-2524,0,0,a2726305bcea2f845a6096aa4d7886b789131c21fac5c5b2a82d5d0b3feb2601,2024-11-21T07:58:46.563000 CVE-2023-25240,0,0,8f54673119014de0cf874ed053cc6287359d4b3be00312c798c43582a56528e1,2024-11-21T07:49:21.337000 CVE-2023-25241,0,0,67b4d369c111bf4f1d66e72210ff14d8c3ad87005bca819dcaa6cf536b263cec,2024-11-21T07:49:21.470000 @@ -221498,7 +221500,7 @@ CVE-2023-2674,0,0,039137594fe7c7d34bb7f37fd7078029f10c4a0df18a4010fa89d3fbf147de CVE-2023-2675,0,0,07c06275419dcd681decfa003611adff7356076776c10b0fa95b5660ea113d52,2024-11-21T07:59:03.617000 CVE-2023-26750,0,0,5680098ce4e41c5b8710965fc30df10382e97cc525ea142f0ea99122882df621,2025-02-13T16:15:39.263000 CVE-2023-26756,0,0,bce96ca42026c1c9876289cdcae313a421d7d8a46aa8a6150cb10b4815701212,2024-11-21T07:51:53.850000 -CVE-2023-26758,0,1,d023c3250afbf1f96306e3f224dff8d8e6163d78f2af86695e161ccb406953ce,2025-03-10T18:15:28.413000 +CVE-2023-26758,0,0,d023c3250afbf1f96306e3f224dff8d8e6163d78f2af86695e161ccb406953ce,2025-03-10T18:15:28.413000 CVE-2023-26759,0,0,fa278f1f8d2b0f2f4b3ecb4c07264684400a2def5a730dfa3c154c5f0ca86587,2024-11-21T07:51:54.140000 CVE-2023-2676,0,0,51c3bf7c174796a0fefc1be82999f859d717cf4431b2be630e0fa1236f4caafe,2024-11-21T07:59:03.750000 CVE-2023-26760,0,0,89f9e45fb0a1dc5ec5e14dec98e146f8906d1bae8839c609d65a64b33f9d5888,2024-11-21T07:51:54.287000 @@ -222011,7 +222013,7 @@ CVE-2023-27457,0,0,db33655e037a343ca2b318f816541e3292041ff8f0e3b127514bebbaaa676 CVE-2023-27458,0,0,72f63a7dc4baad5b877257b3e2edfdcf3718e24661edf4a00069bab70ec5e210,2024-11-21T07:52:57.050000 CVE-2023-27459,0,0,52dd158ab4109639424079513a505fc276707ade7fe70bcd50217505d316710c,2024-11-21T07:52:57.177000 CVE-2023-2746,0,0,98242dea1630ecb5d407829a0cfc43949cf4fae0e0c6a7aee7cbf79120ac6bca,2024-11-21T07:59:12.863000 -CVE-2023-27460,0,1,c8765a706f7dcdcbeada957f8018c686ca5887071ef5a9f00a4c319e098afc49,2025-03-10T18:13:04.007000 +CVE-2023-27460,0,0,c8765a706f7dcdcbeada957f8018c686ca5887071ef5a9f00a4c319e098afc49,2025-03-10T18:13:04.007000 CVE-2023-27461,0,0,175bed00a77c02dfaff0699075240f268538851e9028c34c2c4a73edf53266b8,2024-11-21T07:52:57.417000 CVE-2023-27462,0,0,2753acd56058c78c9b40a10cccdcaef0d20c4e913018cb45b2738a744d8a5d7f,2024-11-21T07:52:57.543000 CVE-2023-27463,0,0,762bf14565d23d4343e40e12bbcc0ce88cd3db82d0b0aacd3eaf47f25d900552,2024-11-21T07:52:57.663000 @@ -228033,7 +228035,7 @@ CVE-2023-35045,0,0,59020ba7086d756072a9d908f45df756fc13e6c52833fd8a2279c472be043 CVE-2023-35046,0,0,be75d7bddb171773fdfc0b865c7ebb49459a073b8a61424f81664689f2e5b394,2024-12-13T15:15:15.723000 CVE-2023-35047,0,0,eba9e5240fc0579a5e94cb2c6682ca1369edf28f1e86dad6841e23630fabe6f4,2024-11-21T08:07:52.847000 CVE-2023-35048,0,0,c42c36702131c48dc501f2245ae6b03b0b394e9476a0c5a9061c817acd6f524f,2024-11-21T08:07:52.980000 -CVE-2023-35049,0,1,0cf51c56cc6d9df352048d3a6b5f38e3f0ff9eab19a9506e807a84df97cd59fa,2025-03-10T18:13:04.007000 +CVE-2023-35049,0,0,0cf51c56cc6d9df352048d3a6b5f38e3f0ff9eab19a9506e807a84df97cd59fa,2025-03-10T18:13:04.007000 CVE-2023-3505,0,0,028abed4ed563200a4d3925dc55e0b44321934486645d4eca13e9c221952639f,2024-11-21T08:17:24.700000 CVE-2023-35050,0,0,7798d8be3a83e605c6d0ad9dcb99cd50b0dfdf1c690f4791cdfc810b3cb136f2,2024-11-21T08:07:53.260000 CVE-2023-35051,0,0,f0c3f4150fd7e48e527eddb623de0aca17423e277eb3de8858de4a5618ee0234,2024-12-13T15:15:15.880000 @@ -235648,7 +235650,7 @@ CVE-2023-45184,0,0,64ec97d0791ac94597b9fce89ee4101aaafa282149a7e281e74d03b0c2b6e CVE-2023-45185,0,0,958bb7f9ab726baa6551b1ed5b3b2aa3f36bcda842da623ad72ba1d1cc9250a6,2024-11-21T08:26:30.243000 CVE-2023-45186,0,0,d0c195d0650caa2bb85d0cc4d01d13b093cea21f2e009fea6a850f72db35dee8,2025-03-07T12:36:39.820000 CVE-2023-45187,0,0,7a25113913bdfaa093e16d0e459479e4148d92e6e3c8ee85ad6e101a75208897,2024-11-21T08:26:30.480000 -CVE-2023-45188,0,1,215c4c2dd6bd8a45c2eb1d226e773a3288f294d71934bcd40fa6f4672c275f61,2025-03-10T18:13:04.007000 +CVE-2023-45188,0,0,215c4c2dd6bd8a45c2eb1d226e773a3288f294d71934bcd40fa6f4672c275f61,2025-03-10T18:13:04.007000 CVE-2023-45189,0,0,f4b0af059f3a0562e168f234ad68df1aabc690d9e4f22c110cb4e65c5ea165e5,2024-11-21T08:26:30.750000 CVE-2023-45190,0,0,eb5591ce4ba733f3a772f386dbb335931b047031be52f065eeb98817a286e13a,2024-11-21T08:26:30.923000 CVE-2023-45191,0,0,7f68af9a0dc22b74999adb2519360c7e4264630522b0a7be5152df7ce6fe6670,2024-11-21T08:26:31.050000 @@ -240081,7 +240083,7 @@ CVE-2023-51339,0,0,46130be144d70d7717f34638d17bcb922ba5bdffc38788d706d1125b8b9b3 CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000 CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000 CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000 -CVE-2023-51353,0,1,49eaf778d4cf8aabc8f5bcfd99e85006d639981f1f252aae0ce29aae4cfd695e,2025-03-10T17:06:30.757000 +CVE-2023-51353,0,0,49eaf778d4cf8aabc8f5bcfd99e85006d639981f1f252aae0ce29aae4cfd695e,2025-03-10T17:06:30.757000 CVE-2023-51354,0,0,708af8c5468f01b121a6a1c668923294699783ac63a9cd7f532f375515a975b1,2024-11-21T08:37:57.030000 CVE-2023-51355,0,0,403a1b38462fab64d2958d48b042a496c74a03590091d2ef7736ab842bdb9794,2024-12-09T13:15:39.650000 CVE-2023-51356,0,0,0c338ccdcc36826e4261bb2d65b363156e88e8f2d31d7f5f3ac98f0991e9c93c,2024-11-21T08:37:57.153000 @@ -240250,7 +240252,7 @@ CVE-2023-51508,0,0,a1c83b0bb39aaff5b985cebbbf0f854a0f62ed7ffb1079cd2361cd180b397 CVE-2023-51509,0,0,5141cc1874d879c09bc6c5ae29f17b7cc3618a3dd55ae068dff761ececd3f235,2024-11-21T08:38:16.530000 CVE-2023-5151,0,0,08d96cd770bf1b04c30c98efb5eed61debed8b417449bf44e4a7ebc9a6835ec0,2024-11-21T08:41:10.143000 CVE-2023-51510,0,0,712c928dab66c438ef372acf6bdb096bd47638c890e5047299143bada89617f9,2025-02-27T03:24:36.033000 -CVE-2023-51511,0,1,cae241fcef44721bff5589ec2c54837fd24df588d001d53f19eb5935e10f3873,2025-03-10T18:13:04.007000 +CVE-2023-51511,0,0,cae241fcef44721bff5589ec2c54837fd24df588d001d53f19eb5935e10f3873,2025-03-10T18:13:04.007000 CVE-2023-51512,0,0,3ffe46037d2759016fc60df007fcfb3e5660be4e480910443f43adca1c621857,2025-02-27T03:24:36.033000 CVE-2023-51514,0,0,fd045876a5b64b601897d61b4879de0ef70ace44f02a5bb84fff6e9509399735,2024-11-21T08:38:17.033000 CVE-2023-51515,0,0,cf6f4fc5368cadc9aabbda6e25adff7a88b955bad0dfc9c1844c5fb48208e5cc,2024-11-21T08:38:17.167000 @@ -244337,7 +244339,7 @@ CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9 CVE-2024-10091,0,0,6e7587c6e48a4895e0398f4ef5a128ee8ab9d12529d1ec8cebe459ac4ee7d408,2025-01-16T21:48:55.983000 CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,0b4f7b1e1ef181948292cdf0451d434c8b0b600a4a601aafca87364e5f264510,2024-11-01T18:07:07.003000 -CVE-2024-10094,0,1,2644c6a3dfcd4c8fa60f0e771649f49e675928f64c64582b879b26ca2df538d9,2025-03-10T17:06:30.757000 +CVE-2024-10094,0,0,2644c6a3dfcd4c8fa60f0e771649f49e675928f64c64582b879b26ca2df538d9,2025-03-10T17:06:30.757000 CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000 CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000 CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000 @@ -244849,7 +244851,7 @@ CVE-2024-1065,0,0,b15b37df186076da575ae1588759c677f2677d06b5081dbb99648fc8d07192 CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000 CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000 CVE-2024-10653,0,0,f703737b2cc08f11753db75c9b1433d1a44f113e4bd6d601b3a10301d1952eb0,2024-11-04T07:15:03.743000 -CVE-2024-10654,0,1,bf919a7c32885c2cba00144b666938dd05ef198c6bf6ef16d545050a6037843a,2025-03-10T17:06:30.757000 +CVE-2024-10654,0,0,bf919a7c32885c2cba00144b666938dd05ef198c6bf6ef16d545050a6037843a,2025-03-10T17:06:30.757000 CVE-2024-10655,0,0,c1605174ca0bb72f5c9612ecc61dcf97fbbb993d8c4109db39f86f93e1de224e,2024-11-04T19:47:40.207000 CVE-2024-10656,0,0,6a9c2ea00e33366ef08d41c370d91f9326101b5384c55b9760d8981100c96617,2024-11-04T19:47:22.733000 CVE-2024-10657,0,0,9ba68410d60d8b4027ec1ef39aa8cd6c91220d7679502c5a5b889ed775c305d9,2024-11-04T19:47:03.377000 @@ -247776,8 +247778,8 @@ CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb672 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 CVE-2024-13821,0,0,c4eb4e44a47cc783a97d83164c517f80c21576edac7bfce0a1b9d4ee6f34830b,2025-02-25T19:37:29.223000 CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000 -CVE-2024-13825,0,1,71493fd1d48d0d842d256208931e7dc7eb27b21d21ff8bccb7803a3f2c80deb6,2025-03-10T18:15:28.793000 -CVE-2024-13826,0,1,4bf4fca4bc827f8230936e1661739c4e4d10085199dc6f814c2ceba2fedee25a,2025-03-10T18:15:28.940000 +CVE-2024-13825,0,0,71493fd1d48d0d842d256208931e7dc7eb27b21d21ff8bccb7803a3f2c80deb6,2025-03-10T18:15:28.793000 +CVE-2024-13826,0,0,4bf4fca4bc827f8230936e1661739c4e4d10085199dc6f814c2ceba2fedee25a,2025-03-10T18:15:28.940000 CVE-2024-13827,0,0,2f0ca45e1aed4689f4e667f770fa7c2c2b82b3b6b79c11996f3151fecdcc8143,2025-03-05T09:15:09.390000 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,9a7ca27e3e9e1c136c5682d7084731ee4c3dff24e0ba89a42c0d6d10ece5df05,2025-02-13T20:02:55.647000 @@ -247836,8 +247838,8 @@ CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000 CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000 -CVE-2024-13918,0,1,dd3246088d0020e60eea2c9a743f405ac80e445444e7d8b0b4c1330698a621f4,2025-03-10T17:15:34.383000 -CVE-2024-13919,0,1,a449fd88163dd2c8f4cc42377a274723f7166a46202a509ead9b299715d86a4e,2025-03-10T17:15:34.540000 +CVE-2024-13918,0,0,dd3246088d0020e60eea2c9a743f405ac80e445444e7d8b0b4c1330698a621f4,2025-03-10T17:15:34.383000 +CVE-2024-13919,0,0,a449fd88163dd2c8f4cc42377a274723f7166a46202a509ead9b299715d86a4e,2025-03-10T17:15:34.540000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 CVE-2024-13924,0,0,623f22e67c236278ca920e96a81e7b261b9ec578974ede6c7601d32ce0e02517,2025-03-08T13:15:12.160000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 @@ -253544,13 +253546,13 @@ CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e94 CVE-2024-26632,0,0,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000 CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000 CVE-2024-26634,0,0,07d6fa98833a05abaecfbd7e472c45df8681df5aa0f728361828b4567b94ce61,2025-03-10T15:41:09.180000 -CVE-2024-26635,0,1,6b2b9152f4cc09a5347dc496694c99c592fee9690399767d251bdbfcb1c92ac3,2025-03-10T16:58:35.783000 -CVE-2024-26636,0,1,8b0a8d3107e26b7b2aa744e44d84fc31d26b66db5424efbb8b5a05c2d67bbabd,2025-03-10T16:58:35.783000 -CVE-2024-26637,0,1,707cf2a09ca1107f1ccf101194f7dae4ade846d0a897c728a4c646c6cef4d174,2025-03-10T16:58:35.783000 +CVE-2024-26635,0,0,6b2b9152f4cc09a5347dc496694c99c592fee9690399767d251bdbfcb1c92ac3,2025-03-10T16:58:35.783000 +CVE-2024-26636,0,0,8b0a8d3107e26b7b2aa744e44d84fc31d26b66db5424efbb8b5a05c2d67bbabd,2025-03-10T16:58:35.783000 +CVE-2024-26637,0,0,707cf2a09ca1107f1ccf101194f7dae4ade846d0a897c728a4c646c6cef4d174,2025-03-10T16:58:35.783000 CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d464e3,2024-11-21T09:02:44.520000 CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000 CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000 -CVE-2024-26640,0,1,f1073e2f2ca52c13c6223d633861dfd55b113e4838a196b4afd88c8f06ef18e8,2025-03-10T16:58:35.783000 +CVE-2024-26640,0,0,f1073e2f2ca52c13c6223d633861dfd55b113e4838a196b4afd88c8f06ef18e8,2025-03-10T16:58:35.783000 CVE-2024-26641,0,0,99579385ab8663a71ddd606e1435108db4ec117d531652ca8fb25425f6073fcd,2025-03-10T16:58:35.783000 CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000 CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664df19,2024-11-21T09:02:45.103000 @@ -254555,15 +254557,15 @@ CVE-2024-2776,0,0,5a8760b1a1b415fec8c0d53d84557734030fe5df558e90f4cc2aaaf71f63ee CVE-2024-27764,0,0,0de26073946e11961ce062555628b344b9ee32e76db8ae9da9255839134e25c8,2025-01-21T18:32:16.707000 CVE-2024-27765,0,0,04aaaded443f604ce4ee49a08aa743343ef15860fdace32095dfbefb0b186792,2025-01-21T16:52:29.603000 CVE-2024-27766,0,0,4d93d17ae285c958f465adc24a7cf5f24274982fb56935552c3f47d118ead87c,2024-10-21T00:15:12.173000 -CVE-2024-27767,0,1,c9ce621c5d6b3464c79bf26ea66f180f15c4c8565ef1098a7e1611746ab9ff91,2025-03-10T18:34:58.663000 -CVE-2024-27768,0,0,6b3e88d7427d022cff68fc576d37b15c85fa018650acab8c69862312ea4ad0a0,2024-11-21T09:05:01.313000 -CVE-2024-27769,0,0,cef999d9b0cf95b65c6309eaea8213c569635dca7adf6cf6b576ca1d2bc3fc99,2024-11-21T09:05:01.453000 +CVE-2024-27767,0,0,c9ce621c5d6b3464c79bf26ea66f180f15c4c8565ef1098a7e1611746ab9ff91,2025-03-10T18:34:58.663000 +CVE-2024-27768,0,1,e1977f6a4ad56310446084f1814fd60386c4e9679c9b981d2a5e7c9a8b926ef2,2025-03-10T18:34:58.663000 +CVE-2024-27769,0,1,48741438427ed642b89ac067ebc08c7061ad6f8c65ca09283fdc6a60453ead7c,2025-03-10T18:34:58.663000 CVE-2024-2777,0,0,3d14d6a0d116f1e241e3815d376a67043eb26436ab43f59a526d7cb4efc6dc9b,2025-02-21T18:33:30.590000 -CVE-2024-27770,0,0,74674cdd65132754e1fb103e3a0767605fff455305fea28320a89adaaa674386,2024-11-21T09:05:01.600000 -CVE-2024-27771,0,0,a31ba237e0ad8593d52e9214442b6f9e1272667c752ae33966daaa778eaa6721,2024-11-21T09:05:01.737000 -CVE-2024-27772,0,0,382c305cd846d5a30ad35bd61d3aa56f63db66c1de69259926b60ff8a7a8caed,2024-11-21T09:05:01.870000 -CVE-2024-27773,0,0,9937f907ae86df124158e0d3d02b2f6a356bd36428cea000a9bdb98a6113f917,2024-11-21T09:05:02 -CVE-2024-27774,0,0,307f48a7716a730e60d75be64dea775aaf45a608fbb3ab8fba2c3652139b9ebe,2024-11-21T09:05:02.147000 +CVE-2024-27770,0,1,10bf53dc7a921586f939bccdc57e108f94008b59fce8dfa0e40a6011ad513ac7,2025-03-10T18:34:58.663000 +CVE-2024-27771,0,1,d18829a32784e436a98040c1faec2d2d1bc5dd2f9a5216f0f86f1ac290fd10b2,2025-03-10T18:34:58.663000 +CVE-2024-27772,0,1,19f4d760b7860238fac5c2e229cf87fc9e09f7d9c2bafdf960728be9ba2517a9,2025-03-10T18:34:58.663000 +CVE-2024-27773,0,1,e32c8485db7ae96f311eafb5317d8c247dafc0778b717136a8d0af8eba4c4997,2025-03-10T18:34:58.663000 +CVE-2024-27774,0,1,9dd970a6d5dba156468a350b26f104eee81e895b1755debe465c756ed5ae8e19,2025-03-10T18:34:58.663000 CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000 CVE-2024-27776,0,0,73ca15de9b07b4bb856e35745c43f9cd0ea727710915e8a42d139dd029652387,2024-11-21T09:05:02.433000 CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000 @@ -255276,7 +255278,7 @@ CVE-2024-28784,0,0,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3 CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000 CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000 CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000 -CVE-2024-28793,0,1,7c9a4fc4820a615f249b39765ab0bd5e62077df2117be351e55e11879942e29f,2025-03-10T18:13:04.007000 +CVE-2024-28793,0,0,7c9a4fc4820a615f249b39765ab0bd5e62077df2117be351e55e11879942e29f,2025-03-10T18:13:04.007000 CVE-2024-28794,0,0,753119303926f099a6871b2aad29e596a251b3b7511785f9ac432c16c51f6fee,2024-11-21T09:06:56.313000 CVE-2024-28795,0,0,13660f5f0e3307ed7567ab8952f3f7ea7f686deb9fb2cf94040d198f3b34c369,2024-11-21T09:06:56.463000 CVE-2024-28796,0,0,d393d3668c7061f02a786de2b9138992d5973bef5edcaf6e1113c7073d631e73,2024-11-21T09:06:56.600000 @@ -262731,7 +262733,7 @@ CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8 CVE-2024-38316,0,0,54c639a1ba71c7b262c015a9f3345a4e9e925e636f71556705e8b896c97b6bb1,2025-03-06T20:57:36.280000 CVE-2024-38317,0,0,1435a0b355b674a0e79e886c8a7c7701bf745cf5a6ce1e5e1d5da67400da5de4,2025-03-07T19:37:23.273000 CVE-2024-38318,0,0,84cb647ec8ad3685764ecb8b89a522bdff0d622e8eea170a5d72f5d21041aa89,2025-03-07T19:37:23.273000 -CVE-2024-38319,0,1,cb4fbb49d8d950cc4963734c29fe24c4a48add2991e72ca6a82209d0ed13c392,2025-03-10T18:13:04.007000 +CVE-2024-38319,0,0,cb4fbb49d8d950cc4963734c29fe24c4a48add2991e72ca6a82209d0ed13c392,2025-03-10T18:13:04.007000 CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000 CVE-2024-38320,0,0,4bb869c8ea82ab12a47183ea9bdc7cf49478a8454232d78ccf2ee6bb1582e818,2025-01-27T16:15:30.973000 CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000 @@ -266008,7 +266010,7 @@ CVE-2024-4270,0,0,22c4c9c8340b0ae818c3604e06cef3a06794a2fdd8eea4d3c876fd29114fb7 CVE-2024-4271,0,0,e065884abd13d8703fdf835666ca9f47ea6581e787d0dfa6603568b9675ea1dc,2024-11-21T09:42:31.173000 CVE-2024-4272,0,0,c1b1d26587c061d52e11bbbc0453ffa7c1fd935bd8f85aa4d100c5e80dd23497,2024-11-21T09:42:31.353000 CVE-2024-4273,0,0,347cc3730c3defd1ec37ea8bf1fe1c4fac9170b2ca0876d0ff5de387107219aa,2024-11-21T09:42:31.527000 -CVE-2024-42733,0,1,9360a59cf686fb21d414bcff3b95ceaac84334cd9396a6a0fa770a87432b3bde,2025-03-10T17:15:34.673000 +CVE-2024-42733,0,0,9360a59cf686fb21d414bcff3b95ceaac84334cd9396a6a0fa770a87432b3bde,2025-03-10T17:15:34.673000 CVE-2024-42736,0,0,d8c81b07d196ba07e528b38eee2f3737146d01802a45f464a2fa1cf036e3a593,2024-08-13T17:11:53.553000 CVE-2024-42737,0,0,006d79e3bf2eda54b979ed88cd81814d58a98170e7ee0605965755ba8d3f8e02,2024-08-13T18:35:07.950000 CVE-2024-42738,0,0,5603a4c92bb9fdfceffe4d70e44004fa4c908e1daba49cef169637c9eca20050,2024-08-14T16:35:16.850000 @@ -266402,7 +266404,7 @@ CVE-2024-43288,0,0,f717d3427a0c0cf241c7104bcb2dec353b1f22faf073e6d8f4b7080b289b1 CVE-2024-43289,0,0,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000 CVE-2024-4329,0,0,e6b8069a5e983b91520fda2de6cc101ecd499fdfa644e7ddea3fd43d16576c4d,2024-11-21T09:42:38.283000 CVE-2024-43290,0,0,aadbec5a5ad4a64e579a5e00cc442715fd6b805de0add0298fa795b77ecbdd94,2024-11-01T20:24:53.730000 -CVE-2024-43291,0,1,7ab71e3654e0e3a6115f3c5c1787b4453c59ae94624a7916345196db673a03b3,2025-03-10T17:06:30.757000 +CVE-2024-43291,0,0,7ab71e3654e0e3a6115f3c5c1787b4453c59ae94624a7916345196db673a03b3,2025-03-10T17:06:30.757000 CVE-2024-43292,0,0,208c4e73174d2dc26e0fbf34675f80707682261eb7a822ba10ee65b232b3bbbc,2024-08-19T12:59:59.177000 CVE-2024-43293,0,0,b1892d2fa392ffe2bd09211d2c26fcff7c9529e98d127336d6156a0f08946def,2024-11-13T01:19:49.207000 CVE-2024-43294,0,0,dbbb329e4dfb5feb56f3872fc122b72b3275c63adcbfbf2ee4e0eaebdd0aa048,2024-08-19T12:59:59.177000 @@ -267279,6 +267281,7 @@ CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12d CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,3836de3bb945a8f85bde59cc1b4f59deb044b827183198668dedf9e02270b6a7,2024-09-24T16:28:40.960000 +CVE-2024-44179,1,1,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000 CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000 CVE-2024-44180,0,0,a2247dacac4bd0388809af309fed3d0b9db77eee1ff7dcb46382a6a016edec7a,2024-09-24T19:04:17.890000 CVE-2024-44181,0,0,6d28050393eadf03569f8e946e89b01b126b14e424563728581983befe65d626,2024-09-24T18:39:12.733000 @@ -267293,6 +267296,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8 CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000 CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 +CVE-2024-44192,1,1,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000 CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000 CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000 CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000 @@ -267322,6 +267326,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370 CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000 CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000 +CVE-2024-44227,1,1,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000 CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000 @@ -270674,7 +270679,7 @@ CVE-2024-49278,0,0,0dd8cc10bd56876b7ee7ed6bcec68079ec2c49ad19687231e6f5648d7de2e CVE-2024-49279,0,0,8f41922d51c3c4a8b109eee18fdf9c34f89d06145641e421bc0ea55b455bab9c,2024-10-18T12:52:33.507000 CVE-2024-4928,0,0,ed7e945a54481af08d73830e084a748102ec0ee82721536fcd25b5d604ec6422,2024-12-09T22:45:35.050000 CVE-2024-49280,0,0,bb81bac00b921d3399c1799e890dc4e07bec7ac0c3ee7892b44216d9924ea20a,2024-10-18T12:52:33.507000 -CVE-2024-49281,0,1,538fe519ad8839a1dc1f053a93a0398b2b48cfb21951877be82c668728db8778,2025-03-10T17:06:30.757000 +CVE-2024-49281,0,0,538fe519ad8839a1dc1f053a93a0398b2b48cfb21951877be82c668728db8778,2025-03-10T17:06:30.757000 CVE-2024-49282,0,0,358126e846a2d67f83feaaee630d8f728927c331352abaa3840691ed529b0855,2024-10-18T12:52:33.507000 CVE-2024-49283,0,0,b76fcaf4941a43eca8ac218695c9ff920cc1b4d57755b09dc6ae9e43b860912e,2024-10-18T12:52:33.507000 CVE-2024-49284,0,0,fdc9d47e56d33c2c1b39cc8c3bcf68eee2a92cb69ca6c7b63a1823bf85ccd8c5,2024-10-18T12:52:33.507000 @@ -272568,8 +272573,8 @@ CVE-2024-51743,0,0,b2564a1b5274562ee0373ade5b7c8ae3231838962180126dc026362019585 CVE-2024-51744,0,0,07c3cdf47d43fa1c7a4c89dc7a6775d60f31b15068c0fe1b5baf96ced0398c03,2024-11-05T16:04:26.053000 CVE-2024-51745,0,0,3b9cf7d54138e14d61b0f37339976c3050c0eb594f276e58a7e3d1fe556423b6,2024-11-21T09:45:55.150000 CVE-2024-51746,0,0,8a404a45c3af199f76ef3a0dc8aa968158c8edc55035f2fbf0a7488c8ff45eb6,2024-11-06T18:17:17.287000 -CVE-2024-51747,0,1,0e5f0cee6c277440d52f66fc6ffbfd1f512f73e6867a2f56e70f70e7e32f9325,2025-03-10T17:06:30.757000 -CVE-2024-51748,0,1,7d2c1827bdc72af2c75722dcac4ffc315e19319ebfe049c77d7e50d4ab8b5929,2025-03-10T17:06:30.757000 +CVE-2024-51747,0,0,0e5f0cee6c277440d52f66fc6ffbfd1f512f73e6867a2f56e70f70e7e32f9325,2025-03-10T17:06:30.757000 +CVE-2024-51748,0,0,7d2c1827bdc72af2c75722dcac4ffc315e19319ebfe049c77d7e50d4ab8b5929,2025-03-10T17:06:30.757000 CVE-2024-51749,0,0,d5066a2c21ea4046dbe8ef1625654a81672322255d3853591b65bcb8d004873f,2024-11-13T17:01:58.603000 CVE-2024-5175,0,0,7df70c1c6d6302db3450621ef632fb7e91d6d1a97b15303122ead7b1fd2f3392,2025-01-14T20:15:30.680000 CVE-2024-51750,0,0,3700b00a5a95b3a7af3d6529d6be64cf967c06e1e7f9070747c88a19e92dda2f,2024-11-13T17:01:58.603000 @@ -273310,7 +273315,7 @@ CVE-2024-52809,0,0,e6e8fdfb2a9590dbf3ac4ff1c36e2b310a9789ae561f064e3a71e8766edca CVE-2024-5281,0,0,fc0976db5d10ac7222d6d7be38c22f60caf8b70ddc146c5f21bffad51467d30a,2024-11-21T09:47:20.760000 CVE-2024-52810,0,0,692a38edbbcd6e7e5b7bb9c4ef84a1dae9c117efe7d0a18d05012d6cf584cbe8,2024-11-29T19:15:09.163000 CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000 -CVE-2024-52812,1,1,b2792afc7535334ac8ff921221caad0b792fabaf21136720c1b8b4ebff68024d,2025-03-10T18:15:29.207000 +CVE-2024-52812,0,0,b2792afc7535334ac8ff921221caad0b792fabaf21136720c1b8b4ebff68024d,2025-03-10T18:15:29.207000 CVE-2024-52813,0,0,8169b64a8f667238b5fed148236c36caf5ee42d982d7846d64529f8f50a42147,2025-01-07T16:15:35.610000 CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000 CVE-2024-52815,0,0,fc5515ccded95dd9a322c2307bbaca64ae1d00a1cc2abf56dc836d595924f7d3,2024-12-03T17:15:12.267000 @@ -273754,7 +273759,7 @@ CVE-2024-53295,0,0,b8e985a8e27bd0c49159e8a0c89472687e5b7e5449b7c5ba70064bf994d36 CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000 CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000 CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 -CVE-2024-53307,1,1,27656ee8af63d12a9a3481a60b685fef66d7f079c2e7db6919c70e069d97f636,2025-03-10T18:15:29.373000 +CVE-2024-53307,0,0,27656ee8af63d12a9a3481a60b685fef66d7f079c2e7db6919c70e069d97f636,2025-03-10T18:15:29.373000 CVE-2024-53309,0,0,d296bdbc55651e5de6f32c7ca75c04e89adf67750111a836be4d48ce4534faca,2025-02-13T23:15:10.400000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 CVE-2024-53310,0,0,f0b739adf0c8009e62a81f924e7e1874dc0c63630728d316ba18d360b795a331,2025-02-13T23:15:10.493000 @@ -274186,7 +274191,7 @@ CVE-2024-53996,0,0,d36e247a06b1f41c7c1e65228887c2c12a82ebc001f7a83b885b351bf294c CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000 CVE-2024-5400,0,0,fa1089745765c8c92c3b698eeb8bc3e2fdf4bae4a68ce66e55e2111c1b051015,2024-11-21T09:47:34.830000 CVE-2024-54000,0,0,52062f56a88a90280cce905a1f064658e0e87c6309ff02349950b495d69ff132,2024-12-03T16:15:24.380000 -CVE-2024-54001,0,1,e59358fe4cfcad6530728dd9a2eca7986288458ad65edc20bef9c7a519a29ea4,2025-03-10T17:06:30.757000 +CVE-2024-54001,0,0,e59358fe4cfcad6530728dd9a2eca7986288458ad65edc20bef9c7a519a29ea4,2025-03-10T17:06:30.757000 CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb98949b7,2024-12-04T16:15:26.537000 CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000 @@ -274591,12 +274596,16 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000 CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000 +CVE-2024-54463,1,1,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 +CVE-2024-54467,1,1,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000 CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 +CVE-2024-54469,1,1,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 +CVE-2024-54473,1,1,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -274662,12 +274671,15 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31 CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 +CVE-2024-54546,1,1,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000 CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 +CVE-2024-54558,1,1,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 +CVE-2024-54560,1,1,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 @@ -274855,7 +274867,7 @@ CVE-2024-55193,0,0,0f75943a360377f358bf91940fa5c0eb0e9864d1e224b5f8bd3862d50383a CVE-2024-55194,0,0,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000 CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030b31,2025-01-28T15:15:12.647000 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 -CVE-2024-55199,1,1,2f95470d364d2046ab78b3e97c71763ee4a2b9f2bb80431b8212f91bef2ed28e,2025-03-10T18:15:29.757000 +CVE-2024-55199,0,0,2f95470d364d2046ab78b3e97c71763ee4a2b9f2bb80431b8212f91bef2ed28e,2025-03-10T18:15:29.757000 CVE-2024-5520,0,0,e6d97b1dda441d8a0c302258b741a51060a2df1d0eb8bad8a068e05ca70f1628,2025-03-04T17:00:22.900000 CVE-2024-5521,0,0,ebd1c0326746de4cb989a5e4cd7a8949653ccfaea201d5d184ffb9658b250015,2025-03-04T17:00:22.900000 CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 @@ -274978,7 +274990,7 @@ CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81 CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000 CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000 CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000 -CVE-2024-55581,0,0,f7ccdb67ff7739fea17993b33fa4724556778bda84016d6b56841f0a4bde8e1e,2025-03-04T20:15:36.677000 +CVE-2024-55581,0,1,f83eba0d1d57dfb0b5f6cd13deb2e137852fa318e3bfeae6027001cd985f5d58,2025-03-10T20:15:13.987000 CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 @@ -275261,6 +275273,11 @@ CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f61 CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000 +CVE-2024-56184,1,1,8f6f696205dd460cbdcf502fb64e8d4befa7f056f75ba122cd18b0c1c4f5e809,2025-03-10T19:15:38.983000 +CVE-2024-56185,1,1,c37fdf659e7c39460f1175db12112f73d7afc802c2a6cae80fe038b7827dd84a,2025-03-10T19:15:39.097000 +CVE-2024-56186,1,1,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8e82,2025-03-10T19:15:39.193000 +CVE-2024-56187,1,1,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000 +CVE-2024-56188,1,1,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000 CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000 @@ -275877,19 +275894,19 @@ CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329 CVE-2024-57000,0,0,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000 CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 -CVE-2024-57011,0,1,be6080f9c81dff32c56ab787801c6d4968f63e34f2280e5fd3971d611a937b51,2025-03-10T17:20:52.287000 -CVE-2024-57012,0,1,1a32e2d5b34eb171e04d3b0eb3728efdb697bac49b9bf0e2a53d6bc5ac3716e1,2025-03-10T17:20:52.287000 -CVE-2024-57013,0,1,cd89ed0f0d415a586d92bdfe7e6d4fd3ee62b39d405fa6a2d30dedb38e287b11,2025-03-10T17:20:52.287000 -CVE-2024-57014,0,1,ea58867b28f1d86cfc1000150fad043b3598d0e9c1e1db4d0e6d15c173963d7a,2025-03-10T17:20:52.287000 -CVE-2024-57015,0,1,e1397e56ccc189415186354b046b7d8b68f5e98beb69f900bc3d53588e2d4a6c,2025-03-10T17:20:52.287000 -CVE-2024-57016,0,1,a32f1e88d44aa33b1ead8c4f600342f9a69418e24ce9c342fddf173607751672,2025-03-10T17:23:12.970000 -CVE-2024-57017,0,1,ecd833218b2634d9d572a6682fffca599485d7f9d0d4eebda72dd60e55145d1f,2025-03-10T17:23:12.970000 -CVE-2024-57018,0,1,6f6f403f71d7e91851556d9c77f2834fba7474f70698e8f99da406c31ffac8bb,2025-03-10T17:23:12.970000 -CVE-2024-57019,0,1,4c3deaad389277c6358f444bb13614b0e27a90b771efec9b5ba44a0a6256f767,2025-03-10T17:23:12.970000 +CVE-2024-57011,0,0,be6080f9c81dff32c56ab787801c6d4968f63e34f2280e5fd3971d611a937b51,2025-03-10T17:20:52.287000 +CVE-2024-57012,0,0,1a32e2d5b34eb171e04d3b0eb3728efdb697bac49b9bf0e2a53d6bc5ac3716e1,2025-03-10T17:20:52.287000 +CVE-2024-57013,0,0,cd89ed0f0d415a586d92bdfe7e6d4fd3ee62b39d405fa6a2d30dedb38e287b11,2025-03-10T17:20:52.287000 +CVE-2024-57014,0,0,ea58867b28f1d86cfc1000150fad043b3598d0e9c1e1db4d0e6d15c173963d7a,2025-03-10T17:20:52.287000 +CVE-2024-57015,0,0,e1397e56ccc189415186354b046b7d8b68f5e98beb69f900bc3d53588e2d4a6c,2025-03-10T17:20:52.287000 +CVE-2024-57016,0,0,a32f1e88d44aa33b1ead8c4f600342f9a69418e24ce9c342fddf173607751672,2025-03-10T17:23:12.970000 +CVE-2024-57017,0,0,ecd833218b2634d9d572a6682fffca599485d7f9d0d4eebda72dd60e55145d1f,2025-03-10T17:23:12.970000 +CVE-2024-57018,0,0,6f6f403f71d7e91851556d9c77f2834fba7474f70698e8f99da406c31ffac8bb,2025-03-10T17:23:12.970000 +CVE-2024-57019,0,0,4c3deaad389277c6358f444bb13614b0e27a90b771efec9b5ba44a0a6256f767,2025-03-10T17:23:12.970000 CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000 -CVE-2024-57020,0,1,c3af2a2179ea929e90dd24fe9ed7c0baaf9a85d76b0f8766520fb2c03cfaa3d1,2025-03-10T17:25:21.297000 -CVE-2024-57021,0,1,0840af449b328f25f95fdea7315d2a54de5400f60e41293e81b29fa0ded9c640,2025-03-10T17:25:21.297000 -CVE-2024-57022,0,1,70ddf58a700253639efe228c811aade6d505dd5bde78569534da2c4fecbe50f9,2025-03-10T17:25:21.297000 +CVE-2024-57020,0,0,c3af2a2179ea929e90dd24fe9ed7c0baaf9a85d76b0f8766520fb2c03cfaa3d1,2025-03-10T17:25:21.297000 +CVE-2024-57021,0,0,0840af449b328f25f95fdea7315d2a54de5400f60e41293e81b29fa0ded9c640,2025-03-10T17:25:21.297000 +CVE-2024-57022,0,0,70ddf58a700253639efe228c811aade6d505dd5bde78569534da2c4fecbe50f9,2025-03-10T17:25:21.297000 CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000 CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000 CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000 @@ -280521,7 +280538,7 @@ CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237 CVE-2025-0591,0,0,31743e528b9642b20d256fb46c14cc7ce872bd582fcdb63a43f5e161426dc8af,2025-02-17T00:15:08.987000 CVE-2025-0592,0,0,92924626baecbab996d0e97311af8c1852928a73cb5e120c4713cb77cb4e663d,2025-02-14T21:15:16.543000 CVE-2025-0593,0,0,f384bb5183fd52ec3bc21aa2809ce1a4d509fdefca6b18add8a3ba9e9b530a58,2025-02-14T21:15:16.680000 -CVE-2025-0604,0,1,65d99042cdfc24b7fd971e847d0824bdd4a49dabc5163e4efb88553fa5fde11a,2025-03-10T18:15:30.100000 +CVE-2025-0604,0,1,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000 CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000 CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000 CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000 @@ -280767,7 +280784,7 @@ CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c9 CVE-2025-1012,0,0,7b0c4ab0855cffefa552cdbb9537cf53fcf1593bbc730581babeb8c5fa1ab156,2025-02-06T19:33:46.407000 CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000 CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000 -CVE-2025-1015,0,0,ca0b646f155f052475294793178d8e15a2141df178d9f30aa4cb6946ec037c08,2025-02-06T22:15:40.247000 +CVE-2025-1015,0,1,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000 CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000 CVE-2025-1017,0,0,bd3fa4a4136a68bd2fd99ce26d51913b65870c34b7ef3850591eced198182568,2025-02-06T21:15:22.760000 CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000 @@ -280940,7 +280957,7 @@ CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9d CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000 CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000 -CVE-2025-1296,1,1,113b62f343199d9c1b1cf094fd56879d7a4f774e1c89050406c1880e315c9580,2025-03-10T18:15:30.237000 +CVE-2025-1296,0,0,113b62f343199d9c1b1cf094fd56879d7a4f774e1c89050406c1880e315c9580,2025-03-10T18:15:30.237000 CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000 CVE-2025-1300,0,0,77db9cd7a18e3de4a8b6c836390a2247e6295125845190568cfff46e60843c32,2025-02-28T13:15:27.043000 CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000 @@ -280999,7 +281016,7 @@ CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b9368 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000 CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000 -CVE-2025-1391,0,1,9d7e46c0d6ac84717a87c810210b76bebfba0c57a7689c74580f69b8061facc3,2025-03-10T18:15:30.410000 +CVE-2025-1391,0,1,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000 CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000 CVE-2025-1393,0,0,3159a68724e79b452459f4be37f745c49bffd3a249ca4341751e3e0030245eee,2025-03-05T08:15:35.107000 CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000 @@ -281496,7 +281513,7 @@ CVE-2025-20933,0,0,78c769f64ec13bb740e2a7da07ade5ae850d040aa51ab886eedfde7cdb9d5 CVE-2025-2094,0,0,dd3722c7d873584c1bcf5ee76e4241bd89a98d004b5cffc0e9c748e218c08362,2025-03-07T23:15:15.883000 CVE-2025-2095,0,0,a3dfeac2273a29e9d569952f61ac273a484328c8ec1f4d0ba33ca66ad911ad03,2025-03-07T23:15:16.010000 