diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2973.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2973.json index cc8849a9c56..a95614141a0 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2973.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2973.json @@ -2,7 +2,7 @@ "id": "CVE-2015-2973", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-07-24T16:59:02.347", - "lastModified": "2024-11-21T02:28:25.437", + "lastModified": "2025-02-20T18:32:30.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.4.17", - "matchCriteriaId": "85ADE6AA-1FDE-4BDA-964C-0BF128DD6149" + "matchCriteriaId": "21E4A0A8-3378-48C0-950A-EA66F998FCDA" } ] } diff --git a/CVE-2015/CVE-2015-77xx/CVE-2015-7791.json b/CVE-2015/CVE-2015-77xx/CVE-2015-7791.json index 14e20a65ea4..ecafdfadc8d 100644 --- a/CVE-2015/CVE-2015-77xx/CVE-2015-7791.json +++ b/CVE-2015/CVE-2015-77xx/CVE-2015-7791.json @@ -2,7 +2,7 @@ "id": "CVE-2015-7791", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-12-29T22:59:06.547", - "lastModified": "2024-11-21T02:37:24.680", + "lastModified": "2025-02-20T18:32:30.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.5.2", - "matchCriteriaId": "8F12EAA1-3CE0-4FF4-9A31-227DBEDF0020" + "matchCriteriaId": "4972F7A2-B830-439B-84FA-B27785B0E3DF" } ] } diff --git a/CVE-2016/CVE-2016-48xx/CVE-2016-4825.json b/CVE-2016/CVE-2016-48xx/CVE-2016-4825.json index 81872ef720f..185d4a36eed 100644 --- a/CVE-2016/CVE-2016-48xx/CVE-2016-4825.json +++ b/CVE-2016/CVE-2016-48xx/CVE-2016-4825.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4825", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2016-06-25T21:59:07.767", - "lastModified": "2024-11-21T02:53:03.553", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.8.3", - "matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48" + "matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25" } ] } diff --git a/CVE-2016/CVE-2016-48xx/CVE-2016-4826.json b/CVE-2016/CVE-2016-48xx/CVE-2016-4826.json index 5a8d71c773c..8a78c991830 100644 --- a/CVE-2016/CVE-2016-48xx/CVE-2016-4826.json +++ b/CVE-2016/CVE-2016-48xx/CVE-2016-4826.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4826", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2016-06-25T21:59:08.750", - "lastModified": "2024-11-21T02:53:03.667", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.8.3", - "matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48" + "matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25" } ] } diff --git a/CVE-2016/CVE-2016-48xx/CVE-2016-4827.json b/CVE-2016/CVE-2016-48xx/CVE-2016-4827.json index b9e80fdcf4f..94518531dad 100644 --- a/CVE-2016/CVE-2016-48xx/CVE-2016-4827.json +++ b/CVE-2016/CVE-2016-48xx/CVE-2016-4827.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4827", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2016-06-25T21:59:09.750", - "lastModified": "2024-11-21T02:53:03.780", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.8.3", - "matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48" + "matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25" } ] } diff --git a/CVE-2016/CVE-2016-48xx/CVE-2016-4828.json b/CVE-2016/CVE-2016-48xx/CVE-2016-4828.json index 8de46be584a..5e538405135 100644 --- a/CVE-2016/CVE-2016-48xx/CVE-2016-4828.json +++ b/CVE-2016/CVE-2016-48xx/CVE-2016-4828.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4828", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2016-06-25T21:59:10.813", - "lastModified": "2024-11-21T02:53:03.897", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.8.3", - "matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48" + "matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25" } ] } diff --git a/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json b/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json index 9afaf9f3b22..4159915acbd 100644 --- a/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json +++ b/CVE-2016/CVE-2016-51xx/CVE-2016-5198.json @@ -2,8 +2,8 @@ "id": "CVE-2016-5198", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-01-19T05:59:00.213", - "lastModified": "2025-01-29T18:15:29.050", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:06:01.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json index c0b84c54717..e73b78abf0a 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5030.json @@ -2,8 +2,8 @@ "id": "CVE-2017-5030", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-04-24T23:59:00.190", - "lastModified": "2025-01-29T18:15:29.307", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:06:14.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json index b4f1b18110e..20a60e08128 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json @@ -2,8 +2,8 @@ "id": "CVE-2017-5070", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-10-27T05:29:00.847", - "lastModified": "2025-01-29T18:15:29.570", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:06:20.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json index aef0e203262..b975f80f4a9 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17463.json @@ -2,8 +2,8 @@ "id": "CVE-2018-17463", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-11-14T15:29:00.297", - "lastModified": "2025-01-29T18:15:29.997", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:05:36.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json index 63ffce4e3b3..21227d7ed8f 100644 --- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json +++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1003029", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-03-08T21:29:00.297", - "lastModified": "2025-02-07T13:15:25.013", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:05:05.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -110,8 +110,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*", - "versionEndExcluding": "1.54", - "matchCriteriaId": "B7D4D86E-A7CD-49D3-B63A-1063AD24DF1E" + "versionEndIncluding": "1.53", + "matchCriteriaId": "4F309F6A-5D2A-4E7E-9C91-FA5E6413F498" } ] } diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json index 7e8ed8776cb..35c2cf7a11a 100644 --- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json +++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1003030", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-03-08T21:29:00.343", - "lastModified": "2025-02-07T13:15:25.223", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:04:29.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-283xx/CVE-2020-28339.json b/CVE-2020/CVE-2020-283xx/CVE-2020-28339.json index f8bf167cf01..d70f3f561b1 100644 --- a/CVE-2020/CVE-2020-283xx/CVE-2020-28339.json +++ b/CVE-2020/CVE-2020-283xx/CVE-2020-28339.json @@ -2,7 +2,7 @@ "id": "CVE-2020-28339", "sourceIdentifier": "cve@mitre.org", "published": "2020-11-07T19:15:12.880", - "lastModified": "2024-11-21T05:22:36.373", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,9 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.9.36", - "matchCriteriaId": "5B3AB822-10A6-4B84-AE64-78C07AC71820" + "matchCriteriaId": "E53D47A3-6B9B-4D39-8289-0ABDF4A93F44" } ] } diff --git a/CVE-2021/CVE-2021-207xx/CVE-2021-20734.json b/CVE-2021/CVE-2021-207xx/CVE-2021-20734.json index de9e29a7f7d..9b4e7dd6d4c 100644 --- a/CVE-2021/CVE-2021-207xx/CVE-2021-20734.json +++ b/CVE-2021/CVE-2021-207xx/CVE-2021-20734.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20734", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2021-06-22T02:15:07.180", - "lastModified": "2024-11-21T05:47:05.970", + "lastModified": "2025-02-20T18:32:30.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart:1.5.2:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "0868ACA3-F866-46CE-BAE0-48B50D95C05C" + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:1.5.2:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "F6A1CBF5-EBBE-44D9-8C29-B63F6CD18892" } ] } diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37976.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37976.json index 0b8223bf965..94c20196fd5 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37976.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37976.json @@ -2,8 +2,8 @@ "id": "CVE-2021-37976", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-10-08T22:15:08.417", - "lastModified": "2025-01-29T17:15:15.167", - "vulnStatus": "Modified", + "lastModified": "2025-02-20T18:05:54.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4355.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4355.json index 74baada4236..c347973e9ed 100644 --- a/CVE-2021/CVE-2021-43xx/CVE-2021-4355.json +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4355.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4355", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-07T02:15:13.987", - "lastModified": "2024-11-21T06:37:29.533", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.2.7", - "matchCriteriaId": "E0001C32-A260-43BD-8522-79783AC06CC9" + "matchCriteriaId": "2BCF3C7B-D36E-40C1-B682-DD6251D423E9" } ] } diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4375.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4375.json index bbcf8f67485..ae707f7e793 100644 --- a/CVE-2021/CVE-2021-43xx/CVE-2021-4375.json +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4375.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4375", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-07T02:15:15.207", - "lastModified": "2024-11-21T06:37:32.467", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.2.7", - "matchCriteriaId": "E0001C32-A260-43BD-8522-79783AC06CC9" + "matchCriteriaId": "2BCF3C7B-D36E-40C1-B682-DD6251D423E9" } ] } diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json index bfde40e68e0..c0fc4745519 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3935.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3935", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.293", - "lastModified": "2024-11-21T07:20:33.790", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -48,9 +48,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.4", - "matchCriteriaId": "249726EF-990A-462C-8F33-512E3B419BB5" + "matchCriteriaId": "684472B7-D7E8-49DA-B3A5-74F4CBE12E7D" } ] } diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3946.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3946.json index b762791c0da..cb25d9df219 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3946.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3946.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3946", "sourceIdentifier": "contact@wpscan.com", "published": "2022-12-12T18:15:12.357", - "lastModified": "2024-11-21T07:20:35.100", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,9 +64,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.4", - "matchCriteriaId": "249726EF-990A-462C-8F33-512E3B419BB5" + "matchCriteriaId": "684472B7-D7E8-49DA-B3A5-74F4CBE12E7D" } ] } diff --git a/CVE-2022/CVE-2022-418xx/CVE-2022-41840.json b/CVE-2022/CVE-2022-418xx/CVE-2022-41840.json index db749ed0386..61270cb0295 100644 --- a/CVE-2022/CVE-2022-418xx/CVE-2022-41840.json +++ b/CVE-2022/CVE-2022-418xx/CVE-2022-41840.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41840", "sourceIdentifier": "audit@patchstack.com", "published": "2022-11-18T19:15:30.547", - "lastModified": "2024-11-21T07:23:54.850", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.7.8", - "matchCriteriaId": "2DDBF339-FD93-45F3-BB8A-9F6678CCB20F" + "matchCriteriaId": "618E0B97-7F0E-41A7-9DB4-44A74380FC5B" } ] } diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4140.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4140.json index a1ccf72a40e..0ddbb005c3a 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4140.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4140.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4140", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-02T22:15:16.287", - "lastModified": "2024-11-21T07:34:39.223", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -48,9 +48,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.5", - "matchCriteriaId": "AED0FC82-32B5-4D12-B154-A2C875F3E76E" + "matchCriteriaId": "31D18437-FE34-4E3D-8E8F-C7EE3295B678" } ] } diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4236.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4236.json index 17492fa1a5f..5bbb970f950 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4236.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4236.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4236", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-02T22:15:16.567", - "lastModified": "2024-11-21T07:34:50.850", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.5", - "matchCriteriaId": "AED0FC82-32B5-4D12-B154-A2C875F3E76E" + "matchCriteriaId": "31D18437-FE34-4E3D-8E8F-C7EE3295B678" } ] } diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4237.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4237.json index abce9f5491c..1617dc5b355 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4237.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4237.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4237", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-02T22:15:16.630", - "lastModified": "2024-11-21T07:34:50.953", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -48,9 +48,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.6", - "matchCriteriaId": "CB6293C5-3808-4A77-9570-3DE3C94244A5" + "matchCriteriaId": "86C08235-0ACE-426B-ADC7-EB87C22D3A8C" } ] } diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json index bcedccde5cb..e680e89f6e7 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4655", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.707", - "lastModified": "2024-11-21T07:35:40.853", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -48,9 +48,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.8.9", - "matchCriteriaId": "4D644402-B2E9-45CF-9CD7-93BC6E8930E8" + "matchCriteriaId": "CD6FDFC4-D027-4B06-81D0-E06B8B69A915" } ] } diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22705.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22705.json index 4998e06bf6f..cf3907ccaf2 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22705.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22705.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22705", "sourceIdentifier": "audit@patchstack.com", "published": "2023-03-29T20:15:07.450", - "lastModified": "2024-11-21T07:45:15.500", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,9 +86,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.8.10", - "matchCriteriaId": "C83302A1-0BBB-4A83-8329-2ADA8268D842" + "matchCriteriaId": "6D5F57E2-5F01-4AC3-B564-130C7BB1C220" } ] } diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40219.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40219.json index d7223ffb5f8..6d265cc03a7 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40219.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40219.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40219", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:02.237", - "lastModified": "2024-11-21T08:19:01.657", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41233.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41233.json index 26de7cc688a..636876abd40 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41233.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41233.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41233", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:27.050", - "lastModified": "2024-11-21T08:20:53.013", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41962.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41962.json index 7d6a900be70..b64ec51ab42 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41962.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41962.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41962", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:31.577", - "lastModified": "2024-11-21T08:21:59.923", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43484.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43484.json index 19ab4679be3..dfc6447138a 100644 --- a/CVE-2023/CVE-2023-434xx/CVE-2023-43484.json +++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43484.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43484", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:34.103", - "lastModified": "2024-11-21T08:24:08.023", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43493.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43493.json index 4ffb3425dd8..6f73518e070 100644 --- a/CVE-2023/CVE-2023-434xx/CVE-2023-43493.json +++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43493.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43493", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:34.157", - "lastModified": "2024-11-21T08:24:09.113", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43610.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43610.json index 037c065e65a..84ac013f429 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43610.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43610.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43610", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:34.217", - "lastModified": "2024-11-21T08:24:27.630", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43614.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43614.json index 886295eab91..8ca65eec52a 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43614.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43614.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43614", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-09-27T15:19:34.280", - "lastModified": "2024-11-21T08:24:28.013", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionStartIncluding": "2.7", "versionEndIncluding": "2.8.21", - "matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF" + "matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B" } ] } diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46272.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46272.json index 4d167d1bb55..fd94c63c56a 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46272.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46272.json @@ -2,16 +2,55 @@ "id": "CVE-2023-46272", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T19:15:13.917", - "lastModified": "2025-02-19T19:15:13.917", + "lastModified": "2025-02-20T17:15:10.897", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Extreme Networks IQ Engine before 10.6r1a, and through 10.6r4 before 10.6r5, allows an attacker to execute arbitrary code via the implementation of the ah_auth service" + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento del b\u00fafer en el motor IQ de Extreme Networks antes de 10.6R1A, y hasta 10.6R4 antes de 10.6R5, permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de la implementaci\u00f3n del servicio AH_AUTH" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000115355&q=CVE-2023-46272", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50847.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50847.json index ff25f47c4ca..4e07227c24f 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50847.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50847.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50847", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-28T19:15:15.843", - "lastModified": "2024-11-21T08:37:24.163", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.9.3", - "matchCriteriaId": "7433D50F-C909-48E9-BEF2-601387A1FE8F" + "matchCriteriaId": "AD5F484C-7EC5-484B-9D20-900DEB55F1B8" } ] } diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json index 8430d1b8de6..9c06c859214 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51306", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:11.673", - "lastModified": "2025-02-20T15:15:11.673", + "lastModified": "2025-02-20T18:15:21.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, title\" parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176516", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/event-ticketing-system/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176516", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json index f370245d9ee..38a22ca60dd 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51309", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:11.920", - "lastModified": "2025-02-20T15:15:11.920", + "lastModified": "2025-02-20T18:15:22.890", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176492", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176492", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json index 8a0c4518864..c0d90f98425 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51310", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:12.050", - "lastModified": "2025-02-20T15:15:12.050", + "lastModified": "2025-02-20T18:15:23.