From d8a6a74376cef17f77e997b3a0894546a5d1c15d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 18 Feb 2025 19:04:22 +0000 Subject: [PATCH] Auto-Update: 2025-02-18T19:00:55.301513+00:00 --- CVE-2017/CVE-2017-68xx/CVE-2017-6894.json | 32 +- CVE-2020/CVE-2020-141xx/CVE-2020-14140.json | 32 +- CVE-2020/CVE-2020-196xx/CVE-2020-19692.json | 32 +- CVE-2020/CVE-2020-196xx/CVE-2020-19693.json | 32 +- CVE-2020/CVE-2020-232xx/CVE-2020-23260.json | 32 +- CVE-2020/CVE-2020-233xx/CVE-2020-23327.json | 32 +- CVE-2020/CVE-2020-293xx/CVE-2020-29312.json | 32 +- CVE-2020/CVE-2020-34xx/CVE-2020-3432.json | 34 +- CVE-2021/CVE-2021-282xx/CVE-2021-28235.json | 32 +- CVE-2021/CVE-2021-317xx/CVE-2021-31707.json | 32 +- CVE-2021/CVE-2021-32xx/CVE-2021-3267.json | 32 +- CVE-2022/CVE-2022-25xx/CVE-2022-2560.json | 32 +- CVE-2022/CVE-2022-25xx/CVE-2022-2561.json | 32 +- CVE-2022/CVE-2022-286xx/CVE-2022-28686.json | 32 +- CVE-2022/CVE-2022-286xx/CVE-2022-28687.json | 32 +- CVE-2022/CVE-2022-286xx/CVE-2022-28688.json | 32 +- CVE-2022/CVE-2022-28xx/CVE-2022-2825.json | 12 +- CVE-2022/CVE-2022-28xx/CVE-2022-2848.json | 32 +- CVE-2022/CVE-2022-303xx/CVE-2022-30350.json | 32 +- CVE-2022/CVE-2022-303xx/CVE-2022-30351.json | 32 +- CVE-2022/CVE-2022-31xx/CVE-2022-3180.json | 37 +- CVE-2022/CVE-2022-369xx/CVE-2022-36969.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37351.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37352.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37353.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37354.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37355.json | 22 +- CVE-2022/CVE-2022-373xx/CVE-2022-37356.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37357.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37358.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37359.json | 32 +- CVE-2022/CVE-2022-373xx/CVE-2022-37360.json | 32 +- CVE-2022/CVE-2022-415xx/CVE-2022-41545.json | 33 ++ CVE-2022/CVE-2022-482xx/CVE-2022-48221.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48222.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48223.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48224.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48225.json | 32 +- CVE-2022/CVE-2022-48xx/CVE-2022-4899.json | 34 +- CVE-2023/CVE-2023-08xx/CVE-2023-0836.json | 34 +- CVE-2023/CVE-2023-16xx/CVE-2023-1652.json | 34 +- CVE-2023/CVE-2023-235xx/CVE-2023-23594.json | 32 +- CVE-2023/CVE-2023-268xx/CVE-2023-26829.json | 32 +- CVE-2023/CVE-2023-268xx/CVE-2023-26830.json | 32 +- CVE-2023/CVE-2023-268xx/CVE-2023-26858.json | 32 +- CVE-2023/CVE-2023-269xx/CVE-2023-26916.json | 32 +- CVE-2023/CVE-2023-269xx/CVE-2023-26968.json | 32 +- CVE-2023/CVE-2023-269xx/CVE-2023-26982.json | 32 +- CVE-2023/CVE-2023-269xx/CVE-2023-26984.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27091.json | 32 +- CVE-2023/CVE-2023-271xx/CVE-2023-27160.json | 39 +- CVE-2023/CVE-2023-271xx/CVE-2023-27162.json | 39 +- CVE-2023/CVE-2023-285xx/CVE-2023-28501.json | 22 +- CVE-2023/CVE-2023-285xx/CVE-2023-28502.json | 22 +- CVE-2023/CVE-2023-285xx/CVE-2023-28508.json | 32 +- CVE-2023/CVE-2023-285xx/CVE-2023-28509.json | 32 +- CVE-2023/CVE-2023-292xx/CVE-2023-29218.json | 32 +- CVE-2023/CVE-2023-343xx/CVE-2023-34397.json | 39 +- CVE-2023/CVE-2023-343xx/CVE-2023-34398.json | 39 +- CVE-2023/CVE-2023-343xx/CVE-2023-34399.json | 39 +- CVE-2023/CVE-2023-344xx/CVE-2023-34400.json | 39 +- CVE-2023/CVE-2023-344xx/CVE-2023-34402.json | 41 +- CVE-2023/CVE-2023-497xx/CVE-2023-49780.json | 34 +- CVE-2024/CVE-2024-123xx/CVE-2024-12314.json | 32 +- CVE-2024/CVE-2024-123xx/CVE-2024-12315.json | 32 +- CVE-2024/CVE-2024-125xx/CVE-2024-12586.json | 39 +- CVE-2024/CVE-2024-125xx/CVE-2024-12599.json | 34 +- CVE-2024/CVE-2024-129xx/CVE-2024-12939.json | 82 +++- CVE-2024/CVE-2024-129xx/CVE-2024-12962.json | 83 +++- CVE-2024/CVE-2024-129xx/CVE-2024-12978.json | 83 +++- CVE-2024/CVE-2024-129xx/CVE-2024-12979.json | 83 +++- CVE-2024/CVE-2024-129xx/CVE-2024-12980.json | 83 +++- CVE-2024/CVE-2024-130xx/CVE-2024-13012.json | 76 ++- CVE-2024/CVE-2024-131xx/CVE-2024-13120.json | 39 +- CVE-2024/CVE-2024-133xx/CVE-2024-13365.json | 32 +- CVE-2024/CVE-2024-134xx/CVE-2024-13435.json | 32 +- CVE-2024/CVE-2024-134xx/CVE-2024-13473.json | 32 +- CVE-2024/CVE-2024-135xx/CVE-2024-13528.json | 69 ++- CVE-2024/CVE-2024-136xx/CVE-2024-13606.json | 44 +- CVE-2024/CVE-2024-136xx/CVE-2024-13639.json | 47 +- CVE-2024/CVE-2024-137xx/CVE-2024-13794.json | 32 +- CVE-2024/CVE-2024-138xx/CVE-2024-13821.json | 32 +- CVE-2024/CVE-2024-138xx/CVE-2024-13867.json | 32 +- CVE-2024/CVE-2024-280xx/CVE-2024-28047.json | 34 +- CVE-2024/CVE-2024-29xx/CVE-2024-2932.json | 89 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2934.json | 89 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2935.json | 94 +++- CVE-2024/CVE-2024-315xx/CVE-2024-31506.json | 70 ++- CVE-2024/CVE-2024-32xx/CVE-2024-3224.json | 89 +++- CVE-2024/CVE-2024-32xx/CVE-2024-3225.json | 89 +++- CVE-2024/CVE-2024-33xx/CVE-2024-3320.json | 89 +++- CVE-2024/CVE-2024-33xx/CVE-2024-3321.json | 89 +++- CVE-2024/CVE-2024-33xx/CVE-2024-3347.json | 89 +++- CVE-2024/CVE-2024-33xx/CVE-2024-3363.json | 89 +++- CVE-2024/CVE-2024-36xx/CVE-2024-3612.json | 89 +++- CVE-2024/CVE-2024-36xx/CVE-2024-3613.json | 89 +++- CVE-2024/CVE-2024-36xx/CVE-2024-3614.json | 89 +++- CVE-2024/CVE-2024-370xx/CVE-2024-37020.json | 34 +- CVE-2024/CVE-2024-393xx/CVE-2024-39327.json | 48 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39328.json | 48 ++ CVE-2024/CVE-2024-393xx/CVE-2024-39356.json | 34 +- CVE-2024/CVE-2024-393xx/CVE-2024-39365.json | 34 +- CVE-2024/CVE-2024-398xx/CVE-2024-39813.json | 34 +- CVE-2024/CVE-2024-40xx/CVE-2024-4028.json | 60 +++ CVE-2024/CVE-2024-419xx/CVE-2024-41917.json | 34 +- CVE-2024/CVE-2024-424xx/CVE-2024-42405.json | 34 +- CVE-2024/CVE-2024-469xx/CVE-2024-46922.json | 41 +- CVE-2024/CVE-2024-469xx/CVE-2024-46923.json | 41 +- CVE-2024/CVE-2024-472xx/CVE-2024-47264.json | 32 +- CVE-2024/CVE-2024-481xx/CVE-2024-48170.json | 63 ++- CVE-2024/CVE-2024-495xx/CVE-2024-49589.json | 56 +++ CVE-2024/CVE-2024-49xx/CVE-2024-4972.json | 89 +++- CVE-2024/CVE-2024-49xx/CVE-2024-4973.json | 89 +++- CVE-2024/CVE-2024-49xx/CVE-2024-4974.json | 89 +++- CVE-2024/CVE-2024-49xx/CVE-2024-4975.json | 89 +++- CVE-2024/CVE-2024-506xx/CVE-2024-50608.json | 29 ++ CVE-2024/CVE-2024-506xx/CVE-2024-50609.json | 29 ++ CVE-2024/CVE-2024-511xx/CVE-2024-51122.json | 41 +- CVE-2024/CVE-2024-511xx/CVE-2024-51123.json | 41 +- CVE-2024/CVE-2024-514xx/CVE-2024-51440.json | 41 +- CVE-2024/CVE-2024-515xx/CVE-2024-51505.json | 60 +++ CVE-2024/CVE-2024-537xx/CVE-2024-53704.json | 27 +- CVE-2024/CVE-2024-549xx/CVE-2024-54916.json | 39 +- CVE-2024/CVE-2024-554xx/CVE-2024-55460.json | 25 + CVE-2024/CVE-2024-568xx/CVE-2024-56882.json | 21 + CVE-2024/CVE-2024-568xx/CVE-2024-56883.json | 21 + CVE-2024/CVE-2024-569xx/CVE-2024-56940.json | 39 +- CVE-2024/CVE-2024-576xx/CVE-2024-57601.json | 41 +- CVE-2024/CVE-2024-576xx/CVE-2024-57604.json | 41 +- CVE-2024/CVE-2024-576xx/CVE-2024-57605.json | 41 +- CVE-2024/CVE-2024-579xx/CVE-2024-57970.json | 32 +- CVE-2024/CVE-2024-78xx/CVE-2024-7809.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7842.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7843.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7844.json | 6 +- CVE-2024/CVE-2024-78xx/CVE-2024-7845.json | 6 +- CVE-2024/CVE-2024-79xx/CVE-2024-7931.json | 6 +- CVE-2024/CVE-2024-79xx/CVE-2024-7949.json | 13 +- CVE-2025/CVE-2025-00xx/CVE-2025-0054.json | 32 +- CVE-2025/CVE-2025-00xx/CVE-2025-0064.json | 32 +- CVE-2025/CVE-2025-05xx/CVE-2025-0506.json | 32 +- CVE-2025/CVE-2025-05xx/CVE-2025-0525.json | 36 +- CVE-2025/CVE-2025-05xx/CVE-2025-0526.json | 36 +- CVE-2025/CVE-2025-09xx/CVE-2025-0934.json | 83 +++- CVE-2025/CVE-2025-09xx/CVE-2025-0995.json | 33 +- CVE-2025/CVE-2025-09xx/CVE-2025-0996.json | 41 +- CVE-2025/CVE-2025-09xx/CVE-2025-0997.json | 33 +- CVE-2025/CVE-2025-09xx/CVE-2025-0998.json | 33 +- CVE-2025/CVE-2025-11xx/CVE-2025-1143.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1145.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1160.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1162.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1165.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1166.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1167.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1168.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1169.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1170.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1171.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1172.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1173.json | 34 +- CVE-2025/CVE-2025-11xx/CVE-2025-1183.