CVE-2025-2096,0,0,096c4c8099150287c2f34ad390aeed2c4059a697160d0641900caf1a5bf991ce,2025-03-07T23:15:16.137000 -CVE-2025-2097,0,1,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000 +CVE-2025-2097,0,0,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21084,0,0,7b324472a45e5386cabb4c5492ab3928131f338a2d61662b2da75c2b9ab26744,2025-03-04T17:41:14.237000 CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000 @@ -282381,6 +282398,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02 CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000 CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 +CVE-2025-22603,1,1,e02b821a7b43af142b67dcb984d912792b271a05001313a5778b74f75a874a9d,2025-03-10T19:15:39.970000 CVE-2025-22604,0,0,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000 CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000 @@ -283693,7 +283711,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 -CVE-2025-24813,1,1,956c3d40763c8e4e5815e9e48d76287383629d8fc8ff5d279b49971172c2a26d,2025-03-10T17:15:35.067000 +CVE-2025-24813,0,1,72aeb96a70e6c87f11d8b70df499c8832a593f0da0714e2708f36c7bd578eb58,2025-03-10T19:15:40.123000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000 @@ -283934,6 +283952,7 @@ CVE-2025-25302,0,0,c00a60e460c085bc6071f27703e95f8cb2f218886d77664be4a3a5d8bb045 CVE-2025-25303,0,0,8087be36edeb3ab573dca03ab7057565aee5eccfb2b150643eefa5418be83c63,2025-03-03T17:15:15.073000 CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000 CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000 +CVE-2025-25306,1,1,266c3bc8e39aca90616fb10b87b722dbc75ab7ee9af63d373d4c2b5479d4e2d6,2025-03-10T19:15:40.230000 CVE-2025-25323,0,0,5f6bd7010a898a73be4f0d89a8bf4eb9d634056c62096bd3ccd537e03cf653ed,2025-02-28T16:15:38.153000 CVE-2025-25324,0,0,10b5e56d5c4fef0fd94ff417565d1842ebba06a2cb1e43a67f1d659dbc38824a,2025-02-28T16:15:38.307000 CVE-2025-25325,0,0,199803a0e51b1376c31d6c016e0d2871bebff8e1307a37a1fcc1d818a404f722,2025-02-28T16:15:38.457000 @@ -284007,11 +284026,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 -CVE-2025-25614,0,0,c675990c7d380dd61a91c4658854dbebaa65b350bca03a6e567ad85dbe4d1974,2025-03-10T15:15:37.330000 +CVE-2025-25614,0,1,03a1628a93d71e2397dcb6c3721d2be49a1a0063c0ed362c346e24f4ddaaf8b7,2025-03-10T20:15:14.280000 CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000 CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000 CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000 -CVE-2025-25620,0,0,c97dc91c74c9312565adbd3deb243defc9e4012573757fad1b98f7080f6f489f,2025-03-10T15:15:37.490000 +CVE-2025-25620,0,1,1205eefd0528c936e3ebbd6ac29c3db7bb0c99b1253ae44cf7a8d8848b7b0308,2025-03-10T19:15:40.393000 CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 @@ -284280,6 +284299,8 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000 +CVE-2025-26695,1,1,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000 +CVE-2025-26696,1,1,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 @@ -284423,6 +284444,7 @@ CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f7020 CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000 CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000 CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000 +CVE-2025-27136,1,1,b6c8eabc30ae3af9599a6fc890ae8d613bd7771786a491986d7f20a0a4503844,2025-03-10T19:15:40.770000 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000 CVE-2025-27140,0,0,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000 @@ -284562,11 +284584,13 @@ CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3 CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000 CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000 CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000 +CVE-2025-27615,1,1,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000 +CVE-2025-27616,1,1,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000 CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000 CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000 -CVE-2025-27636,0,0,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000 +CVE-2025-27636,0,1,6f0982eaa03c91e53a5974672e67fb384f05769dea0cfea98163b0cc00a8d575,2025-03-10T19:15:41.240000 CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000 CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000 CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000 @@ -284626,3 +284650,4 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000 CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 +CVE-2025-27913,1,1,6f0bd3601f96716de702de6a067ea8085488a5f63b84b8fb03e2b0e08a5595da,2025-03-10T20:15:14.500000