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176492", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176492", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json index dbd29af6308..4e174315119 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51312", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:12.293", - "lastModified": "2025-02-20T15:15:12.293", + "lastModified": "2025-02-20T18:15:23.293", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Reservations menu, Schedule section date parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176493", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176493", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json index 447ad41890f..01d26026706 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51315", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T15:15:12.680", - "lastModified": "2025-02-20T15:15:12.680", + "lastModified": "2025-02-20T18:15:23.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name\" parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176493", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176493", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json index 78a5b4cad9f..fb3edcbcfa0 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51318", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:34.703", - "lastModified": "2025-02-20T16:15:34.703", + "lastModified": "2025-02-20T18:15:23.683", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176499", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176499", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json index 98a2e82579b..4ed0451717d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51325", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:35.330", - "lastModified": "2025-02-20T16:15:35.330", + "lastModified": "2025-02-20T18:15:23.877", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176505", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176505", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json index 46a1d1700dd..b2a306bddc0 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51330", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:35.647", - "lastModified": "2025-02-20T16:15:35.647", + "lastModified": "2025-02-20T17:15:11.087", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu \"date\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176508", @@ -20,6 +55,10 @@ { "url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo", "source": "cve@mitre.org" + }, + { + "url": "https://packetstorm.news/files/id/176508", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json index 1be5bf9a625..e294468d72e 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51332", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-20T16:15:35.850", - "lastModified": "2025-02-20T16:15:35.850", + "lastModified": "2025-02-20T17:15:11.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Meeting Room Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], "references": [ { "url": "https://packetstorm.news/files/id/176510", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51333.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51333.json new file mode 100644 index 00000000000..c3368edb83d --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51333.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51333", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:24.077", + "lastModified": "2025-02-20T18:15:24.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176511", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json new file mode 100644 index 00000000000..7ad73c7d7e5 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51334", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:24.203", + "lastModified": "2025-02-20T18:15:24.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cinema Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176512", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json new file mode 100644 index 00000000000..88ce879114c --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51335", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:24.347", + "lastModified": "2025-02-20T18:15:24.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176508", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5951.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5951.json index c8eee435fbf..fea809ac464 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5951.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5951.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5951", "sourceIdentifier": "contact@wpscan.com", "published": "2023-12-04T22:15:08.063", - "lastModified": "2024-11-21T08:42:50.830", + "lastModified": "2025-02-20T18:32:30.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.9.5", - "matchCriteriaId": "6D77F5A6-A6AB-4943-8702-4475CB1CA7E0" + "matchCriteriaId": "92748727-4447-48C2-B830-3F24E8AD8D4E" } ] } diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5952.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5952.json index 83e18c4b18e..b8f5d102243 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5952.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5952", "sourceIdentifier": "contact@wpscan.com", "published": "2023-12-04T22:15:08.117", - "lastModified": "2024-11-21T08:42:51.027", + "lastModified": "2025-02-20T18:32:30.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.9.5", - "matchCriteriaId": "6D77F5A6-A6AB-4943-8702-4475CB1CA7E0" + "matchCriteriaId": "92748727-4447-48C2-B830-3F24E8AD8D4E" } ] } diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5953.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5953.json index 7fa4556661f..3b896dc8a1a 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5953.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5953.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5953", "sourceIdentifier": "contact@wpscan.com", "published": "2023-12-04T22:15:08.170", - "lastModified": "2024-11-21T08:42:51.153", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.9.5", - "matchCriteriaId": "62DCBB7B-A579-499A-B300-87D4F88A44C5" + "matchCriteriaId": "92748727-4447-48C2-B830-3F24E8AD8D4E" } ] } diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6120.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6120.json index bd9b7460c10..06ccc70ffe3 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6120.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6120.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6120", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-09T07:15:08.130", - "lastModified": "2024-11-21T08:43:10.320", + "lastModified": "2025-02-20T18:34:50.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.9.7", - "matchCriteriaId": "58A8E610-7BF0-4745-B5F6-E1FFA8397E64" + "matchCriteriaId": "70C51E31-DE5E-49C8-A43C-B34805ED5D08" } ] } diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json index d7251bdf873..31fecc33a64 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12173.json @@ -2,16 +2,43 @@ "id": "CVE-2024-12173", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-19T06:15:21.003", - "lastModified": "2025-02-19T06:15:21.003", + "lastModified": "2025-02-20T18:15:24.483", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Master Slider WordPress plugin before 3.10.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Master Slider WordPress antes de 3.10.5 no depura y escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que los usuarios de alto privilegio, como el editor y arriba, realicen Cross-Site Scripting Almacenado ataques cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraciones multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0f35be0e-0f63-4e33-aa4d-c47b1f1e0595/", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2570.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2570.json index 63fcaa93d3e..910eb2d8c71 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2570.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2570", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T00:15:08.073", - "lastModified": "2024-11-21T09:10:02.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:13:30.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257073", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257073", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257073", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257073", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2571.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2571.json index bdad8041e05..5650046d3f1 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2571.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2571", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T01:15:48.493", - "lastModified": "2024-11-21T09:10:02.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:13:36.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257074", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257074", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257074", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257074", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2572.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2572.json index 94941c0a443..fb964391545 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2572.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2572", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T01:15:48.707", - "lastModified": "2024-11-21T09:10:02.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:13:22.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257075", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257075", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257075", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257075", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2573.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2573.json index 431e3745a8e..cfa16785aab 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2573.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2573", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T01:15:48.923", - "lastModified": "2024-11-21T09:10:02.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:12:59.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257076", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257076", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2574.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2574.json index 2cd681c0728..b35dfff0e9f 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2574.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2574", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T02:15:06.177", - "lastModified": "2024-11-21T09:10:02.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:10:50.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257077", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257077", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2575.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2575.json index e0699ccff1b..a587cb67af7 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2575.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2575", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T02:15:06.397", - "lastModified": "2024-11-21T09:10:02.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:10:40.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257078", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257078", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257078", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257078", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2576.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2576.json index 4019738ae0a..0a9d54472b6 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2576.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2576", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T02:15:06.620", - "lastModified": "2024-11-21T09:10:02.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:09:56.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257079", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257079", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json index 3dcf9dcb05a..b20f1b0f352 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2577", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T03:15:06.123", - "lastModified": "2024-11-21T09:10:03.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T18:09:43.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257080", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257080", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json index 559e4420880..12352688e35 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2773", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-21T23:15:11.883", - "lastModified": "2024-11-21T09:10:29.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:26:30.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Kurunie/vuln_report/blob/main/Complete%20Online%20Marriage%20Registration%20System's%20vuln.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257607", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257607", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/Kurunie/vuln_report/blob/main/Complete%20Online%20Marriage%20Registration%20System's%20vuln.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257607", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257607", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json index e803c8003d8..bff6c8c88e3 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2775", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-21T23:15:12.403", - "lastModified": "2024-11-21T09:10:29.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:29:08.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257609", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257609", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257609", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257609", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json index e46c08a0d0a..6b77af588e5 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2778", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-22T01:15:07.690", - "lastModified": "2024-11-21T09:10:29.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:28:46.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%203.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257612", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257612", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%203.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.257612", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257612", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28112.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28112.json index 5cc9b5f38d7..561251ba48c 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28112.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28112.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28112", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T20:15:07.730", - "lastModified": "2025-02-13T17:12:42.737", + "lastModified": "2025-02-20T17:25:58.783", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:peeringmanager:peering_manager:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.8.3", - "matchCriteriaId": "3F6A1362-9C72-4E47-9B75-057B56BC505A" + "matchCriteriaId": "B1DD9909-194C-4B81-A9D6-0E24FEA824C0" } ] } @@ -111,7 +111,7 @@ "url": "https://owasp.org/www-community/attacks/xss", "source": "security-advisories@github.com", "tags": [ - "Technical Description" + "Not Applicable" ] }, { @@ -125,7 +125,7 @@ "url": "https://owasp.org/www-community/attacks/xss", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Technical Description" + "Not Applicable" ] } ] diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json index 5b493853757..2b73731fb34 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28113", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T20:15:07.933", - "lastModified": "2024-11-21T09:05:50.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T17:08:04.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-601" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "B1DD9909-194C-4B81-A9D6-0E24FEA824C0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/peering-manager/peering-manager/commit/49dc5593184d7740d81e57dbbe3f971d2969dfac", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-f4mf-5g28-q7f5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/peering-manager/peering-manager/commit/49dc5593184d7740d81e57dbbe3f971d2969dfac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-f4mf-5g28-q7f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json index 74778439789..912202f7c0d 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28114", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T20:15:08.113", - "lastModified": "2024-11-21T09:05:50.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T17:18:20.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 } ] }, @@ -49,48 +69,108 @@ "value": "CWE-74" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.3", + "matchCriteriaId": "B1DD9909-194C-4B81-A9D6-0E24FEA824C0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/peering-manager/peering-manager/commit/8a865fb596c11ad7caf45aef317d8fcbce7f85ff", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-q37x-qfrx-jcv6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://owasp.org/www-community/attacks/Command_Injection", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server_Side_Template_Injection", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://stackoverflow.com/questions/73939573/how-to-sanitise-string-of-python-code-with-python", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/peering-manager/peering-manager/commit/8a865fb596c11ad7caf45aef317d8fcbce7f85ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-q37x-qfrx-jcv6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://owasp.org/www-community/attacks/Command_Injection", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server_Side_Template_Injection", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://stackoverflow.com/questions/73939573/how-to-sanitise-string-of-python-code-with-python", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json index 2e49e5306ae..677c39f2fd4 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2832", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-23T06:15:08.793", - "lastModified": "2024-11-21T09:10:38.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T17:22:38.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_shopping_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "49A4487F-1CD7-4B67-88AF-1D471D13D36C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/comeony/vuln_report/blob/main/Online%20Shopping%20System%20-%20vuln%201.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257752", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257752", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/comeony/vuln_report/blob/main/Online%20Shopping%20System%20-%20vuln%201.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257752", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257752", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2927.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2927.json index 7ebd8393310..a7497c93216 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2927.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2927.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2927", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T23:15:47.840", - "lastModified": "2024-11-21T09:10:51.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:53:42.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:mobile_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7E42FBD-E07D-412C-8F3C-FE0152825E63" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.258000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304053", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?ctiid.258000", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258000", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304053", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2938.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2938.json index 4c78278cb83..578e9feea72 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2938.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2938.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2938", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:47.630", - "lastModified": "2024-11-21T09:10:53.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:38:08.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Beatriz-ai-boop/cve/blob/main/report/1.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258029", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258029", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304746", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Beatriz-ai-boop/cve/blob/main/report/1.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258029", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258029", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304746", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json index 45196e1771d..8812367d249 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2941", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T03:15:13.160", - "lastModified": "2024-11-21T09:10:53.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:28:58.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258032", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258032", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304757", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258032", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258032", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304757", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json index f74597940cf..05835f4e083 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2942.