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1184.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1185.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1186.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1188.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1190.json | 83 +++- CVE-2025/CVE-2025-11xx/CVE-2025-1191.json | 84 +++- CVE-2025/CVE-2025-11xx/CVE-2025-1192.json | 82 +++- CVE-2025/CVE-2025-11xx/CVE-2025-1197.json | 32 +- CVE-2025/CVE-2025-11xx/CVE-2025-1199.json | 82 +++- CVE-2025/CVE-2025-12xx/CVE-2025-1201.json | 82 +++- CVE-2025/CVE-2025-12xx/CVE-2025-1202.json | 83 +++- CVE-2025/CVE-2025-13xx/CVE-2025-1358.json | 32 +- CVE-2025/CVE-2025-214xx/CVE-2025-21401.json | 32 +- CVE-2025/CVE-2025-224xx/CVE-2025-22480.json | 59 ++- CVE-2025/CVE-2025-231xx/CVE-2025-23187.json | 32 +- CVE-2025/CVE-2025-242xx/CVE-2025-24200.json | 34 +- CVE-2025/CVE-2025-248xx/CVE-2025-24869.json | 32 +- CVE-2025/CVE-2025-248xx/CVE-2025-24870.json | 32 +- CVE-2025/CVE-2025-248xx/CVE-2025-24872.json | 32 +- CVE-2025/CVE-2025-248xx/CVE-2025-24874.json | 32 +- CVE-2025/CVE-2025-248xx/CVE-2025-24875.json | 32 +- CVE-2025/CVE-2025-248xx/CVE-2025-24876.json | 32 +- CVE-2025/CVE-2025-252xx/CVE-2025-25241.json | 32 +- CVE-2025/CVE-2025-252xx/CVE-2025-25243.json | 32 +- CVE-2025/CVE-2025-253xx/CVE-2025-25300.json | 82 ++++ CVE-2025/CVE-2025-258xx/CVE-2025-25898.json | 34 +- CVE-2025/CVE-2025-260xx/CVE-2025-26058.json | 21 + CVE-2025/CVE-2025-263xx/CVE-2025-26344.json | 32 +- CVE-2025/CVE-2025-263xx/CVE-2025-26345.json | 32 +- CVE-2025/CVE-2025-264xx/CVE-2025-26408.json | 37 +- CVE-2025/CVE-2025-264xx/CVE-2025-26409.json | 37 +- CVE-2025/CVE-2025-264xx/CVE-2025-26410.json | 37 +- CVE-2025/CVE-2025-264xx/CVE-2025-26411.json | 37 +- CVE-2025/CVE-2025-265xx/CVE-2025-26543.json | 32 +- CVE-2025/CVE-2025-266xx/CVE-2025-26620.json | 82 ++++ README.md | 82 ++-- _state.csv | 506 ++++++++++---------- 199 files changed, 4338 insertions(+), 4449 deletions(-) create mode 100644 CVE-2022/CVE-2022-415xx/CVE-2022-41545.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39327.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39328.json create mode 100644 CVE-2024/CVE-2024-40xx/CVE-2024-4028.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49589.json create mode 100644 CVE-2024/CVE-2024-506xx/CVE-2024-50608.json create mode 100644 CVE-2024/CVE-2024-506xx/CVE-2024-50609.json create mode 100644 CVE-2024/CVE-2024-515xx/CVE-2024-51505.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55460.json create mode 100644 CVE-2024/CVE-2024-568xx/CVE-2024-56882.json create mode 100644 CVE-2024/CVE-2024-568xx/CVE-2024-56883.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25300.json create mode 100644 CVE-2025/CVE-2025-260xx/CVE-2025-26058.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26620.json diff --git a/CVE-2017/CVE-2017-68xx/CVE-2017-6894.json b/CVE-2017/CVE-2017-68xx/CVE-2017-6894.json index c92473758ac..07c1c7fab24 100644 --- a/CVE-2017/CVE-2017-68xx/CVE-2017-6894.json +++ b/CVE-2017/CVE-2017-68xx/CVE-2017-6894.json @@ -2,7 +2,7 @@ "id": "CVE-2017-6894", "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "published": "2023-03-29T21:15:07.697", - "lastModified": "2024-11-21T03:30:44.550", + "lastModified": "2025-02-18T18:15:08.657", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-141xx/CVE-2020-14140.json b/CVE-2020/CVE-2020-141xx/CVE-2020-14140.json index d8ef8458159..b10f924f436 100644 --- a/CVE-2020/CVE-2020-141xx/CVE-2020-14140.json +++ b/CVE-2020/CVE-2020-141xx/CVE-2020-14140.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14140", "sourceIdentifier": "security@xiaomi.com", "published": "2023-03-29T20:15:07.087", - "lastModified": "2024-11-21T05:02:43.803", + "lastModified": "2025-02-18T18:15:09.703", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json b/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json index 3831c05b10a..d2bcd10aa95 100644 --- a/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json +++ b/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19692", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.653", - "lastModified": "2025-02-18T15:15:11.590", + "lastModified": "2025-02-18T17:15:10.