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2942", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T03:15:13.490", - "lastModified": "2024-11-21T09:10:53.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:06:40.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258033", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258033", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304758", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258033", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258033", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304758", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json new file mode 100644 index 00000000000..306c8fc0150 --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-46933", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:25.007", + "lastModified": "2025-02-20T18:15:25.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Atos Eviden BullSequana XH2140 BMC before C4EM-125: OMF_C4E 101.05.0014. Some BullSequana XH products were shipped without proper hardware programming, leading to a potential denial-of-service with privileged access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.8 + } + ] + }, + "references": [ + { + "url": "https://eviden.com", + "source": "cve@mitre.org" + }, + { + "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/ast2600-left-unconfigured-in-bullsequana-xh2140-psirt-270-tlp-clear-version-2-7-cve-2024-46933/view", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4792.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4792.json index 2191d32b2bd..abb822b81e4 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4792.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4792", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:45.760", - "lastModified": "2024-11-21T09:43:37.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:24:20.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263891", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263891", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332533", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263891", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263891", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332533", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4793.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4793.json index 7e85e4a9dd9..c888f24cdde 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4793.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4793", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:46.307", - "lastModified": "2024-11-21T09:43:37.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:23:45.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263892", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263892", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332535", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263892", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263892", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332535", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4794.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4794.json index b4709fccc65..0ae85e93de5 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4794.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4794", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:47.013", - "lastModified": "2024-11-21T09:43:37.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:22:57.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263893", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263893", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332536", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263893", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332536", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4795.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4795.json index f097c2ae4c9..9afd4ab1bda 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4795.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4795.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4795", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:48.390", - "lastModified": "2024-11-21T09:43:37.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:22:18.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263894", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263894", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332537", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263894", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263894", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332537", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4796.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4796.json index aeb0c52e5c4..e4afb49a123 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4796.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4796", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:49.137", - "lastModified": "2024-11-21T09:43:37.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:21:43.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263895", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263895", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332538", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263895", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263895", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332538", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4797.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4797.json index 548047f0b43..63b4fed56b1 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4797.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4797", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:51.433", - "lastModified": "2024-11-21T09:43:38.033", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:20:28.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,38 +140,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263896", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263896", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332539", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263896", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263896", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.332539", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4817.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4817.json index 559894c92ee..98e71019db5 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4817.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4817", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:45:08.827", - "lastModified": "2024-11-21T09:43:40.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:18:32.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,40 +138,97 @@ "value": "CWE-99" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333055", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4818.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4818.json index 1e4b272c2b2..99453fecf73 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4818.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4818", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:45:10.140", - "lastModified": "2024-11-21T09:43:41.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:17:41.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -118,40 +138,97 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333057", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4819.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4819.json index f720f526f93..12817d220d3 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4819.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4819.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4819", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:45:11.543", - "lastModified": "2024-11-21T09:43:41.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T18:16:52.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,40 +138,97 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.263940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333058", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54958.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54958.json new file mode 100644 index 00000000000..72011148e4b --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54958.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54958", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:25.187", + "lastModified": "2025-02-20T18:15:25.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nagios XI 2024R1.2.2 is susceptible to a stored Cross-Site Scripting (XSS) vulnerability in the Tools page. This flaw allows an attacker to inject malicious scripts into the Tools interface, which are then stored and executed in the context of other users accessing the page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54958", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54959.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54959.json new file mode 100644 index 00000000000..40fb8750f5a --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54959.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54959", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:25.317", + "lastModified": "2025-02-20T18:15:25.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nagios XI 2024R1.2.2 is vulnerable to a Cross-Site Request Forgery (CSRF) attack through the Favorites component, enabling POST-based Cross-Site Scripting (XSS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54959", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json new file mode 100644 index 00000000000..619e07644a6 --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54960", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:25.457", + "lastModified": "2025-02-20T18:15:25.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability in Nagios XI 2024R1.2.2 allows a remote attacker to execute SQL injection via a crafted payload in the History Tab component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54960", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json new file mode 100644 index 00000000000..37c10e6a2d4 --- /dev/null +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54961", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:25.593", + "lastModified": "2025-02-20T18:15:25.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nagios XI 2024R1.2.2 has an Information Disclosure vulnerability, which allows unauthenticated users to access multiple pages displaying the usernames and email addresses of all current users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54961", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json new file mode 100644 index 00000000000..44557bb0935 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55457", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:25.740", + "lastModified": "2025-02-20T18:15:25.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/h13nh04ng/CVE-2024-55457-PoC", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57716.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57716.json new file mode 100644 index 00000000000..b7a78b7ccd3 --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57716.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57716", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:11.803", + "lastModified": "2025-02-20T17:15:11.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in trenoncourt AutoQueryable v.1.7.0 allows a remote attacker to obtain sensitive information via the Unselectable function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2024-57716", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/trenoncourt/AutoQueryable", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1258.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1258.json new file mode 100644 index 00000000000..49fd6edb1f2 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1258.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-1258", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2025-02-20T18:15:26.217", + "lastModified": "2025-02-20T18:15:26.217", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json new file mode 100644 index 00000000000..3053c6a23db --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25968", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:26.570", + "lastModified": "2025-02-20T18:15:26.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file' parameter. By referencing specific files (e.g., cm3.xml), attackers can bypass access controls, leading to account takeover and potential privilege escalation." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://ddsn.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/padayali-JD/CVE-2025-25968", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json new file mode 100644 index 00000000000..2c52ab634f2 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25973", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T18:15:26.713", + "lastModified": "2025-02-20T18:15:26.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored Cross Site Scripting vulnerability in the \"related recommendations\" feature in Ppress v.0.0.9 allows a remote attacker to execute arbitrary code via a crafted script to the article.title, article.category, and article.tags parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/coleak2021/512acaa12ba0987499d560967acff1d1", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yandaozi/PPress/issues/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26304.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26304.json new file mode 100644 index 00000000000..62dde173172 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26304.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26304", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.260", + "lastModified": "2025-02-20T17:15:12.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory leak has been identified in the parseSWF_EXPORTASSETS function in util/parser.c of libming v0.4.8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/323", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26305.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26305.json new file mode 100644 index 00000000000..432ecac5f7d --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26305.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26305", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.377", + "lastModified": "2025-02-20T17:15:12.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory leak has been identified in the parseSWF_SOUNDINFO function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/322", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json new file mode 100644 index 00000000000..674aa913721 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26306", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.490", + "lastModified": "2025-02-20T17:15:12.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory leak has been identified in the readSizedString function in util/read.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/324", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26307.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26307.json new file mode 100644 index 00000000000..94258f1855d --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26307.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26307", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.607", + "lastModified": "2025-02-20T17:15:12.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory leak has been identified in the parseSWF_IMPORTASSETS2 function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/325", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json new file mode 100644 index 00000000000..3138fcc1e8e --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26308", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.730", + "lastModified": "2025-02-20T17:15:12.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory leak has been identified in the parseSWF_FILTERLIST function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/326", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26309.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26309.json new file mode 100644 index 00000000000..b2647bec80f --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26309.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26309", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.853", + "lastModified": "2025-02-20T17:15:12.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A memory leak has been identified in the parseSWF_DEFINESCENEANDFRAMEDATA function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/327", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26310.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26310.json new file mode 100644 index 00000000000..75c106fd339 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26310.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26310", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:12.967", + "lastModified": "2025-02-20T17:15:12.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple memory leaks have been identified in the ABC file parsing functions (parseABC_CONSTANT_POOL and `parseABC_FILE) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted ABC file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/328", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json new file mode 100644 index 00000000000..f2a83b367d1 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26311", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T17:15:13.087", + "lastModified": "2025-02-20T17:15:13.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple memory leaks have been identified in the clip actions parsing functions (parseSWF_CLIPACTIONS and parseSWF_CLIPACTIONRECORD) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted SWF file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/libming/libming/issues/329", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json new file mode 100644 index 00000000000..90e30977909 --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-27091", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-20T18:15:26.850", + "lastModified": "2025-02-20T18:15:26.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim's user decoding client and, possibly, perform arbitrary commands on the victim's host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 software releases 2.6.0 and later contained the fix for this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* [Open an issue in cisco/openh264](https://github.com/cisco/openh264/issues)\n* Email Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) and Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com))\n\n### Credits:\n\n* **Research:** Octavian Guzu and Andrew Calvano of Meta\n* **Fix ideation:** Philipp Hancke and Shyam Sadhwani of Meta\n* **Fix implementation:** Benzheng Zhang (@BenzhengZhang)\n* **Release engineering:** Benzheng Zhang (@BenzhengZhang)" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cisco/openh264/releases/tag/v2.6.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cisco/openh264/security/advisories/GHSA-m99q-5j7x-7m9x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3ca6759b949..9f5c100f3ac 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-20T17:00:56.445324+00:00 +2025-02-20T19:00:22.081235+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-20T16:51:45.987000+00:00 +2025-02-20T18:53:42.533000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281920 +281942 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `22` -- [CVE-2023-51308](CVE-2023/CVE-2023-513xx/CVE-2023-51308.json) (`2025-02-20T15:15:11.793`) -- [CVE-2023-51309](CVE-2023/CVE-2023-513xx/CVE-2023-51309.json) (`2025-02-20T15:15:11.920`) -- [CVE-2023-51310](CVE-2023/CVE-2023-513xx/CVE-2023-51310.json) (`2025-02-20T15:15:12.050`) -- [CVE-2023-51311](CVE-2023/CVE-2023-513xx/CVE-2023-51311.json) (`2025-02-20T15:15:12.170`) -- [CVE-2023-51312](CVE-2023/CVE-2023-513xx/CVE-2023-51312.json) (`2025-02-20T15:15:12.293`) -- [CVE-2023-51313](CVE-2023/CVE-2023-513xx/CVE-2023-51313.json) (`2025-02-20T15:15:12.437`) -- [CVE-2023-51314](CVE-2023/CVE-2023-513xx/CVE-2023-51314.json) (`2025-02-20T15:15:12.563`) -- [CVE-2023-51315](CVE-2023/CVE-2023-513xx/CVE-2023-51315.json) (`2025-02-20T15:15:12.680`) -- [CVE-2023-51316](CVE-2023/CVE-2023-513xx/CVE-2023-51316.json) (`2025-02-20T15:15:12.810`) -- [CVE-2023-51317](CVE-2023/CVE-2023-513xx/CVE-2023-51317.json) (`2025-02-20T16:15:34.600`) -- [CVE-2023-51318](CVE-2023/CVE-2023-513xx/CVE-2023-51318.json) (`2025-02-20T16:15:34.703`) -- [CVE-2023-51319](CVE-2023/CVE-2023-513xx/CVE-2023-51319.json) (`2025-02-20T16:15:34.803`) -- [CVE-2023-51320](CVE-2023/CVE-2023-513xx/CVE-2023-51320.json) (`2025-02-20T16:15:34.903`) -- [CVE-2023-51321](CVE-2023/CVE-2023-513xx/CVE-2023-51321.json) (`2025-02-20T16:15:35.007`) -- [CVE-2023-51323](CVE-2023/CVE-2023-513xx/CVE-2023-51323.json) (`2025-02-20T16:15:35.110`) -- [CVE-2023-51324](CVE-2023/CVE-2023-513xx/CVE-2023-51324.json) (`2025-02-20T16:15:35.210`) -- [CVE-2023-51325](CVE-2023/CVE-2023-513xx/CVE-2023-51325.json) (`2025-02-20T16:15:35.330`) -- [CVE-2023-51326](CVE-2023/CVE-2023-513xx/CVE-2023-51326.json) (`2025-02-20T16:15:35.437`) -- [CVE-2023-51327](CVE-2023/CVE-2023-513xx/CVE-2023-51327.json) (`2025-02-20T16:15:35.543`) -- [CVE-2023-51330](CVE-2023/CVE-2023-513xx/CVE-2023-51330.json) (`2025-02-20T16:15:35.647`) -- [CVE-2023-51331](CVE-2023/CVE-2023-513xx/CVE-2023-51331.json) (`2025-02-20T16:15:35.750`) -- [CVE-2023-51332](CVE-2023/CVE-2023-513xx/CVE-2023-51332.json) (`2025-02-20T16:15:35.850`) -- [CVE-2024-57401](CVE-2024/CVE-2024-574xx/CVE-2024-57401.json) (`2025-02-20T15:15:13.347`) -- [CVE-2025-0161](CVE-2025/CVE-2025-01xx/CVE-2025-0161.json) (`2025-02-20T16:15:36.333`) -- [CVE-2025-20059](CVE-2025/CVE-2025-200xx/CVE-2025-20059.json) (`2025-02-20T15:15:13.957`) +- [CVE-2023-51333](CVE-2023/CVE-2023-513xx/CVE-2023-51333.json) (`2025-02-20T18:15:24.077`) +- [CVE-2023-51334](CVE-2023/CVE-2023-513xx/CVE-2023-51334.json) (`2025-02-20T18:15:24.203`) +- [CVE-2023-51335](CVE-2023/CVE-2023-513xx/CVE-2023-51335.json) (`2025-02-20T18:15:24.347`) +- [CVE-2024-46933](CVE-2024/CVE-2024-469xx/CVE-2024-46933.json) (`2025-02-20T18:15:25.007`) +- [CVE-2024-54958](CVE-2024/CVE-2024-549xx/CVE-2024-54958.json) (`2025-02-20T18:15:25.187`) +- [CVE-2024-54959](CVE-2024/CVE-2024-549xx/CVE-2024-54959.json) (`2025-02-20T18:15:25.317`) +- [CVE-2024-54960](CVE-2024/CVE-2024-549xx/CVE-2024-54960.json) (`2025-02-20T18:15:25.457`) +- [CVE-2024-54961](CVE-2024/CVE-2024-549xx/CVE-2024-54961.json) (`2025-02-20T18:15:25.593`) +- [CVE-2024-55457](CVE-2024/CVE-2024-554xx/CVE-2024-55457.json) (`2025-02-20T18:15:25.740`) +- [CVE-2024-57716](CVE-2024/CVE-2024-577xx/CVE-2024-57716.json) (`2025-02-20T17:15:11.803`) +- [CVE-2025-1258](CVE-2025/CVE-2025-12xx/CVE-2025-1258.json) (`2025-02-20T18:15:26.217`) +- [CVE-2025-25968](CVE-2025/CVE-2025-259xx/CVE-2025-25968.json) (`2025-02-20T18:15:26.570`) +- [CVE-2025-25973](CVE-2025/CVE-2025-259xx/CVE-2025-25973.json) (`2025-02-20T18:15:26.713`) +- [CVE-2025-26304](CVE-2025/CVE-2025-263xx/CVE-2025-26304.json) (`2025-02-20T17:15:12.260`) +- [CVE-2025-26305](CVE-2025/CVE-2025-263xx/CVE-2025-26305.json) (`2025-02-20T17:15:12.377`) +- [CVE-2025-26306](CVE-2025/CVE-2025-263xx/CVE-2025-26306.json) (`2025-02-20T17:15:12.490`) +- [CVE-2025-26307](CVE-2025/CVE-2025-263xx/CVE-2025-26307.json) (`2025-02-20T17:15:12.607`) +- [CVE-2025-26308](CVE-2025/CVE-2025-263xx/CVE-2025-26308.json) (`2025-02-20T17:15:12.730`) +- [CVE-2025-26309](CVE-2025/CVE-2025-263xx/CVE-2025-26309.json) (`2025-02-20T17:15:12.853`) +- [CVE-2025-26310](CVE-2025/CVE-2025-263xx/CVE-2025-26310.json) (`2025-02-20T17:15:12.967`) +- [CVE-2025-26311](CVE-2025/CVE-2025-263xx/CVE-2025-26311.json) (`2025-02-20T17:15:13.087`) +- [CVE-2025-27091](CVE-2025/CVE-2025-270xx/CVE-2025-27091.json) (`2025-02-20T18:15:26.850`) ### CVEs modified in the last Commit -Recently modified CVEs: `65` +Recently modified CVEs: `76` -- [CVE-2024-21689](CVE-2024/CVE-2024-216xx/CVE-2024-21689.json) (`2025-02-20T15:23:21.377`) -- [CVE-2024-2472](CVE-2024/CVE-2024-24xx/CVE-2024-2472.json) (`2025-02-20T15:28:10.360`) -- [CVE-2024-37361](CVE-2024/CVE-2024-373xx/CVE-2024-37361.json) (`2025-02-20T15:15:13.190`) -- [CVE-2024-47073](CVE-2024/CVE-2024-470xx/CVE-2024-47073.json) (`2025-02-20T16:20:40.547`) -- [CVE-2024-47908](CVE-2024/CVE-2024-479xx/CVE-2024-47908.json) (`2025-02-20T15:57:06.850`) -- [CVE-2024-52295](CVE-2024/CVE-2024-522xx/CVE-2024-52295.json) (`2025-02-20T16:21:26.323`) -- [CVE-2024-55952](CVE-2024/CVE-2024-559xx/CVE-2024-55952.json) (`2025-02-20T16:22:50.240`) -- [CVE-2024-55953](CVE-2024/CVE-2024-559xx/CVE-2024-55953.json) (`2025-02-20T16:25:07.667`) -- [CVE-2024-56511](CVE-2024/CVE-2024-565xx/CVE-2024-56511.json) (`2025-02-20T16:26:58.487`) -- [CVE-2024-8911](CVE-2024/CVE-2024-89xx/CVE-2024-8911.json) (`2025-02-20T15:30:18.643`) -- [CVE-2024-8943](CVE-2024/CVE-2024-89xx/CVE-2024-8943.json) (`2025-02-20T15:30:59.567`) -- [CVE-2025-1176](CVE-2025/CVE-2025-11xx/CVE-2025-1176.json) (`2025-02-20T16:40:56.790`) -- [CVE-2025-1177](CVE-2025/CVE-2025-11xx/CVE-2025-1177.json) (`2025-02-20T15:58:50.097`) -- [CVE-2025-1189](CVE-2025/CVE-2025-11xx/CVE-2025-1189.json) (`2025-02-20T16:24:17.783`) -- [CVE-2025-22467](CVE-2025/CVE-2025-224xx/CVE-2025-22467.json) (`2025-02-20T15:53:06.133`) -- [CVE-2025-24011](CVE-2025/CVE-2025-240xx/CVE-2025-24011.json) (`2025-02-20T16:44:29.017`) -- [CVE-2025-24012](CVE-2025/CVE-2025-240xx/CVE-2025-24012.json) (`2025-02-20T16:45:15.377`) -- [CVE-2025-24896](CVE-2025/CVE-2025-248xx/CVE-2025-24896.json) (`2025-02-20T15:48:37.877`) -- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-20T15:15:14.380`) -- [CVE-2025-25942](CVE-2025/CVE-2025-259xx/CVE-2025-25942.json) (`2025-02-20T15:15:14.587`) -- [CVE-2025-25943](CVE-2025/CVE-2025-259xx/CVE-2025-25943.json) (`2025-02-20T15:15:14.743`) -- [CVE-2025-25944](CVE-2025/CVE-2025-259xx/CVE-2025-25944.json) (`2025-02-20T15:15:14.900`) -- [CVE-2025-25945](CVE-2025/CVE-2025-259xx/CVE-2025-25945.json) (`2025-02-20T15:15:15.073`) -- [CVE-2025-25946](CVE-2025/CVE-2025-259xx/CVE-2025-25946.json) (`2025-02-20T15:15:15.227`) -- [CVE-2025-25947](CVE-2025/CVE-2025-259xx/CVE-2025-25947.json) (`2025-02-20T15:15:15.530`) +- [CVE-2024-2573](CVE-2024/CVE-2024-25xx/CVE-2024-2573.json) (`2025-02-20T18:12:59.823`) +- [CVE-2024-2574](CVE-2024/CVE-2024-25xx/CVE-2024-2574.json) (`2025-02-20T18:10:50.230`) +- [CVE-2024-2575](CVE-2024/CVE-2024-25xx/CVE-2024-2575.json) (`2025-02-20T18:10:40.443`) +- [CVE-2024-2576](CVE-2024/CVE-2024-25xx/CVE-2024-2576.json) (`2025-02-20T18:09:56.283`) +- [CVE-2024-2577](CVE-2024/CVE-2024-25xx/CVE-2024-2577.json) (`2025-02-20T18:09:43.090`) +- [CVE-2024-2773](CVE-2024/CVE-2024-27xx/CVE-2024-2773.json) (`2025-02-20T18:26:30.320`) +- [CVE-2024-2775](CVE-2024/CVE-2024-27xx/CVE-2024-2775.json) (`2025-02-20T18:29:08.757`) +- [CVE-2024-2778](CVE-2024/CVE-2024-27xx/CVE-2024-2778.json) (`2025-02-20T18:28:46.003`) +- [CVE-2024-28112](CVE-2024/CVE-2024-281xx/CVE-2024-28112.json) (`2025-02-20T17:25:58.783`) +- [CVE-2024-28113](CVE-2024/CVE-2024-281xx/CVE-2024-28113.json) (`2025-02-20T17:08:04.250`) +- [CVE-2024-28114](CVE-2024/CVE-2024-281xx/CVE-2024-28114.json) (`2025-02-20T17:18:20.863`) +- [CVE-2024-2832](CVE-2024/CVE-2024-28xx/CVE-2024-2832.json) (`2025-02-20T17:22:38.917`) +- [CVE-2024-2927](CVE-2024/CVE-2024-29xx/CVE-2024-2927.json) (`2025-02-20T18:53:42.533`) +- [CVE-2024-2938](CVE-2024/CVE-2024-29xx/CVE-2024-2938.json) (`2025-02-20T18:38:08.680`) +- [CVE-2024-2941](CVE-2024/CVE-2024-29xx/CVE-2024-2941.json) (`2025-02-20T18:28:58.243`) +- [CVE-2024-2942](CVE-2024/CVE-2024-29xx/CVE-2024-2942.json) (`2025-02-20T18:06:40.927`) +- [CVE-2024-4792](CVE-2024/CVE-2024-47xx/CVE-2024-4792.json) (`2025-02-20T18:24:20.357`) +- [CVE-2024-4793](CVE-2024/CVE-2024-47xx/CVE-2024-4793.json) (`2025-02-20T18:23:45.077`) +- [CVE-2024-4794](CVE-2024/CVE-2024-47xx/CVE-2024-4794.json) (`2025-02-20T18:22:57.657`) +- [CVE-2024-4795](CVE-2024/CVE-2024-47xx/CVE-2024-4795.json) (`2025-02-20T18:22:18.310`) +- [CVE-2024-4796](CVE-2024/CVE-2024-47xx/CVE-2024-4796.json) (`2025-02-20T18:21:43.983`) +- [CVE-2024-4797](CVE-2024/CVE-2024-47xx/CVE-2024-4797.json) (`2025-02-20T18:20:28.093`) +- [CVE-2024-4817](CVE-2024/CVE-2024-48xx/CVE-2024-4817.json) (`2025-02-20T18:18:32.357`) +- [CVE-2024-4818](CVE-2024/CVE-2024-48xx/CVE-2024-4818.json) (`2025-02-20T18:17:41.877`) +- [CVE-2024-4819](CVE-2024/CVE-2024-48xx/CVE-2024-4819.json) (`2025-02-20T18:16:52.500`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e2a5470ed78..a2d9d5f508f 100644 --- a/_state.csv +++ b/_state.csv @@ -76369,7 +76369,7 @@ CVE-2015-2969,0,0,a6227da3ec97ec12ae2ecd4e518e5e398048e1cfa7ab81073d83b17a57ae5a CVE-2015-2970,0,0,bdb774a4f43bc135b5ebf54bfeff8ddb1f7b29fa263806e9b89bba9b4effde1c,2024-11-21T02:28:25.077000 CVE-2015-2971,0,0,62735c61e9c12718c41334ff9d3675c0bfa8c07e8bedf2811cc4a72e8adf402b,2024-11-21T02:28:25.183000 CVE-2015-2972,0,0,158b8f3ec78c54793d014612a503375bd45db40b144ea6dcbf627b350b80c8ac,2024-11-21T02:28:25.300000 -CVE-2015-2973,0,0,4f6c0d64a017212b13c5092fc0a929a581c0f81ce4c68dac7f11f5655f846e17,2024-11-21T02:28:25.437000 +CVE-2015-2973,0,1,d21c3c6752a63f5dea0029172d0f34d6015fa83428d5a308ece6fccec16f4c6a,2025-02-20T18:32:30.690000 CVE-2015-2974,0,0,1439adb553c92e9c2b19dfbbc6c60ff2bc3c6623e0428e64db50612ea44f662e,2024-11-21T02:28:25.567000 CVE-2015-2975,0,0,152804feb84f2a7b7517565917a1bdf73a48f9314cb5e2f82a6c1ccf7788e5d6,2024-11-21T02:28:25.690000 CVE-2015-2976,0,0,6da1a28317cd61306521d5ec7535b3c5625bbb05dc962a8a2a81967c7e1d2632,2024-11-21T02:28:25.810000 @@ -80583,7 +80583,7 @@ CVE-2015-7787,0,0,e7ffd836900ab2cbe714a1bae345a491ddfa6d7e4b1a6b06063cd95d59dde0 CVE-2015-7788,0,0,cef225d84f0e0cc498800cd9a58535e01f4bf41957033c32fac1886fa7af2d63,2024-11-21T02:37:24.340000 CVE-2015-7789,0,0,b019431cec4b656a585be7c7a29769515b9356817023a390c244aa57c79b82c3,2024-11-21T02:37:24.447000 CVE-2015-7790,0,0,d918779762b82ec200e82c4eea5d159d12ebf8b6a3fddff5b11cdb7fd4ec08b9,2024-11-21T02:37:24.573000 -CVE-2015-7791,0,0,a53bffabae9d069d68f99aa2346ecfc555db672bb65d62d5b845944124b0ba7d,2024-11-21T02:37:24.680000 +CVE-2015-7791,0,1,30c46c03fe88cae851ec2bd35347650a061ef101285604c5189c01ef223a5c85,2025-02-20T18:32:30.690000 CVE-2015-7792,0,0,633335c17c42e4bdc12eade2bc77b959edb1964f32f73e6a2b91bf4b687aca30,2024-11-21T02:37:24.783000 CVE-2015-7793,0,0,7430a1ecabb2e0adaa0fc48b7bf2be48224f8ce3d88d7f5ab5a730c34c10c419,2024-11-21T02:37:24.893000 CVE-2015-7794,0,0,687d7947da0fbe275520709d3a138b3cfe90c579077b62b85150825d4b4db41b,2024-11-21T02:37:25 @@ -88054,10 +88054,10 @@ CVE-2016-4821,0,0,9eca5dbbc8b587dc9328834b1da524cd9a01a05e2c527015fb7a8e162ccb9c CVE-2016-4822,0,0,da038560166be4a592796d8feb944b4f32b7cd701fced815c1a846c55f523f73,2024-11-21T02:53:03.167000 CVE-2016-4823,0,0,c82dcde87f8eaa30004168bf63c86a67d619d91b4165fa53b4e9aec8294462b1,2024-11-21T02:53:03.313000 CVE-2016-4824,0,0,ba1db843692158571863930e920398f5ea5520d01f56e76b40e55f468763f2f5,2024-11-21T02:53:03.440000 -CVE-2016-4825,0,0,198ef2e58ce1a99a714e98f9a452d6bf9ff2234907ba2269d29b44dd55c8606b,2024-11-21T02:53:03.553000 -CVE-2016-4826,0,0,b8b7f91cfde6b75f2101a91b53fbdc341c76bde47d4774dc7876b34478f6a8c6,2024-11-21T02:53:03.667000 -CVE-2016-4827,0,0,c6b30ae54fe605378cebb89b2f7bf7235aa4b66825d30cdcb181888c9ba0dca8,2024-11-21T02:53:03.780000 -CVE-2016-4828,0,0,8cf682642fe23e370e3dbbcf700e43387f35db859e59e3a8815df284310dc946,2024-11-21T02:53:03.897000 +CVE-2016-4825,0,1,698622719399cd46567ac2a874e0e53b3624f8c6ce464f10341927567656b543,2025-02-20T18:34:50.990000 +CVE-2016-4826,0,1,9f23b8103ea91c2062402aafc42b4a004f7cdb7d4e781d4e8a5e92829714170a,2025-02-20T18:34:50.990000 +CVE-2016-4827,0,1,407b748daa29454ff00243186883e09b733a4a25d461427c56d2c663327db66d,2025-02-20T18:34:50.990000 +CVE-2016-4828,0,1,96e3d00ff0f89bb6893fff60801b31773437bb8fc12bf9a5f6fc3c4bdecac56c,2025-02-20T18:34:50.990000 CVE-2016-4829,0,0,ee7777fcf68a11c177eaa6c14eafcc4c2d70e8047c16dafd6cb2aeafbd138cc2,2024-11-21T02:53:04.007000 CVE-2016-4830,0,0,2254394998bf7d7b5d716ef25cf5b087885320a61518ae9d6d6bc5fc7f5d242e,2024-11-21T02:53:04.110000 CVE-2016-4831,0,0,449eb395554f906f8a42ad4a08c48fdeb609e19ebe9990da0fbe33d79d3a21d9,2024-11-21T02:53:04.227000 @@ -88400,7 +88400,7 @@ CVE-2016-5194,0,0,8185033d9012165cc31acb2382c5db14cc153b70b8e1ec74f008137fb74472 CVE-2016-5195,0,0,a72b2a47f09f317d155c3faa867aa5de0484857a93d1a6bb00eb8bb513581af3,2025-01-29T18:15:28.220000 CVE-2016-5196,0,0,85d60c53c34b34a94d1179275edd2dbc1908adaf314ce782eec74fdc214d2790,2024-11-21T02:53:49.200000 CVE-2016-5197,0,0,74734dde4ecc6b3409ed55059c42eca7f8eadfb7f8d2fce0bff152caf355fae2,2024-11-21T02:53:49.310000 -CVE-2016-5198,0,0,00364648dd89727532f18d29e771fc5b5a86b90153518c8fd5529649ae690e28,2025-01-29T18:15:29.050000 +CVE-2016-5198,0,1,f8e72c129d1860d6b27a996fa600331dc1e5cb837213e5e87450ca3b8f5e267f,2025-02-20T18:06:01.273000 CVE-2016-5199,0,0,af7b883c8a25a0fc5ef58d60a01c24f776d4e2af270560d9047cac249fd826e1,2024-11-21T02:53:49.563000 CVE-2016-5200,0,0,1d9761eb86b4904ddf3bd2084d1f12a47f7ac16df3c584bddaa4d78dfb4b4351,2024-11-21T02:53:49.680000 CVE-2016-5201,0,0,49d7d942f4c2bb57ec7aa33d38d6bb1a8c5b2ba43e61df8ba5cec080a29e6c6c,2024-11-21T02:53:49.790000 @@ -105417,7 +105417,7 @@ CVE-2017-5026,0,0,d5a38725a31f738366f1beee032cbd89dd10b4653b84108a8a2d10586c7523 CVE-2017-5027,0,0,3faa021617bb8d53bbbd89ee85f4d713e0f72f31c3a228d4fdb19e5be10c868e,2024-11-21T03:26:53.583000 CVE-2017-5028,0,0,95c1b912517beef415dde1d0fc022d559f040e8de5930a425edb5c27b84a546a,2024-11-21T03:26:53.707000 CVE-2017-5029,0,0,9dd4f9a8e4f58ca0f045826febe4afe3ab6de659018279e9cb2f9d10cd599fde,2024-11-21T03:26:53.837000 -CVE-2017-5030,0,0,f178f4ed43cee7aaa9660085cc0972200fcd2c89e86f8d82544cdb521dcebe2e,2025-01-29T18:15:29.307000 +CVE-2017-5030,0,1,573bd0218b7771b760248e7c9966d7539bd1763a3a3e659c262e4fec20f4af49,2025-02-20T18:06:14.400000 CVE-2017-5031,0,0,9fb7bb74b87cbc7d0714ba0a0e2e38a87e2994b27b2b7d0d433ca78776958806,2024-11-21T03:26:54.123000 CVE-2017-5032,0,0,710ce084d71a97ad9230e94b0ab051f5fe7b6da6649d98398e5e6becf0de3373,2024-11-21T03:26:54.253000 CVE-2017-5033,0,0,61cd2f4ffd1551497a52b52be639018e94b322c5e70f38acc7f84cb2af939762,2024-11-21T03:26:54.380000 @@ -105457,7 +105457,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000 CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000 CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000 -CVE-2017-5070,0,0,6e5c0be159f829fcc86ca3543c3ebf687f5f153dedb548f7fb86972ef33780f3,2025-01-29T18:15:29.570000 +CVE-2017-5070,0,1,f3e658e1cb31f49bc94501023b6af813bc6afef713109e8d381d8ea249f5ef98,2025-02-20T18:06:20.647000 CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000 CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000 CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000 @@ -117678,7 +117678,7 @@ CVE-2018-17459,0,0,01667fcf40f4afd58354e38c26130af139dcd0605eb3148ed6ff5b403fe9c CVE-2018-17460,0,0,101fb371c6a177f13942684b9b8431c334fa9b769774866138f9caaa7f94fff3,2024-11-21T03:54:28.183000 CVE-2018-17461,0,0,08e94a9f8b2c0e111cba3b1e993843050bfee9e16729fcee062cac3c222c1ef0,2024-11-21T03:54:28.300000 CVE-2018-17462,0,0,0f38ee64ade5675c8c7659e22612dee11f0c46a14e4775d4e46cf17fd01feff6,2024-11-21T03:54:28.417000 -CVE-2018-17463,0,0,d6d579acbbe44ce174a43c906cfce5f0a114286522043c028ed0802531be2bfc,2025-01-29T18:15:29.997000 +CVE-2018-17463,0,1,35a05252070deeef3bfec2cb9d8cfd440b99743b57fe1023512d0e930843932e,2025-02-20T18:05:36.830000 CVE-2018-17464,0,0,c548efa1995e58d97e68bdebda14642d2421e787b72731d7c363a5950c5dfebc,2024-11-21T03:54:28.703000 CVE-2018-17465,0,0,61bf7c13a28fb91b007e833a8b545f7c7406cab9cef3d683611550623b865d06,2024-11-21T03:54:28.840000 CVE-2018-17466,0,0,2deb66fce5ef461e44fedc1d7c2744ce380a5a1a5eea9b876e97a1c96a3fd0ca,2024-11-21T03:54:28.967000 @@ -128155,8 +128155,8 @@ CVE-2019-1003025,0,0,9af42893769b7fc06499fcc1553335da2ed9c5949155c884cbfc8509bc1 CVE-2019-1003026,0,0,8926b54c91d67008cbe059a9263a943e0ddb50ec72a565a1e25d2ea17035ca1d,2024-11-21T04:17:45.863000 CVE-2019-1003027,0,0,56f161009556c27505aec3dea316a43730f99659e895f1e3bd5a5f2f8aba6713,2024-11-21T04:17:45.977000 CVE-2019-1003028,0,0,d92a32bceca5f379cfee172d48634f5adb98c1a57b20664042f547930ce377e2,2024-11-21T04:17:46.087000 -CVE-2019-1003029,0,0,f773a17ca297e99ab90baba9667d3f501afbb1f6e6f354bdf97d8bf5b8d76972,2025-02-07T13:15:25.013000 -CVE-2019-1003030,0,0,0aaf5f4f1977c928c3ac076147926ac60583bf09a024edc23be9ce26f7e8ee44,2025-02-07T13:15:25.223000 +CVE-2019-1003029,0,1,e93b8c02358b2b54ebe5affac58650f084981613da1d8d0713368d2e7fa5c3dc,2025-02-20T18:05:05.957000 +CVE-2019-1003030,0,1,4a746704f7c55af7486174492f04200b1b8cbb50249b47a2cde93d737d78dfeb,2025-02-20T18:04:29.923000 CVE-2019-1003031,0,0,f5c1957a31b1c62b3f5e059f8af14b086fbd7d3d41e8b72f4ccf5ee6bbd32c59,2024-11-21T04:17:46.473000 CVE-2019-1003032,0,0,e1f996b3969bba4e9c31f9343af2bc586fb9daa6067802944375227975e629de,2024-11-21T04:17:46.590000 CVE-2019-1003033,0,0,8981279a91935b64290350c6e4b6b0ca1f3d966b92bedda3ec8996ad36de38af,2024-11-21T04:17:46.697000 @@ -145359,7 +145359,7 @@ CVE-2020-10091,0,0,0023df9918fdadf5afde7a589c871143ff25422b0de5b843dd37446810a20 CVE-2020-10092,0,0,bed5d552f5b0bb036c3eba1f155fae926f11ff2232ff3d62a715ff4a0ef59ea4,2024-11-21T04:54:47.620000 CVE-2020-10093,0,0,8d0aacd8361af89ed8fce3d23dd783fc6ebd0d8701df0b06ae901731b7ad72e2,2024-11-21T04:54:47.750000 CVE-2020-10094,0,0,6beba78c56501a731d17d4bafa1b7bfd29c7992446387d70f96b80c08094f2cd,2024-11-21T04:54:47.943000 -CVE-2020-10095,0,1,6e2cb772a320574510998ddad9ce8e0be81b33039e5cca2cfff813da71474a90,2025-02-20T16:15:32.050000 +CVE-2020-10095,0,0,6e2cb772a320574510998ddad9ce8e0be81b33039e5cca2cfff813da71474a90,2025-02-20T16:15:32.050000 CVE-2020-10096,0,0,83bee2203a7f767077f6e40b91b5e7f86c8349ada403a759a945e38e30f5b09d,2024-11-21T04:54:48.140000 CVE-2020-10097,0,0,b53a137dcc84c6f9a450665caecc8824e07d3b31ad927277cb99bd9e9b8f13c6,2024-11-21T04:54:48.277000 CVE-2020-10098,0,0,f339d753f3504f60ee2bba806202c760ab227ba9d95ed2b4ebdd071aab6eee53,2024-11-21T04:54:48.413000 @@ -148500,7 +148500,7 @@ CVE-2020-13474,0,0,74c4914a43840fa6e12dd2b53c69ece53ee5a95a7a94ae3930fd8e8a2420f CVE-2020-13476,0,0,cf0a65f58de6a051d6c0e19448011654ef686aa415974f52eecd957162dfb0bb,2024-11-21T05:01:21.103000 CVE-2020-1348,0,0,a9b6f338f457c1b2fb5fb90f4dd043111447cbd66f8ac00dfb2af910a3226e23,2024-11-21T05:10:17.980000 CVE-2020-13480,0,0,5b25db3b1580aa288920d42b9b54622f48b7bf339d5a2131430bb02df62f2c06,2024-11-21T05:01:21.253000 -CVE-2020-13481,0,1,0f519cd7a7f26e98c6f0bb00022a093ebb9314726065b47afe6705bf77f67a6f,2025-02-20T16:15:32.720000 +CVE-2020-13481,0,0,0f519cd7a7f26e98c6f0bb00022a093ebb9314726065b47afe6705bf77f67a6f,2025-02-20T16:15:32.720000 CVE-2020-13482,0,0,c3adf851d39e5a118e124354d5ac6f55d29bdc276513f621b483678ff1a7566e,2024-11-21T05:01:21.413000 CVE-2020-13483,0,0,ee2229aa912f53fce6524ec444822b1c650cad80395874d5fb423ba8ff8fa71f,2024-11-21T05:01:21.573000 CVE-2020-13484,0,0,53f1e472880fa0d80a8ad749380a006e55911a59405653282e32e67c54cafd0e,2024-11-21T05:01:21.727000 @@ -157022,7 +157022,7 @@ CVE-2020-28332,0,0,ea41092a4260f1e209a6608011762121335205630f1dc46a519bbb481f2fe CVE-2020-28333,0,0,5d01970ea48e94db343cacea2357594ffb1a5d1e941a45ca5cd8dadd11e341b3,2024-11-21T05:22:35.830000 CVE-2020-28334,0,0,65275d5ea9fcff73bb1c7e5a59a552727645cc0d94321b25b43b1dcb15d4882b,2024-11-21T05:22:35.963000 CVE-2020-28337,0,0,7caee8fe0e93e360f8b1e63e72b18d9f77590694eb7167e04004ae7b68abbc4f,2024-11-21T05:22:36.137000 -CVE-2020-28339,0,0,5039b7010003f040693a8531f46f951897dd8fae1466593fc48b783fdcb38f15,2024-11-21T05:22:36.373000 +CVE-2020-28339,0,1,bb8a63d2869b981df38938bdb818f664572a8c5bb07e2ef5b0ffccd745c01fbd,2025-02-20T18:34:50.990000 CVE-2020-2834,0,0,45bf764b720cb9e23fbdbe5872b2f9ed6161433c0737bbfb3510fcc0e229976e,2024-11-21T05:26:24.210000 CVE-2020-28340,0,0,3776145d68503bcc87d9be1c321633a4a8181ea0030d5b290a8b01d7d68341dd,2024-11-21T05:22:37.350000 CVE-2020-28341,0,0,8c43b8448d82d3fb811af0f398a258dc882482eff4870114642334a64384d899,2024-11-21T05:22:37.573000 @@ -158513,7 +158513,7 @@ CVE-2020-35540,0,0,6bd64b059b520580fc1288131d694e2faf21edb8f793d207b450f97b8fdf5 CVE-2020-35541,0,0,8d5365eb0cabd9fb3bbef386a7a8573f0770d7f02e50738d63f9bc34f5836ae4,2023-11-07T03:21:58.650000 CVE-2020-35542,0,0,cf77cdeac798a3a257ffcb234660d4518d214cb4498ec8c17e86fd96ebfc678f,2024-11-21T05:27:31.673000 CVE-2020-35545,0,0,90718e2ddefe9ba5082932c97e23e972baa70313d1d4fdf00f695b1d71c6cc9b,2024-11-21T05:27:31.870000 -CVE-2020-35546,0,1,4f26a22c783b92492a92818000739c3d9dd7ddb2602ff336a588a06ece9b3108,2025-02-20T16:15:32.870000 +CVE-2020-35546,0,0,4f26a22c783b92492a92818000739c3d9dd7ddb2602ff336a588a06ece9b3108,2025-02-20T16:15:32.870000 CVE-2020-35547,0,0,0b56fd34bbcf6f73360d1254a0790470258ba9dfdd070f322adb5be0ea6a8538,2024-11-21T05:27:32.053000 CVE-2020-35548,0,0,d7355cb5b84b5b614d93237f5cbb2796f3a81213009605c0528bcf58e0d77ec2,2024-11-21T05:27:32.280000 CVE-2020-35549,0,0,6a5d8eef45e56534ec7da225d0cd05db4848ea6f60c0898ba9512b7ec9f90052,2024-11-21T05:27:32.460000 @@ -167348,7 +167348,7 @@ CVE-2021-20730,0,0,1ec3f829ceb2c426bbf7d23d4044627c96ef2289553acb3f1ab413dbd8cac CVE-2021-20731,0,0,823b1d42249f84272bc5106b9599ba761650700f6e7efeedcac976149b22995b,2024-11-21T05:47:05.653000 CVE-2021-20732,0,0,f14744fc9e3f05a52bb58b83b93ee800abccaa6faca752df64b5fc8396b3ab62,2024-11-21T05:47:05.757000 CVE-2021-20733,0,0,53355cf173790d2615079e366ff26d651f8f647643c5147be3b2fdbc0816727c,2024-11-21T05:47:05.860000 -CVE-2021-20734,0,0,783068fe08882431d4084242b514ee232ae1c566c060205b3fe9bf7e8a13dec4,2024-11-21T05:47:05.970000 +CVE-2021-20734,0,1,d3aa13e0a38173dd06b80f9766834e5163918ce5ad4aa2c21795b64f2e975153,2025-02-20T18:32:30.690000 CVE-2021-20735,0,0,89f58d6c204069d7e35bd1504c4b0de1429c1d570156ee6d1d9f9cb80e1f8919,2024-11-21T05:47:06.077000 CVE-2021-20736,0,0,9d90bafbbe8ec4514f8cf04a08985a6ebd7a760ffcc061c9a286056aa391080f,2024-11-21T05:47:06.210000 CVE-2021-20737,0,0,c5379f88fe9c362eec4bcaf6f34c8aeca21ba24e9ec263bdda6a1513b1751183,2024-11-21T05:47:06.327000 @@ -180572,7 +180572,7 @@ CVE-2021-37972,0,0,683e1a1fefcd3e6b35217c21fee5a5db7a833faf0db4a4cea8afec0b89d7f CVE-2021-37973,0,0,743719dc94941c0357e14c84302b60c64b1c9baa604633a5edeaa1f72511ddde,2025-02-03T14:15:32.667000 CVE-2021-37974,0,0,931558bac71f677090ea0b1907b8540ee5ebcd09055b5e5c0cdab44c71c9cd9c,2024-11-21T06:16:10.087000 CVE-2021-37975,0,0,574c7731ec3c645981816344462d7b8e155d6f2955a8879bf1219a53ab4d177c,2025-02-19T19:37:44.870000 -CVE-2021-37976,0,0,a688ef197c2d29b70611dd79c03840483ff8e68d10b02af37ebae3027176db74,2025-01-29T17:15:15.167000 +CVE-2021-37976,0,1,dd5a7fa4d6b16e7e14ff3b5357015c05846da841d51b43f563c37221ca591a09,2025-02-20T18:05:54.830000 CVE-2021-37977,0,0,1b17f7ec5b0de42e2e2b48b889a4cfca2be4df4c6df43a9cfe4b4af2363e8a11,2024-11-21T06:16:10.597000 CVE-2021-37978,0,0,8c9a82307b49cf288e54e9dd5a62e4200930d32429f0706b995b3970a9915020,2024-11-21T06:16:10.773000 CVE-2021-37979,0,0,c66ff43d04413f35f45413c5706ee15b0d59c742ab89b8f1050a1346c9f2c5c4,2024-11-21T06:16:10.933000 @@ -184873,7 +184873,7 @@ CVE-2021-43546,0,0,920e4f87bea82058d1bb12ab331e18dfec5c687d94479ee497c2d02443da4 CVE-2021-43547,0,0,738134ffb8b48b09d07852a075e9bdd6119081eca87270671abdf67dea1ab53e,2024-11-21T06:29:24.410000 CVE-2021-43548,0,0,660c279219eaeb88d08019bd0834a60ff1b9daa9ea70302d8f188ff62ba5fb9a,2024-11-21T06:29:24.557000 CVE-2021-43549,0,0,421cca19c964e8ed53b3dfc40db7fffdf3c441d4b930645d6ca3cbd04fed3d4f,2024-11-21T06:29:24.693000 -CVE-2021-4355,0,0,1fecb778fbf00c51d06cf0a582a48c15eeb153feb81f301f8f05cedc6c333cb2,2024-11-21T06:37:29.533000 +CVE-2021-4355,0,1,faa989c3b45b8dce966e7a8a03608dbc11f1b19245d486e046c899a92c006625,2025-02-20T18:34:50.990000 CVE-2021-43550,0,0,4f927d9d2d1f50852677237c7281fe3439f9606e8728e5657367006e16b78eb8,2024-11-21T06:29:24.837000 CVE-2021-43551,0,0,3f79cff9ad7256c5dc96a3fb585a194a11e2798b0c9ca81d4d885df6a5d7ae5a,2024-11-21T06:29:24.990000 CVE-2021-43552,0,0,ced5d0bfdab6b81b6d96bebb9728ad8801b7cb6c6c7f47c84d8238bf0fce1ea6,2024-11-21T06:29:25.140000 @@ -185008,7 +185008,7 @@ CVE-2021-43746,0,0,0aa389b0cf544c260fc12cb905e5b0cfa9d202ea84753dffc0e382f8c91ee CVE-2021-43747,0,0,162c6bdf1b6723bca99ff032baa034ae5eceba178c46376fd03f8cba27ddcb95,2024-11-21T06:29:42.410000 CVE-2021-43748,0,0,8483a3c9771d0af04aa08b723a77be227af06be24dd9bd9b567e0e24603eff64,2024-11-21T06:29:42.533000 CVE-2021-43749,0,0,6e53c2d7105d3127906e304110ff9fa2ff10113032655c11e5064fb136fa4f4d,2024-11-21T06:29:42.663000 -CVE-2021-4375,0,0,0dcba94500ef3d67311eb5b8af3724fb1eb468111f67c10b6e8a148d9ad75dd4,2024-11-21T06:37:32.467000 +CVE-2021-4375,0,1,d2743d7b615ecc33b9e3121e048fb8b97c18d5ac641bd531634722afa5096125,2025-02-20T18:34:50.990000 CVE-2021-43750,0,0,2dfccf5af2de1d16ae98dd3dbd9c6f8bcbf853bd1c72f440527778a0236ef80b,2024-11-21T06:29:42.787000 CVE-2021-43751,0,0,54215a7355234a86f6c2ca4a904ea7d11e59250e603dbecf986311c50ce6d57e,2024-11-21T06:29:42.913000 CVE-2021-43752,0,0,c3a3b348b7031f34b1c1fbd1ed0c7531e6835e563e859b77f332a3751caf5fab,2024-11-21T06:29:43.040000 @@ -206039,7 +206039,7 @@ CVE-2022-39346,0,0,6f96ae0d6cb2161bb8cbd15fd8f5ebb7d460662735f1fc173e8b082d66f11 CVE-2022-39347,0,0,d4a9a30b92d340cef8780f6e37e0412aa0f8aeb3180bc1cc00665a4e5e63a168,2024-11-21T07:18:05.243000 CVE-2022-39348,0,0,14a772d30d8064b4c726670b85ab408eddd9b49d913bb04ad19491852ed0f35f,2024-11-25T18:12:24.673000 CVE-2022-39349,0,0,d9eb9faa07e80f1d180cbde0331ee8cbc227032de1b8da0c3fe934149355d7d7,2024-11-21T07:18:05.543000 -CVE-2022-3935,0,0,a2952c2b0d24a269dc182030ce3e35c1ccfbc58dc8e49e4ca725856adf5c5187,2024-11-21T07:20:33.790000 +CVE-2022-3935,0,1,ad2e7888561fab62ba438c4dacf5056e22bb1e53f31f072012c6145e9aebee3c,2025-02-20T18:34:50.990000 CVE-2022-39350,0,0,975455911476cfc36b24f6e872afea362a2c241ae6d8c090820244014a9c4e17,2024-11-21T07:18:05.670000 CVE-2022-39351,0,0,20bceefea9d8b1fd505df359a8cc931d6eb1058fd84be3fe6fd9a0b30d2c92ab,2024-11-21T07:18:05.790000 CVE-2022-39352,0,0,619ffeee8a97413d83d42824216aa98c6965291b4b040f24d2421b03c8d94492,2024-11-21T07:18:05.920000 @@ -206123,7 +206123,7 @@ CVE-2022-39429,0,0,e8920945479dc9dc3abc7c75449e57b59112dffa60102a122d992e4e52bbe CVE-2022-3943,0,0,c6a031ab5daa36a8a57885730b19c5fb6363ea001759beadfd390da099c2fd96,2024-11-21T07:20:34.693000 CVE-2022-3944,0,0,2b9853ccd47902190848f88a95812c694fbbf21951edd58ca3fedf266f08ab33,2024-11-21T07:20:34.833000 CVE-2022-3945,0,0,26e69a315e7117e46986b54e044c5ee05f5d853b256d40ee5be004975f80dc04,2024-11-21T07:20:34.967000 -CVE-2022-3946,0,0,9cd213c76127b766b5dc4b8d052cd94c386c00ea098442ac1ff04fdd88ee80db,2024-11-21T07:20:35.100000 +CVE-2022-3946,0,1,64800a8af899fc02465b4ec453e17e3cc94a68ca244a8e874bf3851be00bc14a,2025-02-20T18:34:50.990000 CVE-2022-3947,0,0,681cb64e004d29032d143d18284e73a8d5442ae3ab58a1d674c0562fe20fb641,2024-11-21T07:20:35.210000 CVE-2022-3948,0,0,5290841fb098f9b190aa34f411715a0ccd3843a05ce1a26bdeffc8d5b115cf2f,2024-11-21T07:20:35.340000 CVE-2022-3949,0,0,7c6f8512a8abfa4b01f78316eae9ac430961091829c0cb65b6a7ea7ba8f4f1a2,2024-11-21T07:20:35.470000 @@ -207497,7 +207497,7 @@ CVE-2022-41396,0,0,1cbf100dab8252b6b1e9a6f4ef622626ef406aa2ff4caa7044120fcbba7e7 CVE-2022-41397,0,0,c0e9869db0b13268b06eb3421b088956793e4cd60d97884cf46f5a0f733cb4d1,2025-01-31T18:15:30.750000 CVE-2022-41398,0,0,69ef4933c7ac0d2bbe3d2169ffbca7425bcde1676b28eaf93f4fa5178e8a6f9f,2025-01-31T17:15:09.463000 CVE-2022-41399,0,0,03431e8c2d0e990b1359f18724462ed7aeccbe840e45e68c8417db2e9b358cfc,2025-01-31T17:15:09.690000 -CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000 +CVE-2022-4140,0,1,74dcf5db1e0be637332a6afe0ecd6ba057c2e832f6785f297a0b1ddfb4667755,2025-02-20T18:34:50.990000 CVE-2022-41400,0,0,b470023b601676d4a30a303d35e0a2b5766f41b951dc4f2c3a182bc32261e6f1,2025-01-30T21:15:09.157000 CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000 CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000 @@ -207877,7 +207877,7 @@ CVE-2022-41837,0,0,da976b3221763a386544255193ab24037e7b81a5f07d12269c2575a62eb82 CVE-2022-41838,0,0,546268d788f73b9fce8f7e18b2812da881102fc48279872eb03c5b56fbecaede,2024-11-21T07:23:54.587000 CVE-2022-41839,0,0,3a1cc942325f596a15dcd0130e165f62a62efe691eea7c4be7dfeed4a3948108,2024-11-21T07:23:54.723000 CVE-2022-4184,0,0,62ed9466dae96e308bcc436829687f9c68a605d214c3f0d1c004979a3c9478f5,2024-11-21T07:34:44.297000 -CVE-2022-41840,0,0,c257a46d7d4f96a8fff2e173b1a9985dfc91dc189ea61c22c2b10080dab84642,2024-11-21T07:23:54.850000 +CVE-2022-41840,0,1,50a8bd10b6f9c309b489530eee2dc1647fa36ad8fa8e6efa78b9fde77c0165d0,2025-02-20T18:34:50.990000 CVE-2022-41841,0,0,64e18e299dcd9bea0f008d0f89f38f03483022ffbb8cd473cdcc586f0897d07d,2024-11-21T07:23:54.983000 CVE-2022-41842,0,0,db7facad48c9df7cf17237976cb6b373b7f8f9d42ab4b4c8c30e765a638a15da,2024-11-21T07:23:55.163000 CVE-2022-41843,0,0,33fd763f638770421fcb523f9555ecaed6b09726189ba8764551aa55019a2824,2024-11-21T07:23:55.327000 @@ -208313,7 +208313,7 @@ CVE-2022-42352,0,0,b3bdd3dd3f49dab06d26807cddb5ec74555534836396f332cfe4c0709677b CVE-2022-42354,0,0,d67a07d5b2f198f5a2be2dfcf2897e9cf8de553e6c9ac36b6d5e03d59c369f36,2024-11-21T07:24:48.557000 CVE-2022-42356,0,0,5f2a316aae4aa18aeb9b85e1fc3c4c3ca5ee735f3273946f2165e76e49d26aac,2024-11-21T07:24:48.670000 CVE-2022-42357,0,0,dab8d6d88e46964496a8ef189a79a2e96d44b10d72e9f11a0135e92c3d145c2f,2024-11-21T07:24:48.787000 -CVE-2022-4236,0,0,e5bf677e06e701e34da13158c7524aa6ebee35c40b8139d7d124034d222b63eb,2024-11-21T07:34:50.850000 +CVE-2022-4236,0,1,f44f0e0aec09f0281c086199a0893c497a67bf353709af933de59a5c9ece962d,2025-02-20T18:34:50.990000 CVE-2022-42360,0,0,7b87cf3e51d6778c85e65b3236843cf59075f761398b36a5b81353488dbe846e,2024-11-21T07:24:48.900000 CVE-2022-42362,0,0,9eadbc21e61c55f70cbc5a3bace718af8b83637d9d7ca47b57a005d1316e0a3d,2024-11-21T07:24:49.017000 CVE-2022-42364,0,0,adf1c13810a4c43d1dd81b87fde900a65804d7425c53233dd4333b294a10073c,2024-11-21T07:24:49.130000 @@ -208321,7 +208321,7 @@ CVE-2022-42365,0,0,67105c0b67ae700a1a43232fd919b1af128d246cf4d8a14b56bfedda5fa16 CVE-2022-42366,0,0,cbdc2a47f1d57fe9123056a56fb713502c4e22cfd807589f8639821ad3dd7ba0,2024-11-21T07:24:49.370000 CVE-2022-42367,0,0,1b0b5ce1e6c43e85242e5174e13c1b521d04b28557027a812658331787a54f2e,2024-11-21T07:24:49.490000 CVE-2022-42369,0,0,892578b14e3bf67d8e406a88f69e5f15e1bc61b7c59b75ceba5469306a51ac89,2024-11-27T20:11:45.410000 -CVE-2022-4237,0,0,3293ba84b89ec343e7b64738385e8a515bad791a06652b7e3f9737f69f9354c1,2024-11-21T07:34:50.953000 +CVE-2022-4237,0,1,71e964028a5e9381fc3e6a627d6d00f1b6ab465ec940c32dd48ce5a65a3f36c7,2025-02-20T18:34:50.990000 CVE-2022-42370,0,0,24faaeabb00cef36a9bebf9855b4c5fab9c63b4f8596c99fb0872aa6c31fa425,2024-11-27T20:11:45.410000 CVE-2022-42371,0,0,86e960895390f9be7ce03264e82c490beb90ef89a2af12327c6f7e1add8150dd,2024-11-27T20:11:45.410000 CVE-2022-42372,0,0,08e8b34feb7a653f7eb6545fa58de87b2e7a3350232e52d3ca546d0f53b11b73,2024-11-27T20:11:45.410000 @@ -209941,7 +209941,7 @@ CVE-2022-4458,0,0,192c505acac2dca8dc3917e8ce2ad50b37e61fd6b24832a0220a2cc7916316 CVE-2022-44580,0,0,1853f516861af1bdf42c74118d4da1d78e165ffb9737892b9636796df575431d,2024-11-21T07:28:09.657000 CVE-2022-44581,0,0,c3574e38c9269af9fd19b1ebf323c712e1313fd8428037a97f7166891237fcde,2024-11-21T07:28:09.773000 CVE-2022-44582,0,0,ab7c8aa0b744df343c2efa6f49df3e2120ade672dfebaf27bbaf41972c94de55,2024-11-21T07:28:09.910000 -CVE-2022-44583,0,1,00802e3fe5e8d5c79d75d2a8c442637c00e06e65cc5d081ffb96246c39bf0601,2025-02-20T15:15:10.123000 +CVE-2022-44583,0,0,00802e3fe5e8d5c79d75d2a8c442637c00e06e65cc5d081ffb96246c39bf0601,2025-02-20T15:15:10.123000 CVE-2022-44584,0,0,6a47cb16261f5a8edd1470398f86011a9af92c9f9186fcc59739e048dd1f030e,2024-11-21T07:28:10.153000 CVE-2022-44585,0,0,2444819fca6202dd5f513ba043d6869c7cd739cb13c9f4a195bafc9d86534f3b,2024-11-21T07:28:10.263000 CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67beddab4,2024-11-21T07:28:10.380000 @@ -211284,7 +211284,7 @@ CVE-2022-46546,0,0,953644dfd7dcd1310feb2dbe1d7a04c8526f3ce60b1b5ecaa5c986d56a8df CVE-2022-46547,0,0,3e51b6c07353ce94b24542c0786764142a1771ff60791a20bb3ceccb1b8b537c,2024-11-21T07:30:43.473000 CVE-2022-46548,0,0,64248efcbf88dc92f8a09b35f80b85ee763643b73b2fa8350dbeca987304cfb2,2024-11-21T07:30:43.620000 CVE-2022-46549,0,0,7fe60d3b6858bbe191f518a4420ad0be9069dc69b8ef585b00ab7e20c7ebd7a8,2024-11-21T07:30:43.753000 -CVE-2022-4655,0,0,ff0f124f383830339da9f4a7c163710590476b61e8fa78587ec05793016febda,2024-11-21T07:35:40.853000 +CVE-2022-4655,0,1,bd8d686155af4c551bf4bd1177c6f87f9389e165a383504576a9b00d293e085a,2025-02-20T18:34:50.990000 CVE-2022-46550,0,0,bc5cc20200b63bba7cc7ce99207ee2a9f136ccba8514010e03709f485b043f79,2024-11-21T07:30:43.890000 CVE-2022-46551,0,0,779c0f14d348f2840326905acd59932a8ebbf1f2102078c30f0d03da86fdd8b8,2024-11-21T07:30:44.033000 CVE-2022-46552,0,0,5bffd6f496961f428fedf6678d6afda561e1d18f085e86afdac95451d78deb97,2024-11-21T07:30:44.173000 @@ -215956,14 +215956,14 @@ CVE-2023-21058,0,0,64330bb9c4249333ce6f10ddaa280396ef4bb32482959b6db5e7e9f6f3b63 CVE-2023-21059,0,0,70972c21ff5031e5a8812f2b89330f3bb3733e080c457204297376dcabb2f5e1,2024-11-21T07:42:05.127000 CVE-2023-2106,0,0,54915b7d25a40346ce2e235b5fe9b0fa20a7ab6d3baae2189ffdb54ce7556511,2025-02-06T16:15:36.850000 CVE-2023-21060,0,0,ed6a1ed343bc5908d4275aafe515b039b63037861daff961d4fd11deac6d0845,2024-11-21T07:42:05.240000 -CVE-2023-21061,0,1,7273ed70ff85a6169baa589c710a5851fd1d66a885a49beca70b97880fae7748,2025-02-20T16:15:33.217000 +CVE-2023-21061,0,0,7273ed70ff85a6169baa589c710a5851fd1d66a885a49beca70b97880fae7748,2025-02-20T16:15:33.217000 CVE-2023-21062,0,0,5e5b5d7600fd0d3dd7a9942040f4966711abc6b36e9bb29aa93767415087a9fc,2024-11-21T07:42:05.473000 CVE-2023-21063,0,0,20a4c3f6408a88e1c28159889207c238ab338761b1694db207a9f40672d7a4ac,2024-11-21T07:42:05.580000 CVE-2023-21064,0,0,f66e6a7ec4713e6a44090694f45ba9d60b4264c55e2ed80bc5bd402cbd8005c3,2024-11-21T07:42:05.693000 CVE-2023-21065,0,0,94d2bbc43c1b96f9732745485dc5f1641c6bc254138879f3df272c7166e2db6e,2024-11-21T07:42:05.817000 CVE-2023-21066,0,0,f3310930fd44b4ceafd1bc0f3a1442d00659ef92bf9c822f23789082b5e2acbd,2024-11-21T07:42:05.940000 -CVE-2023-21067,0,1,01050eb75f93c090bcbbf1a3d087f86ead1cb3cb954a6522f1f6adcb54243523,2025-02-20T16:15:33.510000 -CVE-2023-21068,0,1,261483c08947a78e25d50bbff26846bb2a8245ddf198c445bf54ba8027c9ff31,2025-02-20T16:15:33.613000 +CVE-2023-21067,0,0,01050eb75f93c090bcbbf1a3d087f86ead1cb3cb954a6522f1f6adcb54243523,2025-02-20T16:15:33.510000 +CVE-2023-21068,0,0,261483c08947a78e25d50bbff26846bb2a8245ddf198c445bf54ba8027c9ff31,2025-02-20T16:15:33.613000 CVE-2023-21069,0,0,7997a769d0fc1eb29768d5d5204d9a0da76475cb9cf6af165e778132a8be14a4,2024-11-21T07:42:06.303000 CVE-2023-2107,0,0,b37e87d1922ae828ac557e5cc8f42c5406432b2bbc0f1d675673e3290327b00a,2024-11-21T07:57:57.197000 CVE-2023-21070,0,0,2b115936a5d121763e30e349ca2d0580b34609ea9a496b2fbfe446f7bf106484,2024-11-21T07:42:06.423000 @@ -217160,7 +217160,7 @@ CVE-2023-22308,0,0,906012441499d1c849365e5400b5357dda9cc467b769670e76ddebf0ea235 CVE-2023-22309,0,0,a7231f19d4cb4ea22c4d4790a3de2cc23a6aa0b434c7b7b587091619c74b99b1,2024-11-21T07:44:30.073000 CVE-2023-2231,0,0,7a123ab9506421883b22a81ab048ba2bb77ff795874a80b8d72ffaa1959d6e3b,2024-11-21T07:58:12.077000 CVE-2023-22310,0,0,e89d325885a14d654c2cee0362e627ca7ab351551936d19e0a6836ce159a1e18,2024-11-21T07:44:30.180000 -CVE-2023-22311,0,1,7848a1fdc7b6efc3edbc4ee7ab45d31e7d98e0d770963db7959cb8df01de9539,2025-02-20T15:02:08.147000 +CVE-2023-22311,0,0,7848a1fdc7b6efc3edbc4ee7ab45d31e7d98e0d770963db7959cb8df01de9539,2025-02-20T15:02:08.147000 CVE-2023-22312,0,0,8f16bf32172036bbf9d1043ae97ca6b0cb5e5a789a3dbfc9b22e7ce5eaaa7503,2024-11-21T07:44:30.403000 CVE-2023-22313,0,0,13cb67bb3f4d7e26a2fe173a2a963218db5dc4219566bf32470782958642ea07,2024-11-21T07:44:30.573000 CVE-2023-22314,0,0,bee80a2df35df35d1b61930267b541e9f11caf7a46751f021047134245f44a3d,2024-11-21T07:44:30.700000 @@ -217515,7 +217515,7 @@ CVE-2023-22701,0,0,4d5591b4189a34b72f590a18adbc22df2acf28c65fc714c2ad02a47caeea3 CVE-2023-22702,0,0,769d3b6aec63175e143fea3b63c0d9199e41f031818f96eda054bdfc4c9cc9a1,2024-11-21T07:45:15.100000 CVE-2023-22703,0,0,b11cbe66777334b92d49ab1285216c2daf10bc1ade9e60e348ec608d69ec7321,2024-11-21T07:45:15.227000 CVE-2023-22704,0,0,3391b5e9fe8cfdb113a4335180cf222b3480dc9186971ddf99b9d7c23f514db4,2024-11-21T07:45:15.363000 -CVE-2023-22705,0,0,65973db752a75c1aefb8423eeb981dbb110113de8aa579e1b895f4bd82c26ba8,2024-11-21T07:45:15.500000 +CVE-2023-22705,0,1,af778e225555747df5c233219acb78451206239cdbd1890f1bc52e0b4eff1577,2025-02-20T18:34:50.990000 CVE-2023-22706,0,0,ebe261333ec94aa8d06d2c8f8fa51152653338e9e5613bd8d3569a6f53cb90e2,2024-11-21T07:45:15.623000 CVE-2023-22707,0,0,83b334ee529eefc9ab11f726a4a33783ae7ec49b01a932387d3ab561fdacf988,2024-11-21T07:45:15.753000 CVE-2023-22708,0,0,0bda0fb09283863451e953094b448349ab539148689b6d150d6367fafec54d48,2024-12-09T13:15:20.260000 @@ -221334,7 +221334,7 @@ CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f7 CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000 CVE-2023-27515,0,0,8dfc9617f583bdd1babe238c49e7e58612036e70ee685520461ed821ca4854ca,2024-11-21T07:53:04.393000 CVE-2023-27516,0,0,63cc8b4dfa2de06886c95f604edc887930374b8e766f7347b609a4a1d828c6aa,2024-11-21T07:53:04.520000 -CVE-2023-27517,0,1,3502cc4dc0ec46d859d221be870ca61288e9f76a4a8f082e0d50af84a00a11b2,2025-02-20T15:10:10.427000 +CVE-2023-27517,0,0,3502cc4dc0ec46d859d221be870ca61288e9f76a4a8f082e0d50af84a00a11b2,2025-02-20T15:10:10.427000 CVE-2023-27518,0,0,9baf0d487aa874353bba8cde2f44da2f0c67dd17f3eb5b570347204d068fdfbe,2025-01-31T15:15:08.247000 CVE-2023-27519,0,0,717790a336c8f9e5a77a95e0bd0274d8d47193d1a8993a7207854ff0bd8ab7ac,2024-11-21T07:53:04.963000 CVE-2023-2752,0,0,6d790d550f8804fc5c5478d21ae5ee8d7bd1da5991dfa9817023711eac8596b0,2024-11-21T07:59:13.467000 @@ -231362,7 +231362,7 @@ CVE-2023-40215,0,0,ccf51d0a2679a3484c6f7cb0fd3ff4e33ed32371a3a9e32685ce12d1f3627 CVE-2023-40216,0,0,c8eec68a4da70bdabafba12d88f23f1de14c236b7a0477667b9f540f55de5a19,2024-11-21T08:19:01.133000 CVE-2023-40217,0,0,fcb98472a84e8e26af93db20ae6c81bb896ea70f29e0d37f59355073006524cc,2024-11-21T08:19:01.303000 CVE-2023-40218,0,0,7e9ff8055b5991f0c786d5c7c55bb4061db1248def6777d5d32d4ca5de5102ae,2024-11-21T08:19:01.470000 -CVE-2023-40219,0,0,d312cff569dae579b11a2237538409084b8189381ad409b7b26a9e9c9cf4fc81,2024-11-21T08:19:01.657000 +CVE-2023-40219,0,1,420d65f82fad2c6c0a7543e46625f87769e9a3cc3fe69078034d1006af7f7b71,2025-02-20T18:34:50.990000 CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c1918,2024-11-21T08:34:14.873000 CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000 CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000 @@ -232209,7 +232209,7 @@ CVE-2023-41229,0,0,b930cdbbe88f083acef960f8f5e5450aa69114993909ce345d88d7e673472 CVE-2023-41230,0,0,a46089e009e01da52efcba60eb5616b6d85e910e61e7780908c77a324855221f,2024-11-21T08:20:52.603000 CVE-2023-41231,0,0,03a2478d352371d62f62b64999273a7bcde68a67a92faf899c818e1823e8cafe,2024-11-21T08:20:52.717000 CVE-2023-41232,0,0,5174afeb37f2c2c253baa98f5978e3dcd1a77391afe7566ba24edb6a69e68143,2024-11-21T08:20:52.870000 -CVE-2023-41233,0,0,9f3924758c4eb49007f2691bc554e0f9ba0f1addcedfec3eee11043031346a43,2024-11-21T08:20:53.013000 +CVE-2023-41233,0,1,50c4bc5420c4fbd7ddc660b4757fd8d0b1c34afe4059e1d8ad069556bfda9c77,2025-02-20T18:34:50.990000 CVE-2023-41234,0,0,4f8d2167f703a1f5d9c00b2ebe5faccb4fe754a786d66acacf8ffc5dbfbd75fe,2024-11-21T08:20:53.133000 CVE-2023-41235,0,0,d1d7e9d267f221374eb76694b55c2554466d593156003228f676adb610da8cd2,2024-11-21T08:20:53.260000 CVE-2023-41236,0,0,8efafb87f68395385e0232e90401d586717111d3a20cd326158c892e13f1ae6f,2024-11-21T08:20:53.387000 @@ -232766,7 +232766,7 @@ CVE-2023-41957,0,0,a29f516d99af407c126a5e7ad417d81ce357dcbef8ae20e5c515d3719d1d6 CVE-2023-4196,0,0,ef9c1646e137c44dab7abcf516cdc093158d8d226c4a6c8193984fb89aad5817,2024-11-21T08:34:36.033000 CVE-2023-41960,0,0,bc34f55c0365c3e902620fef0f4ca6fa370f5764b27024ab41f4fe778d27af59,2024-11-21T08:21:59.677000 CVE-2023-41961,0,0,d9eaf9a08b277b340f7d29fb515e8b334169a617c247410cfe10f782b5e55f3d,2025-01-23T18:34:03.960000 -CVE-2023-41962,0,0,ddfd42eaecd7c45420038a2470f93c7b8b9f7d6267cbd32837e17e8c62297a72,2024-11-21T08:21:59.923000 +CVE-2023-41962,0,1,8e211ae560f0b224b6dc90a762c337812a7535e5c4a77ff74c318f202d3b9783,2025-02-20T18:34:50.990000 CVE-2023-41963,0,0,c488bbe213194cd9c4226a7f83fad3df13113f5834bb9bc7fa01fced3c6de0ef,2024-11-21T08:22:00.053000 CVE-2023-41964,0,0,717405df1f2cf03c06becb18f5d6cdd82b5117004176fedd87a240e96fd3fe6f,2024-11-21T08:22:00.200000 CVE-2023-41965,0,0,6e1160ce9cf9e97c4a661d80bc713c4291ac5e919384b1f33a3ca71b6caa1a9f,2024-11-21T08:22:00.367000 @@ -233782,7 +233782,7 @@ CVE-2023-43478,0,0,b363a6d7eacf2de3df908c7040728757be0307c514662b6e0555d36436206 CVE-2023-4348,0,0,692cebc2724d39ef48703dff7796d1af38e61707ca753f487575c32468089efd,2024-11-15T12:15:14.397000 CVE-2023-43481,0,0,ea239528ecf87a0f7c130169a57a2f0e98cbfb6de044eb89f0fe88122deee4f6,2024-11-21T08:24:07.670000 CVE-2023-43482,0,0,4de30ef5cfde53322bf3771904d0488160e79381ba7f784b33cb0306a6fae59a,2024-11-21T08:24:07.903000 -CVE-2023-43484,0,0,df6a74cd16db4313c9c5d1346828ce84b53d020288b78a3f0d6337d93adfcdab,2024-11-21T08:24:08.023000 +CVE-2023-43484,0,1,9c2c1b002c8ecd72d8d86bc61ca52dd3c9635a95fc6bec5955384e6209f6c303,2025-02-20T18:34:50.990000 CVE-2023-43485,0,0,f2e756b077c55ee5d60a7820b4f35f5bbc8c268c3f52a4818a3ee3de6d1cc46f,2024-11-21T08:24:08.163000 CVE-2023-43487,0,0,da4b908218727f03580be0b88995d21b69d09331653a711975ff37d806ae1d91,2024-11-21T08:24:08.347000 CVE-2023-43488,0,0,ebec5a7de90577d8c80523e93429725f86a21a7f6c2b5819c8450ec31d4d3fcc,2024-11-21T08:24:08.503000 @@ -233791,7 +233791,7 @@ CVE-2023-4349,0,0,a113f0c16e334ce035b6008fdd7a7e84fda6de5dcd31b75f844d308d867993 CVE-2023-43490,0,0,70a8d4e2a9f0e66d5f0d4f8aa9bbf29ba9745e14090a884644c25d2720095b7e,2024-11-21T08:24:08.723000 CVE-2023-43491,0,0,5de63384fb88ba7f66b800b0456c3327a91060d3df85b7692db574848ad55def,2024-11-21T08:24:08.840000 CVE-2023-43492,0,0,7a7e359e002bd992e2c5ca74393c2e0ff956ea07b2444a5288d843fcba91190f,2024-11-21T08:24:08.970000 -CVE-2023-43493,0,0,112cf3a1ee97dde267f7a6a1ef06b6aa357c62193a4ba91821d1824bc2db6b4e,2024-11-21T08:24:09.113000 +CVE-2023-43493,0,1,ce24f1bb4356303e4e35b3a9813725be585e97951713f251a2192638265ce2ae,2025-02-20T18:34:50.990000 CVE-2023-43494,0,0,b143555b57f154e4dc948e48eaba7f7a208774cc09626bcf0c4bbaf9566a3d47,2024-11-21T08:24:09.237000 CVE-2023-43495,0,0,ad9a36dcdebd80b7326e0f7a06320c01e45cfffe1adbc65a5de4c27956532575,2024-11-21T08:24:09.377000 CVE-2023-43496,0,0,ffe1ef005f7babcd075672e6ee2de0ac82e9c4688be7aaf1d6612b5d6c21a3c0,2024-11-21T08:24:09.497000 @@ -233892,10 +233892,10 @@ CVE-2023-4360,0,0,bf776b564f3d9f4caa1d912b4d5307249bcc398bd846123f845e5bb5ceeeb3 CVE-2023-43608,0,0,6c27dbdafa55f2b7aa33c3b628ee6a7a91ecbd84b5bb3689ac1f00133224f13b,2024-11-21T08:24:27.367000 CVE-2023-43609,0,0,fb2435a70d57b18c0efee8a58bb126e64bcba03418ae3f4ec7b94648b4be8270,2024-11-21T08:24:27.500000 CVE-2023-4361,0,0,fffbd1502a6e8a4a3e57bb55356e04373dad92e0e12adfebb9247d6da916fbf9,2024-11-21T08:34:56.010000 -CVE-2023-43610,0,0,dff74ed8a22059464003d7b270c1731148485d2c28a1663c4d30b120be4ef49b,2024-11-21T08:24:27.630000 +CVE-2023-43610,0,1,3398d70884a3b75d3665e9fcf50e949d3bc1d8320e3af92db062ae0a4fdfcae6,2025-02-20T18:34:50.990000 CVE-2023-43611,0,0,c870388edda2fadd40d04f44c0e4b5df8dbf6e33dc5c1b8a0154cfcd890ffb51,2024-11-21T08:24:27.740000 CVE-2023-43612,0,0,0becea009dd3688d8312fd922863813239422d536141eb1bf18a8c3cc33b4be9,2024-11-21T08:24:27.890000 -CVE-2023-43614,0,0,8ff9c6dcf8abdd3a07113d1ec0c53e61b631c2e424df9bf4b21e1d2715bc94b3,2024-11-21T08:24:28.013000 +CVE-2023-43614,0,1,c35da460a4f57f7ca5c71f7afebb93d121ee52d5cba3265ba3fe3294985f7a03,2025-02-20T18:34:50.990000 CVE-2023-43615,0,0,65b899e8dc4bcba791d588f9a9252f8e73a24a6d6302f2d567880ae45f83a201,2024-11-21T08:24:28.130000 CVE-2023-43616,0,0,98c8c9d3d3ece2e1e2f359f9a389eb045b0e29c4ec80b9937bdec062013e3181,2024-11-21T08:24:28.283000 CVE-2023-43617,0,0,34950c338e8a0462fb56c4f9409c842609c3359ab444962c9eb93ce2eeda1fd8,2024-11-21T08:24:28.443000 @@ -235734,8 +235734,8 @@ CVE-2023-46266,0,0,81806eaa6162d2628009ed70de1b2798f644cbf4406448d48f1535898504c CVE-2023-46267,0,0,56d82f2136293ec805643b7aa2c34e057834346a4d6f8a282f29d606a8893e13,2023-11-07T04:21:53.713000 CVE-2023-4627,0,0,44c2ecd7362aa4de1a961a6fa4371a3240ed6fa84366e6d7bf5b1fbfa11dd3d2,2025-01-15T16:37:02.837000 CVE-2023-46270,0,0,0789f887abfd7ae93c1dbe57cd351d8a2da80170c7bc99a18d2256a683596402,2024-11-21T08:28:12.507000 -CVE-2023-46271,0,1,0cb5cef1216ae4571fac17acc07f7ec094b33e801dd2864185b007cd417ef1d6,2025-02-20T16:15:34.310000 -CVE-2023-46272,0,0,6a5674c01f30ce0183e1dce1cb0349944e1e60fbf99477dd2701847f7d87dbc8,2025-02-19T19:15:13.917000 +CVE-2023-46271,0,0,0cb5cef1216ae4571fac17acc07f7ec094b33e801dd2864185b007cd417ef1d6,2025-02-20T16:15:34.310000 +CVE-2023-46272,0,1,1e8ad68c251bac92ada76c50a345818fa5a32e1e44b266c487785e20e6280825,2025-02-20T17:15:10.897000 CVE-2023-46277,0,0,e192ca50b4060017d85c73fc1706fd083f6c682d8478108f323ab6790e52648a,2024-11-21T08:28:12.653000 CVE-2023-46278,0,0,46ac4ffdac079997c9016c6dbfffc7ffe6e42561a011802cecf40b1219ef36f9,2024-11-21T08:28:12.860000 CVE-2023-46279,0,0,17e25b379ca2a3fc5376c2a68c12148facaaedd8add0153d19efc2adb88f9b14,2025-02-13T18:15:34.690000 @@ -239034,7 +239034,7 @@ CVE-2023-50843,0,0,6622e0f37505b1e36dd9c752cc842fd5c0fbc267e206eb72429cb6715da54 CVE-2023-50844,0,0,a6135888fe8b45ba8312ae11cb80f2f32d312074252ff60959f7d963a5b0e55c,2024-11-21T08:37:23.790000 CVE-2023-50845,0,0,4b1de9a7f80dc03136cfa85538b309879f855db30d9be20acea70e1e0098e1be,2024-11-21T08:37:23.903000 CVE-2023-50846,0,0,9a57383847dd3059e0d75dd8eebd0419ce4772ef504971e326ebee29ff4f4cdb,2024-11-21T08:37:24.023000 -CVE-2023-50847,0,0,8af88a86a3973ffb9b180f3688093f1185c41115fba9de24528f2281cbacaa0b,2024-11-21T08:37:24.163000 +CVE-2023-50847,0,1,8e2b199dfa4dfa569e23d416b25296e0d24ade2ecff4907c2c0e8619db8bbff0,2025-02-20T18:34:50.990000 CVE-2023-50848,0,0,03098ffc01df1a6f925be974e2b8b2896eb8309e51fcdf8dbc50d422b690e589,2024-11-21T08:37:24.307000 CVE-2023-50849,0,0,d5fdca61f99f1dbfefeff38bb6cfb6fd829f36ca030c93562f4c6219bc386f41,2024-11-21T08:37:24.440000 CVE-2023-5085,0,0,c3dc096463ec9767731a311106d0ff3749acd54e0bded3788615c36bbd3edb19,2024-11-21T08:41:02.137000 @@ -239298,43 +239298,46 @@ CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587 CVE-2023-51281,0,0,13c5d72ef411be7896310c619236218fa85e3239b473c76db8a7fc7598f5af7d,2024-11-21T08:37:56.467000 CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 -CVE-2023-51293,0,1,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000 -CVE-2023-51296,0,1,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000 +CVE-2023-51293,0,0,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000 +CVE-2023-51296,0,0,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000 CVE-2023-51297,0,0,82a03c125c89e9c5feb7167bc5c79f32a86cc86d30fa01646e6efbdc926b03eb,2025-02-19T20:15:34.770000 -CVE-2023-51298,0,1,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000 -CVE-2023-51299,0,1,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000 +CVE-2023-51298,0,0,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000 +CVE-2023-51299,0,0,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000 CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000 -CVE-2023-51300,0,1,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000 -CVE-2023-51301,0,1,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000 -CVE-2023-51302,0,1,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000 -CVE-2023-51303,0,1,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000 -CVE-2023-51305,0,1,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000 -CVE-2023-51306,1,1,9abb5db728e8fe46856cf7f999df226ea525572318f83566b985a5915b4d98dc,2025-02-20T15:15:11.673000 -CVE-2023-51308,1,1,8a5cce85965c497d99411e14d7ddb84a3485b88a66065edf5dd36026ad89ef52,2025-02-20T15:15:11.793000 -CVE-2023-51309,1,1,d5a34397b2d3712a4de0493249687b8ab829c9c913c53ab0eb208f0231b7e47f,2025-02-20T15:15:11.920000 +CVE-2023-51300,0,0,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000 +CVE-2023-51301,0,0,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000 +CVE-2023-51302,0,0,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000 +CVE-2023-51303,0,0,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000 +CVE-2023-51305,0,0,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000 +CVE-2023-51306,0,1,4ee512037b5a17f44d41cb85824b3aa21cbf2013fd9687b1c54a56b2512be0e8,2025-02-20T18:15:21.527000 +CVE-2023-51308,0,0,8a5cce85965c497d99411e14d7ddb84a3485b88a66065edf5dd36026ad89ef52,2025-02-20T15:15:11.793000 +CVE-2023-51309,0,1,e8a267fb846fdf7ab7dcb6178679f00727db2db3808c8e0a0d4d14c04ce996de,2025-02-20T18:15:22.890000 CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000 -CVE-2023-51310,1,1,04555726acd1d4321ddba39dd114106b5d6b5d634e69030505aa3132d2e331bf,2025-02-20T15:15:12.050000 -CVE-2023-51311,1,1,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000 -CVE-2023-51312,1,1,24df8ac219fd57ec3572cef764abdf460dd12ed44613d62f818ae74ace712664,2025-02-20T15:15:12.293000 -CVE-2023-51313,1,1,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000 -CVE-2023-51314,1,1,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000 -CVE-2023-51315,1,1,132e3dd91521663a35e221b7a999ef09c182eb57c48d8ad573a4dc220cc18f59,2025-02-20T15:15:12.680000 -CVE-2023-51316,1,1,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000 -CVE-2023-51317,1,1,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000 -CVE-2023-51318,1,1,f5ce695c6eca3c365541aa97f79aa692177cb4b44d64fd10b094343c8e2b8506,2025-02-20T16:15:34.703000 -CVE-2023-51319,1,1,ac4116ffaf596da9295f0f7d8f0f0b2f7ec444b699d93d2c1af5af10ebdd757e,2025-02-20T16:15:34.803000 +CVE-2023-51310,0,1,f4d071c477d5fdc5cab7b5b3fa4720e6ca8a83f4159e2d11461587a7973502bb,2025-02-20T18:15:23.090000 +CVE-2023-51311,0,0,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000 +CVE-2023-51312,0,1,af0e37187ed278587c858c2f07fd240cea5d64346e1f10c5fb7311e4a0e68208,2025-02-20T18:15:23.293000 +CVE-2023-51313,0,0,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000 +CVE-2023-51314,0,0,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000 +CVE-2023-51315,0,1,93388a032dcef67ad051bc5698be424af785a597baf012fcfffa6e19240ae44a,2025-02-20T18:15:23.490000 +CVE-2023-51316,0,0,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000 +CVE-2023-51317,0,0,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000 +CVE-2023-51318,0,1,e156ff65231831e807af792d62b39f920a1b080c98fa76e62945fdf2d761f0ab,2025-02-20T18:15:23.683000 +CVE-2023-51319,0,0,ac4116ffaf596da9295f0f7d8f0f0b2f7ec444b699d93d2c1af5af10ebdd757e,2025-02-20T16:15:34.803000 CVE-2023-5132,0,0,3a50c79f3182856bf1a8f272b84346a7ecfc5aa8bca0e713ce49774805195cc4,2024-11-21T08:41:07.540000 -CVE-2023-51320,1,1,79a114082655d7bb64f646c844b066a60f0c5c8b7f89a39965390c6c7a485520,2025-02-20T16:15:34.903000 -CVE-2023-51321,1,1,fe1356f30cb97f0bf1f3b6c26e1c05f062bd4486059c682dca2bbddcbaa5cab6,2025-02-20T16:15:35.007000 -CVE-2023-51323,1,1,ed280025906fb157f30101c4ec2af5dcb4e8049994300268f8d4e929415eb7c8,2025-02-20T16:15:35.110000 -CVE-2023-51324,1,1,1297f43ed3f254c5bd52ca69a1313b239e55faa9ae9f2875d64bc52c1b4ef217,2025-02-20T16:15:35.210000 -CVE-2023-51325,1,1,d9bce55484426b97e5206f92ca8131481536ba82ebadc469adf7d081660cea41,2025-02-20T16:15:35.330000 -CVE-2023-51326,1,1,46eb96dbf29c4b2241b5562c5d43fb74ee2dcd0e7c1ee8a4d8d840d472ea0aa2,2025-02-20T16:15:35.437000 -CVE-2023-51327,1,1,5a20d74bdf0b1ea0bcb9e4e68927ac775377adad269ecd68bf8aba7a80ca8283,2025-02-20T16:15:35.543000 +CVE-2023-51320,0,0,79a114082655d7bb64f646c844b066a60f0c5c8b7f89a39965390c6c7a485520,2025-02-20T16:15:34.903000 +CVE-2023-51321,0,0,fe1356f30cb97f0bf1f3b6c26e1c05f062bd4486059c682dca2bbddcbaa5cab6,2025-02-20T16:15:35.007000 +CVE-2023-51323,0,0,ed280025906fb157f30101c4ec2af5dcb4e8049994300268f8d4e929415eb7c8,2025-02-20T16:15:35.110000 +CVE-2023-51324,0,0,1297f43ed3f254c5bd52ca69a1313b239e55faa9ae9f2875d64bc52c1b4ef217,2025-02-20T16:15:35.210000 +CVE-2023-51325,0,1,667a2d572d3e56010ed0cee43300ab295ca00f6d7d9ec057ce9b3e1df3c304f6,2025-02-20T18:15:23.877000 +CVE-2023-51326,0,0,46eb96dbf29c4b2241b5562c5d43fb74ee2dcd0e7c1ee8a4d8d840d472ea0aa2,2025-02-20T16:15:35.437000 +CVE-2023-51327,0,0,5a20d74bdf0b1ea0bcb9e4e68927ac775377adad269ecd68bf8aba7a80ca8283,2025-02-20T16:15:35.543000 CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d09f,2024-11-21T08:41:07.690000 -CVE-2023-51330,1,1,f6ddadd04f6bc79dd4ed033e5a2c587bce52b3f4671127e98010c92709f4a14b,2025-02-20T16:15:35.647000 -CVE-2023-51331,1,1,211968e4b68bfaa16cc15ac1ca70eaad44c69bc6fd42b28475e85551c06c8918,2025-02-20T16:15:35.750000 -CVE-2023-51332,1,1,1f0734dc885312d91e40d1b3167395e307e144bd8e608075edd4dd7c3f53282f,2025-02-20T16:15:35.850000 +CVE-2023-51330,0,1,e664e43a7af31a50c03fc87cdd3e67b4189e6bd4271a563ec9e5266a551a0790,2025-02-20T17:15:11.087000 +CVE-2023-51331,0,0,211968e4b68bfaa16cc15ac1ca70eaad44c69bc6fd42b28475e85551c06c8918,2025-02-20T16:15:35.750000 +CVE-2023-51332,0,1,c151beca79a66bf098a3a0f0f346ef429ee573baee252e050cd52d6e34e7708e,2025-02-20T17:15:11.253000 +CVE-2023-51333,1,1,f4af773f151d02c849c1fa93949fdf704223450e1cf38ad113c0c3c52c373c00,2025-02-20T18:15:24.077000 +CVE-2023-51334,1,1,f613e300bfb51036e7b4409b994f21852e706f98a9484d60919186bf86d03f54,2025-02-20T18:15:24.203000 +CVE-2023-51335,1,1,2eccd00df936880dcb3b6f2147f9859b385aa4a589ecea8aa4bc6a8a800ad647,2025-02-20T18:15:24.347000 CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000 CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000 CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000 @@ -241385,9 +241388,9 @@ CVE-2023-5947,0,0,098e7ff1029cb6d87b50ef695adb5f87e2adc3374937eb3401a2166bbd8cd7 CVE-2023-5948,0,0,fbd2677268b742d5db8f21fa6e16e4118508ae8f644808fe2b7f06afd363d324,2024-11-21T08:42:50.440000 CVE-2023-5949,0,0,7510afa978eb353908194351be3db24552fb727cae79bd4e452afa213104bad5,2024-11-21T08:42:50.580000 CVE-2023-5950,0,0,4ce112e27dba3b3dd95522f82cc5fd4d5febee0276cd39a8390bbc7d2ba257d2,2024-11-21T08:42:50.700000 -CVE-2023-5951,0,0,6f76e5fab74536b2e63d239ae0cb4dde40a5fa570d046ed5530119ff0e6b8aee,2024-11-21T08:42:50.830000 -CVE-2023-5952,0,0,1e1a816e5214ed2f703bd4fa6ff2e574582f4914b4dff90bbd3d6fefcb805b18,2024-11-21T08:42:51.027000 -CVE-2023-5953,0,0,e46ab422458329e4eeb7d39665102fed95f95a802207f0b9c5e275168ce50438,2024-11-21T08:42:51.153000 +CVE-2023-5951,0,1,926113101e4476a9dba9e7a111d9dea4871b87eba92f2ad19ff23bbd66797da1,2025-02-20T18:32:30.690000 +CVE-2023-5952,0,1,e435d4f4140f94818c08cc82685990eaab7920c66540d9ddc9acd9d912c017dd,2025-02-20T18:32:30.690000 +CVE-2023-5953,0,1,3d3ea956a9d05885dccbc4eabbd027dac8c5edfc3529cf4db4b56b7aff37de79,2025-02-20T18:34:50.990000 CVE-2023-5954,0,0,ac1ef91ec2c5675c7e1c3b282c6ef6b3b939a5f7987a716f19550c6af0d61303,2024-11-21T08:42:51.270000 CVE-2023-5955,0,0,cf96c33af6cc9b73b57b78012e4782149164c9aac8d93899ee8320263d002887,2024-11-21T08:42:51.403000 CVE-2023-5956,0,0,081455ccb1fc867165d2e32ce0fd09036c2e1e7e184bef4b711e9161cef17619,2024-11-21T08:42:51.590000 @@ -241545,7 +241548,7 @@ CVE-2023-6116,0,0,85a3fd1f085ef6c41245bd36d6c6a57a46ff0b8f6c7ef7f918479ce74ece08 CVE-2023-6117,0,0,b236051dc9fd988695329143bca826e2efad81490e22dca429cfb07ef02e7af9,2024-11-21T08:43:09.830000 CVE-2023-6118,0,0,bc42470e8d89ffc7a9c40bb55be64cdb3ab1b388e46948d1b287bb00331a466e,2024-11-21T08:43:09.967000 CVE-2023-6119,0,0,f907bdfebbfcac37637f5c8bdb63b2f5c6c4dcb0567ca3ec448b07963d811cba,2024-11-21T08:43:10.167000 -CVE-2023-6120,0,0,2532afbcacd9991fd810c829ee8715af96f18f283082d0c25dea0009297b6e59,2024-11-21T08:43:10.320000 +CVE-2023-6120,0,1,da84340d1c5dfa32167b534b8b7cc767f6e28717b2b703f6ed27762f28f6e541,2025-02-20T18:34:50.990000 CVE-2023-6121,0,0,c1ffe3d1aca9c6ce7e9c8405bfa8c025c65f623b025bd65fed74c641e61f3c45,2024-11-21T08:43:10.460000 CVE-2023-6122,0,0,cab51e4f436a377319b9fdff95c2df46c82a130498ea39695665da328e66a6c8,2024-11-21T08:43:10.613000 CVE-2023-6123,0,0,945d422ef5d56b423c8873dcf7c6ff717fe04de4fcc4bdaed30db49145443830,2024-12-18T17:32:47.300000 @@ -244360,7 +244363,7 @@ CVE-2024-10957,0,0,d1cb42f5761d863482eb30829593415e9d53941312c7ff44dbe5eee56f45c CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000 CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 -CVE-2024-10960,0,1,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000 +CVE-2024-10960,0,0,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000 CVE-2024-10961,0,0,4a5dff05569e8c840a1fbc59c3367b15e681c98f036051571da83eeda89d3631,2024-12-06T01:15:16.933000 CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d31c,2024-11-15T13:58:08.913000 CVE-2024-10963,0,0,88ee5c2fdd930e041e628fd88533cc2aa09098433a7f71485a3c3209ceea91c4,2025-02-06T06:15:29.240000 @@ -244377,8 +244380,8 @@ CVE-2024-10972,0,0,94ad4fe97792a860dbbbaf6ed1055424200bc83bc27354926dcdaef27787b CVE-2024-10973,0,0,cbeb6f65a45bfdf6ca686d53bee20b1187ff9c0a45640545d25c45f64f615a94,2024-12-17T23:15:05.423000 CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000 CVE-2024-10976,0,0,add1dc642ca0b3839b02b45025e0871bcc2dc4571c371fa1948c8c2b0fc1c9e1,2025-02-11T17:46:21.280000 -CVE-2024-10977,0,1,6d2fa74e2441271cd530850635b1ae5a3c8833ecad983f63c3544b6ca14fa848,2025-02-20T15:38:01.697000 -CVE-2024-10978,0,1,72fb3d471cb26f3efc482353d870432bf7129ae06ff689d70016902d4b1e6d26,2025-02-20T15:41:14.847000 +CVE-2024-10977,0,0,6d2fa74e2441271cd530850635b1ae5a3c8833ecad983f63c3544b6ca14fa848,2025-02-20T15:38:01.697000 +CVE-2024-10978,0,0,72fb3d471cb26f3efc482353d870432bf7129ae06ff689d70016902d4b1e6d26,2025-02-20T15:41:14.847000 CVE-2024-10979,0,0,c563f753316fdbc35fc0c4266561157efcd47ba87314ae829bfbd5ca249cb75d,2025-02-11T21:27:49.273000 CVE-2024-1098,0,0,975a882834838eb3bf48c2f536f6d321931f066d182e2d3421deafc25dfc3b5d,2024-11-21T08:49:47.500000 CVE-2024-10980,0,0,21985ec12d369d83f43992fef14c6cbc6da6c1d5ef9577ac04d2bad895eff395,2024-11-29T15:15:15.903000 @@ -245489,7 +245492,7 @@ CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbc CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 CVE-2024-12171,0,0,02bdcd1ee67eefd33d15b29c0f023f4ae1c93e77bdd7b1fc34ccf1ee81e2337a,2025-02-01T04:15:30.303000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 -CVE-2024-12173,0,0,4f1370f3a33cf5d39fb9681c7defbf9004f56ec2e518087913fd718e7f630f17,2025-02-19T06:15:21.003000 +CVE-2024-12173,0,1,40318b60c711aa39885ed06dd8b46aeaf2fc04d2ff227d24f115d1ef6b46e01b,2025-02-20T18:15:24.483000 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000 CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000 @@ -245532,7 +245535,7 @@ CVE-2024-1221,0,0,992589062229663edb93b0d8ce0f2928fe9cc25fcf6d182d572f9549d84b72 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 CVE-2024-12211,0,0,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000 CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000 -CVE-2024-12213,0,1,98df6fdb82f8dcce9cdcc7c0bf263347f16e89097035ec4ee4346e7d756115f4,2025-02-20T16:08:26.203000 +CVE-2024-12213,0,0,98df6fdb82f8dcce9cdcc7c0bf263347f16e89097035ec4ee4346e7d756115f4,2025-02-20T16:08:26.203000 CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000 CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000 CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000 @@ -245607,7 +245610,7 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528 CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000 CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000 CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 -CVE-2024-12296,0,1,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000 +CVE-2024-12296,0,0,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000 CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000 CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000 CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000 @@ -245688,7 +245691,7 @@ CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2 CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000 CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000 CVE-2024-12385,0,0,9021d1d140cebb7e5a9313d82a4b746bc2441f3dad59f522fa0786a000238683,2025-01-18T07:15:06.667000 -CVE-2024-12386,0,1,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000 +CVE-2024-12386,0,0,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000 CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000 CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 @@ -245838,7 +245841,7 @@ CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a553 CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000 CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000 CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000 -CVE-2024-12550,0,1,599ddfe20f39f119f4e94a38d83730af776facfe248d409cfc564431c6297483,2025-02-20T16:05:43.313000 +CVE-2024-12550,0,0,599ddfe20f39f119f4e94a38d83730af776facfe248d409cfc564431c6297483,2025-02-20T16:05:43.313000 CVE-2024-12551,0,0,d5c261bbe6b94af8441d06fcc618acf8580b5206376f9fb5b385dc9aa6b753cc,2025-02-18T21:41:17.900000 CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55adf4,2024-12-13T23:15:05.553000 CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000 @@ -246626,13 +246629,13 @@ CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 CVE-2024-13473,0,0,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000 -CVE-2024-13475,0,1,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000 +CVE-2024-13475,0,0,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000 CVE-2024-13476,0,0,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000 -CVE-2024-13477,0,1,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000 +CVE-2024-13477,0,0,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000 CVE-2024-13478,0,0,3d283885de2ff5694d473a7458eb6a9fee1962d7b2f3d84adb8d26453f66b0b0,2025-02-19T12:15:29.777000 CVE-2024-13479,0,0,265f3fc391e53c595bed244b3e7c3502077a0bb4298bb2e92ab4714dd5430254,2025-02-19T12:15:30.610000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 -CVE-2024-13480,0,1,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000 +CVE-2024-13480,0,0,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000 CVE-2024-13481,0,0,18f6163dfd9d1440b7c7726ceaa029ecf7615c66174a2f06ab95e8be286bcd48,2025-02-19T12:15:30.753000 CVE-2024-13483,0,0,36b609d73c634ce761bc3a61cf94037aa579c6e7fb89e544a11515a27c0ee3f1,2025-02-19T12:15:30.900000 CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 @@ -246641,7 +246644,7 @@ CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80 CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000 CVE-2024-13489,0,0,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 -CVE-2024-13490,0,1,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000 +CVE-2024-13490,0,0,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000 CVE-2024-13491,0,0,3901e563b54ff00b6149844edb6c3aec1c2bb14d137786d8368044d8dc0748a8,2025-02-19T12:15:31.187000 CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000 CVE-2024-13493,0,0,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000 @@ -246680,8 +246683,8 @@ CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a30 CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000 CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000 CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000 -CVE-2024-13531,0,1,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000 -CVE-2024-13532,0,1,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000 +CVE-2024-13531,0,0,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000 +CVE-2024-13532,0,0,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000 CVE-2024-13533,0,0,dca093e418f506c56c7b721bf19c66fbd6fc8408ab62d8e654c432036b784a95,2025-02-19T12:15:31.333000 CVE-2024-13534,0,0,24e878dd73461d45240baee5013d359ea0437394343be594e0594e5922b1d61d,2025-02-19T12:15:31.480000 CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000 @@ -246692,8 +246695,8 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166 CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000 CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 -CVE-2024-13543,0,1,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000 -CVE-2024-13544,0,1,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000 +CVE-2024-13543,0,0,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000 +CVE-2024-13544,0,0,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000 CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000 CVE-2024-13547,0,0,b1bf985e28e62dd9ee8a2daea2848b4acba32b136937b02955ac8251827bc741,2025-02-01T04:15:30.857000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 @@ -246711,7 +246714,7 @@ CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 -CVE-2024-13570,0,1,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 +CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000 CVE-2024-13575,0,0,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000 @@ -246746,7 +246749,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552 CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000 CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 -CVE-2024-13612,0,1,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 +CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 CVE-2024-13622,0,0,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000 @@ -246860,7 +246863,7 @@ CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae8 CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 CVE-2024-13802,0,0,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 -CVE-2024-13813,0,1,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 +CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 @@ -246872,8 +246875,8 @@ CVE-2024-13834,0,0,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000 -CVE-2024-13842,0,1,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000 -CVE-2024-13843,0,1,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000 +CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000 +CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000 CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000 CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 @@ -248989,9 +248992,9 @@ CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fb CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 CVE-2024-21685,0,0,3c4c971d45d65495f5592903972ee9cd75db6eb0dc168987da35ab904c4102e3,2025-02-19T16:00:53.703000 CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000 -CVE-2024-21687,0,1,e73c6bcb8f1514456c4ba9176c664a14addfbdb548c45aae992434166dda0dd4,2025-02-20T15:20:02.967000 +CVE-2024-21687,0,0,e73c6bcb8f1514456c4ba9176c664a14addfbdb548c45aae992434166dda0dd4,2025-02-20T15:20:02.967000 CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000 -CVE-2024-21689,0,1,46892f81d466ffededaa54f4f25d900071c01a1d5bfac907f444793fc2ee1b68,2025-02-20T15:23:21.377000 +CVE-2024-21689,0,0,46892f81d466ffededaa54f4f25d900071c01a1d5bfac907f444793fc2ee1b68,2025-02-20T15:23:21.377000 CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000 CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000 CVE-2024-21691,0,0,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000 @@ -251157,7 +251160,7 @@ CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c1 CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000 CVE-2024-24718,0,0,0bd4850cb3528e2664d36327d098a9e4583ca04b2f7a9e91e5fad6d001286c79,2025-01-31T18:23:45.550000 CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000 -CVE-2024-2472,0,1,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000 +CVE-2024-2472,0,0,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000 CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000 CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000 CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5366,2024-11-21T08:59:35.147000 @@ -251898,7 +251901,7 @@ CVE-2024-25696,0,0,d5a9136c1d8f99bf95f80eb21266c5f45a51ff0365b75c1e51382b7ec2cfb CVE-2024-25697,0,0,a267efec5273910cac3ec9498c584553301da7dd464ae170402e82473ed69618,2025-01-08T14:22:09.017000 CVE-2024-25698,0,0,d8153d0a5f5447d2ed8050d1aff648edef1b78164d821441b8ecfff2f9f3ddd0,2025-01-30T16:18:43 CVE-2024-25699,0,0,2adecc9e6c7b1072773d72f427349412dc90e94c4e67f251b1aa2cd7cacf3e08,2025-01-30T16:23:46.597000 -CVE-2024-2570,0,0,8904be72da1cc04949bb577192b9c0d2e6811b77e6cbf72d6c39d9361754ea4c,2024-11-21T09:10:02.120000 +CVE-2024-2570,0,1,f2c8b0c8e5be58ab9605cab2cf83fb7f3f1fc99037c03351618b2107ce971245,2025-02-20T18:13:30.057000 CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000 CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc54d,2024-10-16T21:00:36.173000 CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000 @@ -251909,7 +251912,7 @@ CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531b CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 CVE-2024-25708,0,0,c169d9f12e5c83634b5ad6fd76892e5d4c412c0f5e491ade778100b826ccc3a8,2025-01-31T13:27:06.877000 CVE-2024-25709,0,0,e4b0ec44272d6a266af0f61140023cf74e93b905fc1b38dc4d3a6cfeb46aa3ed,2025-01-31T14:35:45.990000 -CVE-2024-2571,0,0,b29b266277adb21ced6590b6766850aaf4a1b8696efe1124ac983a0d3d7a3e6f,2024-11-21T09:10:02.260000 +CVE-2024-2571,0,1,e582357e70f62facc4e9492592fa1228759dbdc12736beb495fabfbf81689210,2025-02-20T18:13:36.077000 CVE-2024-25710,0,0,4922d2b8c6c59484e2f96bdfd1fa1e7bfad107bb66f26dbc6d083080fea0c895,2025-02-13T18:17:15.147000 CVE-2024-25711,0,0,6b07db62ade2bc0114f28a2e5cc5709d9d183c15244fc22f9067859e0e6f014d,2024-11-21T09:01:15.250000 CVE-2024-25712,0,0,63f8849279631b5dd31f14b17e44f9ea3d88f75b6e7b1e3f66e09afe909d185b,2025-01-16T17:51:16.490000 @@ -251917,13 +251920,13 @@ CVE-2024-25713,0,0,7cb9846da4920671c42e088b26485e0952d0f913d5cb2aa4287dd0a1359ca CVE-2024-25714,0,0,5f5ec83991c8636624f4337fd8c71900ea8e4cac894cd5c5104c7c5d2e9cd5cb,2024-11-21T09:01:15.770000 CVE-2024-25715,0,0,887d8932bcfac8adcfbc6486e84838e399b323dbff1591e24e7eb0ed7512d224,2024-11-21T09:01:16.017000 CVE-2024-25718,0,0,bf6058051f29852df9a6b0e96ff2d0b68fcb7f243846d3b198a96ffbdccf9997,2024-11-21T09:01:16.167000 -CVE-2024-2572,0,0,de24d696c7ed82d8362251834c70e7fe2bca21380cdcf80af058c3bf16288f2f,2024-11-21T09:10:02.410000 +CVE-2024-2572,0,1,87613423acb47abc33271413e223cbf3de24d5677db02c2e6a8d547b5c6a81c1,2025-02-20T18:13:22.020000 CVE-2024-25722,0,0,b643febd38bb4dc1f1e9694e66460a793480bcbbe11a0215b76ee150392e896f,2024-11-21T09:01:16.413000 CVE-2024-25723,0,0,09418abdec3f5b8028050527741fc967ec29e7f200c615cc75c1ae01a568a8b0,2024-11-21T09:01:16.563000 CVE-2024-25724,0,0,e0bfae1578de6d009c2ec567f45727863a3aaa4f54ddde5da227f1c075d1beb2,2024-11-21T09:01:16.797000 CVE-2024-25728,0,0,249547664dee94486de7d24f91565612df1fd7ba5870da82cfb8177b2a0fcb61,2024-11-21T09:01:17.043000 CVE-2024-25729,0,0,3db67ab23a258a05979984a126775ad307c38690f174be37fd98d41efab8557a,2024-11-21T09:01:17.263000 -CVE-2024-2573,0,0,18749619bfe68b4fd232f3610f21ec57fdb648eb6944794773ea674a54eade8f,2024-11-21T09:10:02.530000 +CVE-2024-2573,0,1,b79b1180561c3a7fd205d80040573866ef52299a8fb246485f49ef358e1ae1de,2025-02-20T18:12:59.823000 CVE-2024-25730,0,0,85e063f99da70c01b1b3a3bbfc7f4b413bf752190780e969335d19a636e3425c,2024-11-21T09:01:17.477000 CVE-2024-25731,0,0,6c3e919119578ea97d9a9640c3ffc3eedc427ada22d3030737980e0d058696a9,2024-11-21T09:01:17.700000 CVE-2024-25734,0,0,3574c01447c22483c86f66e396d575e7bf7b614a6b4ebe187ebdc4c9a17dcf82,2024-11-21T09:01:17.837000 @@ -251932,7 +251935,7 @@ CVE-2024-25736,0,0,831650ee2b289fa09d115f05113a0521c5f85fe00e3f4a57b362a744d6e20 CVE-2024-25737,0,0,4bf6de89cebe09aa2368df8de50a16d59403650b4e336a34b7d2536eee9a53ba,2024-11-21T09:01:18.417000 CVE-2024-25738,0,0,104f8fb5616d4b0fc4a70325425b561419d44b0dc6df45cc5ada7cb95d562c2f,2024-11-21T09:01:18.627000 CVE-2024-25739,0,0,3c706a17add34350e9cf827e766f3bbf1b14a8aa3ef17092c57f8fb63d79383b,2024-11-21T09:01:18.840000 -CVE-2024-2574,0,0,d9cc20ff963ed81c94d0c72dc3875ded0c6982c2eead670b598fb51d94b2c801,2024-11-21T09:10:02.667000 +CVE-2024-2574,0,1,42ab3d86f020fc690af2a2e85cb665f1d9747c0eafe41f89be4b8b85e352c03d,2025-02-20T18:10:50.230000 CVE-2024-25740,0,0,d6d3c8770d2c76a0fc3555da9c432136eb7575e28d8f6e4a82b40609ff87844a,2024-11-21T09:01:18.993000 CVE-2024-25741,0,0,1d23ef34ccb35d014111342476db8a5b6563966ba18b74c74ec859aa07028c90,2024-11-21T09:01:19.140000 CVE-2024-25742,0,0,52bed7f896019850d6a1a17d1537a9725f1c6d4ed95ae4b4ff3c038ecb99e0ff,2024-11-21T09:01:19.287000 @@ -251940,16 +251943,16 @@ CVE-2024-25743,0,0,50c02bd6f47af4d1391f96d4d393b58262df1e4f8aead8b2009a7fda94847 CVE-2024-25744,0,0,b136b3d01b604786d3dbfab666ea457af36733ed2726033559248a8a8f7c83fb,2024-11-21T09:01:19.657000 CVE-2024-25746,0,0,2fbc2bd1ee4877f2696f835cbac1f796a8bd9a57feb82e0d10e67249ce7bd03f,2024-11-21T09:01:19.810000 CVE-2024-25748,0,0,56bb048209c050832d360f12e3e88b4a19abb70516badb42d8a32762d27c39f5,2024-11-21T09:01:20.017000 -CVE-2024-2575,0,0,d13bf77312f52544ced50446e6f94414639eecaa379c44f14ba8cae9f6dde728,2024-11-21T09:10:02.810000 +CVE-2024-2575,0,1,bca86758902227bb966bcb5114d69ceaab519e3fc2f55a9be98f345879e8878b,2025-02-20T18:10:40.443000 CVE-2024-25751,0,0,fb580ffbac566625269451e1f43f3cbc8826d1032ad28d5d28cbaa07aa67f464,2024-11-21T09:01:20.233000 CVE-2024-25753,0,0,212cb4d11c4ea5393e35576976cb22a20b28a0598ff81717740bd5ec65ca3ed4,2024-11-21T09:01:20.453000 CVE-2024-25756,0,0,92898c31ea6fcedcd1267a1bcae650b419c641858f92b17b698db23c897ae92c,2024-11-21T09:01:20.683000 -CVE-2024-2576,0,0,a3b6546e58247abe9bcbf63e1b2892b257c2f26b907c9321f4c8eec89b5f1888,2024-11-21T09:10:02.960000 +CVE-2024-2576,0,1,9eafb3169bae20824c696ba06690f87c921596851d52943fc02b2607ce6df77e,2025-02-20T18:09:56.283000 CVE-2024-25760,0,0,c45a46352a5d67e1141c582ed464c0b6537f04649b66b954625542797a253143,2024-02-27T15:15:07.820000 CVE-2024-25763,0,0,b88e8c350b416b345655932a9f416e922f06fbf90349fa5914aec08ad9918eac,2024-12-06T21:15:06.113000 CVE-2024-25767,0,0,0ca78670771c5475ecaa5b22e5b07acd76b8ce6bcee60635d4c63930e9338774,2024-11-21T09:01:21.100000 CVE-2024-25768,0,0,ca5e5fafb79a5045a2f311eea8b17b095a90d33f4f213631285129e72bbe41c9,2024-11-21T09:01:21.313000 -CVE-2024-2577,0,0,0cffc6b89093ad2aec228544183866929252f57ef89cf6d6524c201756e21d21,2024-11-21T09:10:03.103000 +CVE-2024-2577,0,1,4e8f0d0dfeaf2618ccca4cc1b72f717dc0c6272eaa249ebc2648013033edf451,2025-02-20T18:09:43.090000 CVE-2024-25770,0,0,398f17523c9506a877868692f911a4e483227a4dd1226854f612f5460a815c77,2024-11-21T09:01:21.520000 CVE-2024-2578,0,0,dcf3a8c7eaa2ed6078005c88780e68cc6d17ce19d2e3cc6e2a9c1f77cd939559,2024-11-21T09:10:03.243000 CVE-2024-2579,0,0,f36838f8c9e0fe4fa638d23b3b6348547666dfbb79b14e037d8d241191eb52f7,2024-11-21T09:10:03.367000 @@ -253579,7 +253582,7 @@ CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fa CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000 CVE-2024-27728,0,0,46e06ce272ce05b5accc64e25080f982ab4dc5a49c281203dbe76629733a8fd4,2024-08-20T14:35:06.747000 CVE-2024-27729,0,0,809fcc66d1703da695f3fdd07183b33a76080add392f01a1abb9d8a582f159f5,2024-09-11T20:29:52.477000 -CVE-2024-2773,0,0,018fb490a9d26494d921abab57a48493b2cfc80bcef8c4ecda213f042e19cd06,2024-11-21T09:10:29.120000 +CVE-2024-2773,0,1,2cd7d672e838d27a7fd1a99babec2dccf70e5ef0c810c5a549991f91ab554ab9,2025-02-20T18:26:30.320000 CVE-2024-27730,0,0,acfcf7485c8d77fdf14cfede383a631f0141a2fb98231e83b41705b53ce22b1a,2024-08-19T13:00:23.117000 CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a12b,2024-08-19T13:00:23.117000 CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000 @@ -253589,7 +253592,7 @@ CVE-2024-27743,0,0,8a8023dce84e20698a8622f127a9a4605329e9ae56a693b1b628391bea5a5 CVE-2024-27744,0,0,d87bcdd72cf7cf7c0ffdb2aaccde30128c133219c9b50f003c292157283c3c73,2024-11-21T09:04:58.937000 CVE-2024-27746,0,0,cccbd29f894f9698774bcae5e4bc2377fa7c94e3f6464de4b19ea803ef2d352b,2024-11-21T09:04:59.170000 CVE-2024-27747,0,0,730bf8bc21e4bbd04a9fa6e13239843c2634744b55e747c9304ef4f250570fce,2024-11-21T09:04:59.400000 -CVE-2024-2775,0,0,cf67f004e139a119a0ccf197f65b74d8e84079346aff80fb2aa16d01dbd621a2,2024-11-21T09:10:29.380000 +CVE-2024-2775,0,1,a489e08525c2a6b7e1747c8c55d6b25d8f750fc079381c03461485aee5242c66,2025-02-20T18:29:08.757000 CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000 CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000 CVE-2024-27757,0,0,da813ae164b43a62f4abf9ccd54f7d6818fa328eab81f6c5f191e6a935f228c7,2024-11-21T09:05:00.087000 @@ -253610,7 +253613,7 @@ CVE-2024-27774,0,0,307f48a7716a730e60d75be64dea775aaf45a608fbb3ab8fba2c3652139b9 CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000 CVE-2024-27776,0,0,ef49ef17c1210e0ed2c1ff489a27f0662db66dc8a6e90113cd624459aa34be3a,2024-11-21T09:05:02.433000 CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000 -CVE-2024-2778,0,0,da9799ba1a896260f3966e85cd8ba6bdf1155e8b3eb8fb7ffe9ea6d0361cc9d7,2024-11-21T09:10:29.870000 +CVE-2024-2778,0,1,3f1276203f90b009e4c7f6d1e7f79cb2399150023bd01e1e305fa9cf1af8da84,2025-02-20T18:28:46.003000 CVE-2024-27780,0,0,f04cd8a4518fae52b47e1499947545d117e7ab549094d2b1c1a46aabc5c3aa05,2025-02-11T17:15:21.850000 CVE-2024-27781,0,0,0130e91964b45c066f777dfb4fe85552f6a357216c61f934c4b42ddf6711019b,2025-02-11T17:15:21.980000 CVE-2024-27782,0,0,b01afce97382f5347b598b12017d99ef6ba8abe65ad6d5215e9994d037f58038,2024-11-21T09:05:02.573000 @@ -253933,9 +253936,9 @@ CVE-2024-28109,0,0,1eccc18b2c79a7ac7c54d045aea775d6dfc7e6339edc2544d6cfaee6e307e CVE-2024-2811,0,0,7ca649efe599a5e9071e040230504b89a79c0c012685e27d28102b0fe39088dd,2024-11-21T09:10:34.833000 CVE-2024-28110,0,0,02bed29e56bb2de858376e909bccd6140b6410e0e47c817033bde5090de34af9,2024-11-21T09:05:50.160000 CVE-2024-28111,0,0,099cc0d37be85ae64372808397b692b5eba198e1e4d4fb2a3d8b654e7c3d3b33,2024-11-21T09:05:50.300000 -CVE-2024-28112,0,0,6392a4bd3c2c9ff4058d8417c21cbb729ef04ae5623dacc788aba6d2230d3901,2025-02-13T17:12:42.737000 -CVE-2024-28113,0,0,242345c5a7c05643c8552ec8949a72af78cfd10b31789018575b3b5bf3509171,2024-11-21T09:05:50.570000 -CVE-2024-28114,0,0,1c68ef300c720fd0e2779aa4d4bbc4e06c19751805537132151bdc1431bf65ec,2024-11-21T09:05:50.730000 +CVE-2024-28112,0,1,9b6562d0b8b8b962701b0e06a1d6d6d6ca3185d1b8abe09821d679f218da596d,2025-02-20T17:25:58.783000 +CVE-2024-28113,0,1,66814e01c7b9dbe9b678d1cf4f03347bcea5245869cfc273cd6eb8e88b8aa832,2025-02-20T17:08:04.250000 +CVE-2024-28114,0,1,454d90cdd6fe951b8369afca9dd6491b9986e2f889f5972dda9e047bac5f1471,2025-02-20T17:18:20.863000 CVE-2024-28115,0,0,22c183804756e395faece574c368d4cae136c9c5ac642ca5fa899dd4c72bdc38,2024-11-21T09:05:50.867000 CVE-2024-28116,0,0,06ab2acc19d3b1b085641d8b752eae550641fce1928137c9f5fc8bf2298f4ec1,2025-01-02T22:57:51.510000 CVE-2024-28117,0,0,25a818d5b218e308783785ed799f95754af9a77920e6452a88595579929a615b,2025-01-02T22:58:56.197000 @@ -254094,7 +254097,7 @@ CVE-2024-28303,0,0,cc9962bb9c810b91c2e702a1cd75dbbe01254ddcbe7ebada5a07f031ba243 CVE-2024-2831,0,0,46af6348b329d2dfc198fe1539e3605e6e4c554559dbe5d1d756cc0cf6bb1a4d,2024-11-21T09:10:37.903000 CVE-2024-28318,0,0,a3097b47a933abcb0bedd806254eb8371d5cdbce9b80173dbc5f3461847aae12,2024-11-21T09:06:10.323000 CVE-2024-28319,0,0,adbb9262fe095c1ee41b752e8e7ce767756f12f9e01c77d91fcf8570d7a4e12e,2024-11-21T09:06:10.557000 -CVE-2024-2832,0,0,5d907d9ba66f185faca0a75e9347295f2d6eb86c36962ff89343f7ac82cd3cdd,2024-11-21T09:10:38.020000 +CVE-2024-2832,0,1,8e3577c0947f8baf9d745f1e687966da954c57f14f7581913b291934890e1425,2025-02-20T17:22:38.917000 CVE-2024-28320,0,0,156b627473e5ac6bcd288f42ccc346804a8651dfc17bef3f6969a7ebea1ce1a6,2024-11-21T09:06:10.710000 CVE-2024-28322,0,0,4d8f57dcf95c839919bd19e58d706ebb428b316858edbbc8a9f943ea2521b9e8,2024-11-21T09:06:10.940000 CVE-2024-28323,0,0,9e5e2a70f2e5e23491acdbf55cb239ce131de5927f67f0ce1e28bc2023e2002d,2024-11-21T09:06:11.183000 @@ -254760,7 +254763,7 @@ CVE-2024-29244,0,0,10592a85c5d4647480056a5bbd0b67225862ce6c23f623418cd1bca09ea83 CVE-2024-2925,0,0,08a688428b1cf91c81dd53f1f81a26bc2648cbdabba0669e09c3c551848cd6da,2025-01-08T18:28:36.057000 CVE-2024-2926,0,0,18353582fbf60ea48ced69d4190ccb60f0390ef67dfa3f20a639890b23e716a0,2024-11-21T09:10:51.370000 CVE-2024-29269,0,0,59344950251fa21a0e7c78785a2aa3fcb549293d2bf33594b54e6b598043aea6,2024-11-21T09:07:53.570000 -CVE-2024-2927,0,0,03a7365e8e4d348218dde20ddc39fe906873932323b37259861ce99ea9e8e4b5,2024-11-21T09:10:51.553000 +CVE-2024-2927,0,1,657ce22cd5ecaec297d48bd8ea785372c7f7e333cd5f7606c6b2e73d32346b72,2025-02-20T18:53:42.533000 CVE-2024-29271,0,0,37f926466d04417e896efefe23e469b02c33926c2512f94216987bab3c6b9581,2024-11-21T09:07:53.797000 CVE-2024-29272,0,0,2856fc70b0ec5cc9b3179f269199b1b80194795a938f481175966887300de617,2024-11-21T09:07:54.027000 CVE-2024-29273,0,0,e88c38979e6a8cb440359a757929c3c3768beb837dec53069b260cb2536d1e3b,2024-11-21T09:07:54.247000 @@ -254794,7 +254797,7 @@ CVE-2024-2937,0,0,10c97f18fa847858ff544d31a1bbce732f86937b7f371f3c3318a5bd104ab2 CVE-2024-29374,0,0,3c9dcb393dadb2eef429924e4ab497db696f80f75e2ea5168ce1784d3940cae1,2024-11-21T09:07:58.040000 CVE-2024-29375,0,0,eae7f37c7536d2abe6de97e5c3f25b30f69651dd714d2404d06b4e6ac9373606,2024-11-21T09:07:58.267000 CVE-2024-29376,0,0,18e37db27049adb98aa236244a0509330fb220c59ba9007f64ad7afe95b197ae,2024-11-22T15:15:06.440000 -CVE-2024-2938,0,0,088a0b429cea7c89040ce660e7b711e5f5081c30a305b078ed3d3c59164c5e42,2024-11-21T09:10:53.177000 +CVE-2024-2938,0,1,7b2acb4a8c3102ebbb7a51612bc2d0e2030ef75d7eed8fdbe4349ac523679a1c,2025-02-20T18:38:08.680000 CVE-2024-29384,0,0,37b8aaab42a5fcf67ce4a959be3db82cf960d74412bf273fd4f14e5f574d3f2a,2024-11-21T09:07:58.653000 CVE-2024-29385,0,0,379560aa263a88d8a2172d50f1080a233949e14f3a947946f4ae7f79bb2447ff,2024-11-21T09:07:58.880000 CVE-2024-29386,0,0,fd0e19b44781b45be87bf3d1b7742f73d7b3002fe0c467975f0bb9cd268f3f22,2024-11-21T09:07:59.103000 @@ -254808,12 +254811,12 @@ CVE-2024-29400,0,0,b60e49df326991eb27557ce166dcd99358995137b6ae59e95d7fffbbd0b37 CVE-2024-29401,0,0,32400f36889e84c9eb29bf3619b3dd286820f63d644126600928028e512d6d8d,2024-11-21T09:08:00.460000 CVE-2024-29402,0,0,823440ced7da8e7d0a8b3af16f5a511cd429be38a31d64a72a1bb56686617b9b,2024-11-21T09:08:00.663000 CVE-2024-29404,0,0,8e0768ffa0e6271c10ef5a904f790cba861a6a3d32897c4a1e9132b2e0d48d5c,2024-12-13T14:15:21.740000 -CVE-2024-2941,0,0,3e71967aa0c4cbd6af2eecc6a53b210ed6ca835a6b57f301721a578e1f34e48d,2024-11-21T09:10:53.607000 +CVE-2024-2941,0,1,791b6be749f54c80a94b45470542c13f79a740bb4377f7a50b4bf078bcbf68b1,2025-02-20T18:28:58.243000 CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000 CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000 CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000 CVE-2024-29419,0,0,2f3442ac6427a352cbbf9021272e009750360630cf456587e3262353974b9774,2024-11-21T09:08:01.520000 -CVE-2024-2942,0,0,c582b913b7e1aa03026ab0af4662fd77534dacff2215aab90e4e0f0fc5a28b07,2024-11-21T09:10:53.753000 +CVE-2024-2942,0,1,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000 CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000 CVE-2024-2943,0,0,dca16f8713e0f1bd75fb8d30a5211fbafd09ffd45538f6138cf1e61114441d88,2024-11-21T09:10:53.903000 CVE-2024-29432,0,0,ade0c38d544c4d9d932c5077e1bc9211169c5c1f27ec5bc2376eb60f136730e7,2024-11-21T09:08:01.873000 @@ -260959,7 +260962,7 @@ CVE-2024-37358,0,0,d63f36f666a30bc5a531bdee61d9493741ce80a82a2db30dba675779712c5 CVE-2024-37359,0,0,0164b4be005f853818bcdcce258948ef3b9e1daade18f9e2f8fca5b602fd2996,2025-02-19T23:15:10.330000 CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000 CVE-2024-37360,0,0,a4091fe21f26d9058b42d48095351e79c48d46ff5ddb54aa2e6a91e3943ae007,2025-02-19T23:15:10.537000 -CVE-2024-37361,0,1,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000 +CVE-2024-37361,0,0,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000 CVE-2024-37362,0,0,bb8cf118a60dd5876d1853971fb911924b6e1d70593c134cd474c796067a2140,2025-02-20T00:15:19.630000 CVE-2024-37363,0,0,82ca42c41eab0f0de2c367f2c6182f5bcfc400fd0a5fa6cd33611ca15fd803e3,2025-02-20T00:15:19.750000 CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000 @@ -267979,6 +267982,7 @@ CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fc CVE-2024-46922,0,0,6bdd5d60ca2de902a066d900eb3f1a02f2bc8961d2c788d1e656cf659ba11e92,2025-02-18T18:15:23.653000 CVE-2024-46923,0,0,a9a48683084983e354bc1f2a4a7b5f585943d9f414289960054fde2cd8cee181,2025-02-18T18:15:24.083000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 +CVE-2024-46933,1,1,57ccc07d56265bc523d2c786977cdba52e4e908b0583314595a03ce4983846f2,2025-02-20T18:15:25.007000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 CVE-2024-46936,0,0,8b90383cd17b05972139dd51260528d7de429165343a27e0f637b90d1d54a91f,2024-09-26T13:32:02.803000 @@ -268106,7 +268110,7 @@ CVE-2024-4707,0,0,e65b188ea06841988570af59fea3d47c9f9ac747dd0bff4b49dca436b75799 CVE-2024-47070,0,0,f44cb16339f89c133e15084d069c0fb846144ea38144e388a800586a53fe0e83,2024-09-30T12:45:57.823000 CVE-2024-47071,0,0,ba349c35770c0b38461f4a8cd0cb017eb80bd299da2b0136e08a2f2a4f3af1d6,2024-10-04T13:51:25.567000 CVE-2024-47072,0,0,5396eeb2e43ea0b6080e1687e9e26b1d765ba3b900cbaf26034407d05f09195a,2024-11-08T19:01:03.880000 -CVE-2024-47073,0,1,c54d6f2f172da9b4086ba207e2a3af6a5ae26482e1c467e6988f73b19a51c862,2025-02-20T16:20:40.547000 +CVE-2024-47073,0,0,c54d6f2f172da9b4086ba207e2a3af6a5ae26482e1c467e6988f73b19a51c862,2025-02-20T16:20:40.547000 CVE-2024-47074,0,0,5945c0ec22658edf552da4d4d0e2c77a971cac91f2ef7f591a767b9f728bed9b,2024-11-12T19:52:38.023000 CVE-2024-47075,0,0,a2d6efb1d41afa02c7ea509cf6e92889c9a139c99ce90d9a00872aa72d65ae14,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,66607a2d6fa007363ac6549c2a23f1ab8af8f0bcb4165cd6338f82d994cf0c10,2024-11-21T09:39:23.823000 @@ -268855,7 +268859,7 @@ CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d4 CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000 CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000 CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000 -CVE-2024-47908,0,1,b8a01f67ef29d1d76d6b0a947bada6666fc9b15d6e0aef7780ff896b88de7611,2025-02-20T15:57:06.850000 +CVE-2024-47908,0,0,b8a01f67ef29d1d76d6b0a947bada6666fc9b15d6e0aef7780ff896b88de7611,2025-02-20T15:57:06.850000 CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000 CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000 CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000 @@ -268868,7 +268872,7 @@ CVE-2024-47916,0,0,33932b79d79c6af0ee005a6e7fc2e2bb088bcfe0a7b5481ded4f6ce2add3e CVE-2024-47917,0,0,5d5a6f10963abcbe327d324b4c53887826a237fdec53414fa77d2afb0dfeefe3,2024-12-30T10:15:06.067000 CVE-2024-47918,0,0,7530f8d68575d125182fd384c344672ae824cc84fb94040d19cfe95a710875da,2024-12-30T10:15:06.223000 CVE-2024-47919,0,0,3c343ad94fed5f2ae64fca9e5ca3fc0ac76c601fd581311320da380cae3290f2,2024-12-30T10:15:06.377000 -CVE-2024-4792,0,0,fa6e5afe18217f009cd2de1100fb67a7f283ef61d98ff61cdde102013614a3ef,2024-11-21T09:43:37.300000 +CVE-2024-4792,0,1,b274d57acca1d4c65fde4169255e0e2cbec1f6e46d5c18f3d8dae47f042f2868,2025-02-20T18:24:20.357000 CVE-2024-47920,0,0,84b8f5e52464f0feb19d316f587baa724342453c3a4ccb060b2f042060571164,2024-12-30T10:15:06.510000 CVE-2024-47921,0,0,71c0fd921096ae2d507a35918bc61daeab2b73777d88280d4597f4b89e65ab47,2024-12-30T10:15:06.643000 