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-120" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json b/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json index bdae8fcd27b..69aec14a6e9 100644 --- a/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json +++ b/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19693", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.697", - "lastModified": "2025-02-18T15:15:12.407", + "lastModified": "2025-02-18T17:15:11.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json b/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json index 4c304505515..a9daed1240c 100644 --- a/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json +++ b/CVE-2020/CVE-2020-232xx/CVE-2020-23260.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23260", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.373", - "lastModified": "2025-02-14T18:15:18.170", + "lastModified": "2025-02-18T17:15:11.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json b/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json index b4ec81cdf44..dfe782452af 100644 --- a/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json +++ b/CVE-2020/CVE-2020-233xx/CVE-2020-23327.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23327", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.413", - "lastModified": "2025-02-14T18:15:19.153", + "lastModified": "2025-02-18T17:15:11.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json b/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json index e92858b2c49..66661a01138 100644 --- a/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json +++ b/CVE-2020/CVE-2020-293xx/CVE-2020-29312.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29312", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.457", - "lastModified": "2025-02-14T18:15:19.360", + "lastModified": "2025-02-18T17:15:11.653", "vulnStatus": "Modified", "cveTags": [ { @@ -39,26 +39,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -72,16 +52,6 @@ "value": "CWE-502" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-502" - } - ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json index d2b85813aa5..96e9241f74a 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3432", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-12T00:15:07.670", - "lastModified": "2025-02-12T15:15:10.460", + "lastModified": "2025-02-18T18:15:09.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,28 +16,6 @@ } ], "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", - "baseScore": 5.6, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.3, - "impactScore": 4.2 - } - ], "cvssMetricV30": [ { "source": "psirt@cisco.com", @@ -71,16 +49,6 @@ "value": "CWE-59" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-59" - } - ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json b/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json index e85087fe802..f7b0a951425 100644 --- a/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json +++ b/CVE-2021/CVE-2021-282xx/CVE-2021-28235.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28235", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.507", - "lastModified": "2025-02-14T18:15:19.620", + "lastModified": "2025-02-18T17:15:11.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-287" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-287" - } - ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json b/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json index c8656a8d687..0cd613722bd 100644 --- a/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json +++ b/CVE-2021/CVE-2021-317xx/CVE-2021-31707.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31707", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.547", - "lastModified": "2025-02-14T18:15:19.870", + "lastModified": "2025-02-18T17:15:11.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-434" - } - ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json b/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json index 52f31511521..456b4129698 100644 --- a/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json +++ b/CVE-2021/CVE-2021-32xx/CVE-2021-3267.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3267", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.587", - "lastModified": "2025-02-14T18:15:21.857", + "lastModified": "2025-02-18T18:15:10.