CVE-2024-47922,0,0,0a73ee942d238b1c4a3410a96f82d4af69655244be23fa2bc97c214e1fd00637,2024-12-30T10:15:06.790000 @@ -268876,11 +268880,11 @@ CVE-2024-47923,0,0,69fc6b278e017fcedb7e46f43c40c2a7575855810ab2798afaa101788f373 CVE-2024-47924,0,0,5e9fdcc1d6f6368ecfcd2003d54cc5c9ae067e5e908a91cef46fb2536076e8d3,2024-12-30T10:15:07.090000 CVE-2024-47925,0,0,e85657cf2064d6c6e6af79febd3acfb5604d99d861da18ed64400f723839f9de,2024-12-30T10:15:07.233000 CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861dde,2024-12-30T10:15:07.380000 -CVE-2024-4793,0,0,a6ca6dc2e5c47daa16d59954e19a82bf00c36bb6db82d6b1c1e23c1f1df319c1,2024-11-21T09:43:37.463000 +CVE-2024-4793,0,1,71c105dd8a23544d38a6828e9fb69e3f3c6b237924652b6cd022ef685b41711f,2025-02-20T18:23:45.077000 CVE-2024-47934,0,0,c5ee21e51979d89f537acbabceb77f32a9e51b9036a475c6fa323918ce911a01,2025-01-08T03:15:08.550000 CVE-2024-47935,0,0,dda26a62a7bdc994f9b4a9d9391e631773aed6ff22c30899552af9731fa1f71a,2025-02-17T06:15:13.053000 CVE-2024-47939,0,0,56807ff489784cf4fadb2e00da7b797597c1ced2e2c98f8bd3c06e8fe447a672,2024-11-01T12:57:03.417000 -CVE-2024-4794,0,0,c8bbe767ad72c9235212e11271c46c761e04d6a9b46861dabd15f61ddf88f000,2024-11-21T09:43:37.600000 +CVE-2024-4794,0,1,d08d4c149975b67912d030422dddd09703cb9e1751aaae9789bc33f4c754cfb1,2025-02-20T18:22:57.657000 CVE-2024-47940,0,0,13d7c32b7f73c4e4fb7631fb34c565a5b9a53b3818e0802f4a7c760b1b5809b8,2024-11-13T23:14:54.567000 CVE-2024-47941,0,0,e46ed4e38ae9d62f777a8865ae6eefdbc32a15f239d52d25d160960a20de831a,2024-11-13T23:15:09.783000 CVE-2024-47942,0,0,099064c27c2b916cca22aafe567708372c6ba9a730970a2887bf6a7a7c842eca,2024-11-13T23:15:21.497000 @@ -268891,10 +268895,10 @@ CVE-2024-47946,0,0,8eff08d83a0e5f81c0159854fd0287a2f79c269d6589402493189cd9869f0 CVE-2024-47947,0,0,f24b791cf36da926e8c9239dfd41faa528b16583cf9b1b9f83aae3c1b70b6a1a,2024-12-12T16:15:16.417000 CVE-2024-47948,0,0,517ff2cf40b380f17f0ca0cb700d9beda797d40f6236e57145e952b4be3c000e,2024-10-11T19:56:44.863000 CVE-2024-47949,0,0,c7868bf3f997ce1e01baff6d85be7f51aca23f28e73102f98ffda228afc78456,2024-10-11T19:57:06.207000 -CVE-2024-4795,0,0,874142283439f7d65325bd0714cbf0599f4b631a02f97bcc512f2aca94da1495,2024-11-21T09:43:37.747000 +CVE-2024-4795,0,1,dd2d486ba609ba014c71e05c2e9b9a1f0df6b4f09397829abf4a2ca66693154c,2025-02-20T18:22:18.310000 CVE-2024-47950,0,0,0b353a6b6eb79af020c7980a95c5f964a98e13a84e61e2385f8d2f3761ea8661,2024-10-11T19:57:16.883000 CVE-2024-47951,0,0,fa9da431d5a464d9f4e4eb5097d2fbc73ddb9c3ea25da29b847729c36d10632d,2024-10-11T19:57:58.937000 -CVE-2024-4796,0,0,9fe80a6b316d6ce6a66092be59e4d47fd759d1417eb006688a5ff4cd8243d1e9,2024-11-21T09:43:37.887000 +CVE-2024-4796,0,1,ceb41063676ba57502406a29370821fecb656631d7f7fe4124aa1223c9480590,2025-02-20T18:21:43.983000 CVE-2024-47962,0,0,7b284d3a92b94be931f2eddf9f677773a3e8626787ccc225294ba67314d2b840,2024-10-17T14:37:59.900000 CVE-2024-47963,0,0,c1d47e4c90912a69dddce2215d20fc406312f25b6f4d5e4a1283028200326719,2024-10-17T14:37:38.160000 CVE-2024-47964,0,0,1ca5abc22fa60a593d5a5c58fc5b1ab3626f0f4e8f5f5210e57c100462c0c79e,2024-10-17T14:37:25.183000 @@ -268903,7 +268907,7 @@ CVE-2024-47966,0,0,edabeb1f7aeb7f8d00936bad7786e754c58a555de2d30879c269718988a10 CVE-2024-47967,0,0,97181f7ea9a6a74768e7203e4cedea30d4dac4b4e08e4adb3b56a5fca9107b45,2024-11-21T09:40:20.430000 CVE-2024-47968,0,0,92f4d9082565d49a7d36858256cc5dcc945a5d5167050a34834e7aa3ed3bc781,2024-10-31T13:35:11.047000 CVE-2024-47969,0,0,50df27d200744eb6ebefad1e85f9b5d315d093a4f2882287eaaf2a22816b67b5,2024-11-01T15:35:18.530000 -CVE-2024-4797,0,0,6b1cd638f6d04fb063f470a36fe4df3258deaf0f92b353a15b275b2daa26fe47,2024-11-21T09:43:38.033000 +CVE-2024-4797,0,1,58c8adf8ba064ab385be3bf057d0161679f7cbfbe471cec4ff7dfba3bff39202,2025-02-20T18:20:28.093000 CVE-2024-47971,0,0,76a6ff426f8feb99ced2cb58b38af148514deb9d524fe0d304f2d094be2b7d42,2025-02-10T23:15:14.900000 CVE-2024-47972,0,0,13e18a497c1f4803a99c95bb10bb80cbed18788d72842abcf844f7182af14b78,2024-11-06T17:35:35.073000 CVE-2024-47973,0,0,4c755251fddad4f39a2e7e0c2967304daa922575998c42fd2fc2365294c3e592,2024-10-10T12:57:21.987000 @@ -269005,14 +269009,14 @@ CVE-2024-48150,0,0,7e0e8a001062b532c3059fdc4e866d0a1df7baf74eecbf43787dc95e0441e CVE-2024-48153,0,0,8f8abb4c772e2c722ff428fe00187f9b6c882572e02c4e3368b92a462f733b63,2024-10-17T18:35:10.707000 CVE-2024-4816,0,0,fef5824bd2dfc2b3cc7b7819e3a058275a15a939e06187fc90b4f9ac47eddd43,2024-11-21T09:43:40.753000 CVE-2024-48168,0,0,c8182ce0d3356b936019874b976817ca2e205233549304053f6c152dd63c77c8,2024-10-15T16:35:11.240000 -CVE-2024-4817,0,0,69b54e13904730a2cb8b3640e98d901bcd198715db2965178e6e36fa08e9e5ee,2024-11-21T09:43:40.890000 +CVE-2024-4817,0,1,362e43aebff5ee28d84d958b975850127943d4cd09b7a902dbf00fbf2f893eb6,2025-02-20T18:18:32.357000 CVE-2024-48170,0,0,34fd20d51f74a2ecf2d8d3a06f0137fb8961ff5f329c5a6acaaa7ddfeee73779,2025-02-18T20:15:19.797000 CVE-2024-48176,0,0,361e37561a50782b7c3bb1ddcf565a9526e0808df3a2cfee43b6842d60dab4ca,2024-11-06T18:17:17.287000 CVE-2024-48177,0,0,b59cc1c2e42f675a1362418899fda46dd8119ec25122c12b9138beae75e838dd,2024-10-30T17:35:11.637000 CVE-2024-48178,0,0,ee85880b14f6d7dc4a557e98498726e030c1ccf5636d6ad1b49925337896afae,2024-10-30T18:35:13.637000 -CVE-2024-4818,0,0,f3b85377e88831254803419a395ee90c953d4c15d34492e90643001c75c98f7e,2024-11-21T09:43:41.023000 +CVE-2024-4818,0,1,3b19d81ce8815dae9a3a9471bfe72ca31589d7886430a88e8930cb024af1df62,2025-02-20T18:17:41.877000 CVE-2024-48180,0,0,5bf52bf080c52c948152f3a64d4613154e737bb0c20dc350307b8dd087f76967,2024-10-18T12:53:04.627000 -CVE-2024-4819,0,0,1247dc61bdaa76c8e596582ad21ee4b87d1a8f5d40d3089e857ed45c72c58259,2024-11-21T09:43:41.173000 +CVE-2024-4819,0,1,ec052c1aa23b9d0a3c096af8b6dfa6395ffbdb8a7fd809062ebaf27467ab1baa,2025-02-20T18:16:52.500000 CVE-2024-48191,0,0,56ec2e0a18b5e8325d7def2b6a594f02e85c60e9c19e3ae6cfc636a431a82a33,2024-10-29T14:34:50.257000 CVE-2024-48192,0,0,a310388b880b5c2a74a62b31f30e0e2c6d3433813b6a8227dba77259ee50173f,2024-10-18T12:52:33.507000 CVE-2024-48195,0,0,3a0243d8ca14eea1c8868c96910904894da328ee0146c36695cb41bdc0787fd6,2024-10-30T18:35:14.433000 @@ -271840,7 +271844,7 @@ CVE-2024-52291,0,0,67366554fa12fc5f80ea7a37ab4efbcf755b65176915cc467a885e5d178f4 CVE-2024-52292,0,0,98ff7782d74c8a880b21aa3925ef392e3d7f9afb5fb086d700b2918ea0d38572,2024-11-19T18:27:21.567000 CVE-2024-52293,0,0,48995c1833d437873320d2a00d4716843128fee61b180655a95bba4546c3a839,2024-11-19T17:51:39.460000 CVE-2024-52294,0,0,6292d16468fc827dd6fc5e9bde5041230ca83aa97d2fa7a45b6fdf7131f4357f,2024-12-30T17:15:09.467000 -CVE-2024-52295,0,1,acf2270c494b9d0a06ede4aec3f02a8feb72be5c0ba92ae2a0788122d05c2dd9,2025-02-20T16:21:26.323000 +CVE-2024-52295,0,0,acf2270c494b9d0a06ede4aec3f02a8feb72be5c0ba92ae2a0788122d05c2dd9,2025-02-20T16:21:26.323000 CVE-2024-52296,0,0,b562f18595b8ca53024157f705b18f7c73f8b643fe6d08b20dc5b815792285b0,2024-11-13T17:01:58.603000 CVE-2024-52297,0,0,5528a19c9c06652e4abd378b7e62659078889b6d0c1cac57d71cfe9d52fe1e73,2024-11-13T17:01:58.603000 CVE-2024-52298,0,0,0e82a2c04d492598179d5deb8d7d99c3d515ec084ea8200a762f2512cbb5ddcf,2024-11-18T17:29:27.170000 @@ -273645,7 +273649,11 @@ CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cf CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 CVE-2024-54951,0,0,1856b28c2c5a142d99515b7fffdcacc1f630ba9c318f4cffa13c747e66dec9a4,2025-02-14T16:15:34.060000 CVE-2024-54954,0,0,ea2e7989196e0ca78538061e8245a722c8247faafc7a9c565c651ca357e96580,2025-02-10T18:15:29.663000 +CVE-2024-54958,1,1,6aefd21a1ce1eefc4b610009933b888ea2941a468b242ea3647f8112e084a691,2025-02-20T18:15:25.187000 +CVE-2024-54959,1,1,23341c755499a41e921c677f79b9e21a0cb33bf6d220ba3431707bac926a67f4,2025-02-20T18:15:25.317000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 +CVE-2024-54960,1,1,cba4c300fef202d9ca91804fc0fbd38a7713acb1de2fdd77b89a749c00ea10a5,2025-02-20T18:15:25.457000 +CVE-2024-54961,1,1,1c1835716c9881646ed84e80d1f8ca1dc3531ce5f62894a3896bb442d552297e,2025-02-20T18:15:25.593000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000 @@ -273760,6 +273768,7 @@ CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4 CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000 CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000 CVE-2024-55456,0,0,a3d3f2052af70dd917d8e618e90f97fc45b823a73793a50cabf867252a0b02ec,2025-02-18T19:15:19.267000 +CVE-2024-55457,1,1,c8ba5f039f367cf5d86708520b4f251ee6846d502151072711406410b0204581,2025-02-20T18:15:25.740000 CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55460,0,0,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000 @@ -273933,8 +273942,8 @@ CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fabe96,2024-12-27T17:15:08.480000 CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000 -CVE-2024-55952,0,1,684761dbbacb6f645db365e7e0599f9e3370b7e14b8eb486a81092d66a1bf19a,2025-02-20T16:22:50.240000 -CVE-2024-55953,0,1,90fcdea482c120744930d556fbdd18847db93825072c3df028dd92a54d371f9d,2025-02-20T16:25:07.667000 +CVE-2024-55952,0,0,684761dbbacb6f645db365e7e0599f9e3370b7e14b8eb486a81092d66a1bf19a,2025-02-20T16:22:50.240000 +CVE-2024-55953,0,0,90fcdea482c120744930d556fbdd18847db93825072c3df028dd92a54d371f9d,2025-02-20T16:25:07.667000 CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,afd479d00c2e9cbfbfc115bd207b298f6ba3f13c2d0edad18c92136a816df61d,2025-02-05T19:15:44.450000 @@ -274333,7 +274342,7 @@ CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa3 CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000 CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000 CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000 -CVE-2024-56511,0,1,5366dbb656a4a7481616000b94cc615953e9cccaf1bda7d00415cef2308d3dc5,2025-02-20T16:26:58.487000 +CVE-2024-56511,0,0,5366dbb656a4a7481616000b94cc615953e9cccaf1bda7d00415cef2308d3dc5,2025-02-20T16:26:58.487000 CVE-2024-56512,0,0,599da64766ce0e1c2bd7cfcf30544268a9ad3bb7673ddbfdef2855ca9f183344,2025-02-11T16:10:28.690000 CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000 CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000 @@ -274850,7 +274859,7 @@ CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b CVE-2024-5739,0,0,c5c2a01c52729f34b70d0ba17b3b2c0fc6065fac9c4acf57edb649a485cbd474,2025-02-20T11:15:09.400000 CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000 CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000 -CVE-2024-57401,1,1,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000 +CVE-2024-57401,0,0,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000 CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000 CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381cb5,2025-02-11T00:15:28.707000 CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000 @@ -275023,6 +275032,7 @@ CVE-2024-57703,0,0,d743eff85f5c1f058398ac2e48beaddc31cc085b96c135580c81255c71093 CVE-2024-57704,0,0,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000 CVE-2024-57707,0,0,256285bb0e4c937fcd8fcd84fe295c9ba07342d1410e4f5a401c2306ce0e91b0,2025-02-10T17:15:18.353000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 +CVE-2024-57716,1,1,bb1c0f3eb3962fcd570e3230e5affadd08b072a40353dc99f590040eea2f1b88,2025-02-20T17:15:11.803000 CVE-2024-57719,0,0,9af381064dc4b979246282f21dfbef1d0e1e6baf2733f304b6946b2054a0e999,2025-02-18T20:15:22.603000 CVE-2024-5772,0,0,a130ac538e53608257b53eec354d0ff395f00d63a43d268bd6c4f0666ec5359a,2025-01-29T17:46:54.753000 CVE-2024-57720,0,0,a92cd4ff4b9ce08012253caea48a1eedf30cd05c41e4bdf4daafaed100b4bd5b,2025-02-18T20:15:22.690000 @@ -277957,7 +277967,7 @@ CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf925972 CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000 CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa23a,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000 -CVE-2024-8911,0,1,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000 +CVE-2024-8911,0,0,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000 CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000 CVE-2024-8913,0,0,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000 CVE-2024-8914,0,0,ce4fb597594217313bfdde28ad4b8137ce4048a1c3742ef10b91b3c3978b838a,2025-01-27T18:15:40.230000 @@ -277986,7 +277996,7 @@ CVE-2024-8939,0,0,c25a02094c7c1751d20525b12c6e0eb5406cee4bacfaf03c2adb4b584bb9a3 CVE-2024-8940,0,0,9a3c4329418a0e3104a91f652312bd7ae60a157cfba240489e078a14636eee06,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,8e9c3f4e719097ce642538ebd62ea55c93311c5fe6daf8b2d296986fc9c234e5,2024-09-30T19:45:43.223000 CVE-2024-8942,0,0,c4ece599c1d45ba712aee1c379ddee7479ad369e987935d035985aa672bd599d,2024-09-30T17:39:28.417000 -CVE-2024-8943,0,1,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000 +CVE-2024-8943,0,0,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000 CVE-2024-8944,0,0,4d54f1a0baaf503429d63b0c7baf27b829b5af54b4fe40f08a44318e73509207,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,49fe08fa5001a52fcc4b693eea0010b97a8789b0d8d21b7f4e3e0328bdefe156,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d94a,2024-09-24T13:11:17.417000 @@ -278907,7 +278917,7 @@ CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 CVE-2025-0158,0,0,f3073b33a682c6c4fcb1bbe908bc9fc861912bdae73f97919c33833b929dfa0a,2025-02-06T21:15:21.923000 -CVE-2025-0161,1,1,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000 +CVE-2025-0161,0,0,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000 CVE-2025-0167,0,0,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000 @@ -279488,8 +279498,8 @@ CVE-2025-1172,0,0,cf08703b66582ec9de3e473fcab67a2dbafe69d53a075dc9b8254b1bcc7063 CVE-2025-1173,0,0,3256d2a06a1e205d73caa7c7b35a941bd06320937c6ee57d5e3a1dfb4b5dac94,2025-02-18T18:15:32.097000 CVE-2025-1174,0,0,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000 CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000 -CVE-2025-1176,0,1,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000 -CVE-2025-1177,0,1,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000 +CVE-2025-1176,0,0,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000 +CVE-2025-1177,0,0,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000 CVE-2025-1178,0,0,6e9bc15abee46095fa45b59249884a86b08db54b5b6bfb3dfcc9175f57316032,2025-02-11T16:15:50.410000 CVE-2025-1179,0,0,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112f5,2025-02-11T07:15:30.230000 CVE-2025-1180,0,0,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000 @@ -279501,7 +279511,7 @@ CVE-2025-1185,0,0,cc25ee2f77a3103fcd68a3f1611fd1f716189b46d9cae5c522939b670d5fe6 CVE-2025-1186,0,0,8086a12ea65738a60ab99220576d2e18e33f078a2bf72100e8b879a5e3eef2f8,2025-02-18T18:15:32.870000 CVE-2025-1187,0,0,4d377fdf42828c943e4e7e7e9bc0ee6d4b95eda485220a10fe3d04dafc88feff,2025-02-18T21:28:37.800000 CVE-2025-1188,0,0,705852bbbd5f869ccd9a3fec289796fb3a53a8119c986f44aa0b13a8e84aa3bc,2025-02-18T18:15:33.103000 -CVE-2025-1189,0,1,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000 +CVE-2025-1189,0,0,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000 CVE-2025-1190,0,0,bdc8e5317e46e46a9ca4a9bb55f67f9139555824a181f8bdaf33c4b7f757c764,2025-02-18T18:47:00.127000 CVE-2025-1191,0,0,1c6bbb235a5b5708d13f9a9dc19f35d51e2568dd188a3fd7f6e46662095fe78f,2025-02-18T17:51:51.260000 CVE-2025-1192,0,0,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc37a,2025-02-18T17:52:35.107000 @@ -279540,6 +279550,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,4873e23ffda0d795b5208f2bbb0bbb9ab8821cf32651b326d7afc0c6c00e584c,2025-02-19T19:15:15.437000 CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000 +CVE-2025-1258,1,1,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000 CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 @@ -279605,7 +279616,7 @@ CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19 CVE-2025-20045,0,0,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 CVE-2025-20058,0,0,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000 -CVE-2025-20059,1,1,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000 +CVE-2025-20059,0,0,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000 CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20075,0,0,b30b32e2f08da502fea0698f2946161a425eb310144fa5e17bbcbe0fe4f71804,2025-02-18T00:15:21.107000 @@ -280274,7 +280285,7 @@ CVE-2025-22402,0,0,3d05349369555f44f15217004f13f07d59bb4bf46759f4c867640d0bca502 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 -CVE-2025-22467,0,1,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 +CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 @@ -281133,8 +281144,8 @@ CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000 CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000 CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000 -CVE-2025-24011,0,1,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7a16,2025-02-20T16:44:29.017000 -CVE-2025-24012,0,1,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000 +CVE-2025-24011,0,0,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7a16,2025-02-20T16:44:29.017000 +CVE-2025-24012,0,0,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000 CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000 CVE-2025-24014,0,0,c01e1782ee7131bc5ad5aeeb3c598dd08e570d6bc857e837f2feba5725cf242d,2025-01-21T03:15:06.393000 CVE-2025-24016,0,0,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000 @@ -281572,7 +281583,7 @@ CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34b CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000 CVE-2025-24894,0,0,719537e2b65db00c391760a0cd638c15406668ed57b32d2a279ec49cb0e3adaa,2025-02-18T19:15:28.090000 CVE-2025-24895,0,0,b00a9ba498d0a292ef1f9fa7a927fff9b8cfa424cc9586cb281d28faa6ce8d74,2025-02-18T19:15:28.240000 -CVE-2025-24896,0,1,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000 +CVE-2025-24896,0,0,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000 CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000 CVE-2025-24898,0,0,8b656476c3e6384183d80bdf8cadd585c7688e8bfb1105b9b189df49539552e9,2025-02-11T08:15:32.003000 CVE-2025-24899,0,0,b464e96610aff8658de3c88cb6a2e44c2520453b604cb150cf8f488249a2b344,2025-02-03T21:15:15.703000 @@ -281768,13 +281779,15 @@ CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30ca CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 -CVE-2025-25901,0,1,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 -CVE-2025-25942,0,1,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000 -CVE-2025-25943,0,1,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000 -CVE-2025-25944,0,1,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000 -CVE-2025-25945,0,1,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000 -CVE-2025-25946,0,1,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000 -CVE-2025-25947,0,1,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000 +CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 +CVE-2025-25942,0,0,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000 +CVE-2025-25943,0,0,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000 +CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000 +CVE-2025-25945,0,0,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000 +CVE-2025-25946,0,0,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000 +CVE-2025-25947,0,0,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000 +CVE-2025-25968,1,1,711195bae1cb33836f8040e138c018d1d5c96de564aef9a9814105c5940f5c3f,2025-02-20T18:15:26.570000 +CVE-2025-25973,1,1,59faf3ab50d50be92a7a5a4d603b0614ab61d75477967f0e0e911734e157c5d1,2025-02-20T18:15:26.713000 CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000 CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000 @@ -281786,6 +281799,14 @@ CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8c CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000 +CVE-2025-26304,1,1,4aba16d7a61da7bc2842eb12b4bf3c9c6246498e6a8b53b4a819b512fc92d4ae,2025-02-20T17:15:12.260000 +CVE-2025-26305,1,1,3dc5b1438bcbf16d99e86f03c2d33af491ec29c798bc0acfd78d8d014fc73cc0,2025-02-20T17:15:12.377000 +CVE-2025-26306,1,1,ad0323aa5286b06e3a2496c2f503724f28b4742676b125b1f5a4176f3e7db0fb,2025-02-20T17:15:12.490000 +CVE-2025-26307,1,1,ceb0357c37b88e34244c9f55d7082302d7c6688f50d8028aba18cb4b4966953c,2025-02-20T17:15:12.607000 +CVE-2025-26308,1,1,3e072877f412939a3c50a2422a54d75c10bdf23be48f05068cfdfbe70a89a12d,2025-02-20T17:15:12.730000 +CVE-2025-26309,1,1,d91dfb16f99b8b177a88ed69fb910d1699945bbbc6ceb6223bd02a4bc745f70c,2025-02-20T17:15:12.853000 +CVE-2025-26310,1,1,29f1fcba38b2588cfaea820a424c57e92680a0eca4091920c8fd5bfcf8d6fd62,2025-02-20T17:15:12.967000 +CVE-2025-26311,1,1,d2e3f842457159c725513ec11a1987e09e62cac50eca91e4348430aa6d4c7bdd,2025-02-20T17:15:13.087000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 @@ -281916,6 +281937,7 @@ CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2 CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000 CVE-2025-27089,0,0,e1cd39d7d2d496ca126251592ce334845a8dbaa95837461791aefc38c5c96ee4,2025-02-19T17:15:15.800000 CVE-2025-27090,0,0,1f7a1f68f44411e4af49caeac1dba85d17f51b5d72f982d15d3cbe07a63e4481,2025-02-19T22:15:24.247000 +CVE-2025-27091,1,1,1f31f1738107c079abfb76423f421b24481f1590b449faf518c191e3377a5c93,2025-02-20T18:15:26.850000 CVE-2025-27092,0,0,a2d77f19ec65de3c929cda30f22d3993a6f6513f45b321406307690349bba5d0,2025-02-19T23:15:15.957000 CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000 CVE-2025-27218,0,0,40b16171d941ca5d442e2983417f31e8c5c3dec3980d6c4e3b1b2213673eeb44,2025-02-20T05:15:15.270000