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.2, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json index 6c3de9c30b0..ee752c13713 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2560", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.447", - "lastModified": "2025-02-18T16:15:10.817", + "lastModified": "2025-02-18T17:15:12.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -97,16 +77,6 @@ "value": "CWE-22" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-22" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json index feda28e9a2d..35c06592044 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2561", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.517", - "lastModified": "2025-02-18T16:15:11.030", + "lastModified": "2025-02-18T17:15:13.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-502" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-502" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json index acb62febc90..66072653e88 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28686", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.217", - "lastModified": "2025-02-18T16:15:09.843", + "lastModified": "2025-02-18T17:15:12.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json index 72a416ab112..7d383dbc544 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28687", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.303", - "lastModified": "2025-02-18T16:15:10.037", + "lastModified": "2025-02-18T17:15:12.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json index ed36b853e02..70d71592804 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28688", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.380", - "lastModified": "2025-02-18T16:15:10.237", + "lastModified": "2025-02-18T17:15:12.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.4, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.5, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json index 48456f7f3a4..e690adf8903 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2825", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.610", - "lastModified": "2025-02-18T16:15:11.223", + "lastModified": "2025-02-18T17:15:13.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -87,16 +87,6 @@ "value": "CWE-121" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-121" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json index 39bd86c70fd..8e3da8faf09 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2848", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.680", - "lastModified": "2025-02-18T16:15:11.440", + "lastModified": "2025-02-18T17:15:13.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -97,16 +77,6 @@ "value": "CWE-119" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-122" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30350.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30350.json index eaa9b6105f5..2a78583f950 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30350.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30350.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30350", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-30T16:15:07.127", - "lastModified": "2024-11-21T07:02:37.680", + "lastModified": "2025-02-18T17:15:13.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-213" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30351.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30351.json index 70323ce5dc7..1e0d865d2b9 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30351.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30351.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30351", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-30T16:15:07.180", - "lastModified": "2024-11-21T07:02:37.823", + "lastModified": "2025-02-18T17:15:13.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-116" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1116" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json index 3ba86273252..2531ec9ef52 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3180", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T22:15:24.180", - "lastModified": "2025-02-12T15:15:10.730", + "lastModified": "2025-02-18T18:15:13.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "El complemento WPGateway para WordPress es vulnerable a la escalada de privilegios en versiones hasta la 3.5 y incluida. Esto permite que atacantes no autenticados creen cuentas de administrador maliciosas arbitrarias." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "security@wordfence.com", @@ -49,16 +26,6 @@ "value": "CWE-290" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-290" - } - ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json index 1ea605079b1..25adb190441 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36969", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.753", - "lastModified": "2025-02-18T16:15:11.987", + "lastModified": "2025-02-18T17:15:13.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", - "baseScore": 7.1, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-611" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-611" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json index 7f81114b9f4..b903ff39c75 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37351", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.200", - "lastModified": "2025-02-18T16:15:12.197", + "lastModified": "2025-02-18T17:15:13.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-125" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-125" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json index d875b525ff8..98e8fa82a1b 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37352", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.293", - "lastModified": "2025-02-18T16:15:12.407", + "lastModified": "2025-02-18T17:15:14.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -97,16 +77,6 @@ "value": "CWE-125" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-125" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json index 55f520659cc..1b2b73d75e3 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37353", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.373", - "lastModified": "2025-02-18T16:15:12.613", + "lastModified": "2025-02-18T17:15:14.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-125" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-125" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json index aff5f50dd29..43df6f78cd0 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37354", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.500", - "lastModified": "2025-02-18T16:15:12.807", + "lastModified": "2025-02-18T17:15:14.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json index 4be796a47c8..ab5e9b17750 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37355", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.593", - "lastModified": "2025-02-18T16:15:13.000", + "lastModified": "2025-02-18T17:15:14.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json index 2c27a004b45..6d2c7180961 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37356", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.683", - "lastModified": "2025-02-18T16:15:13.190", + "lastModified": "2025-02-18T17:15:14.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json index 4238ad2bfcf..3697ed0423d 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37357", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.760", - "lastModified": "2025-02-18T16:15:13.383", + "lastModified": "2025-02-18T17:15:14.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json index d1d35b47987..f8f61155f59 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37358", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.833", - "lastModified": "2025-02-18T16:15:13.563", + "lastModified": "2025-02-18T17:15:14.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json index 1c9ea564f5a..699dff65bac 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37359", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.917", - "lastModified": "2025-02-18T16:15:13.747", + "lastModified": "2025-02-18T17:15:15.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-416" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-416" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json index c6cf6d9397f..ec6ecb04dda 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37360", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:14.010", - "lastModified": "2025-02-18T16:15:13.940", + "lastModified": "2025-02-18T17:15:15.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -87,16 +67,6 @@ "value": "CWE-125" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-125" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json b/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json new file mode 100644 index 00000000000..ad58159ed1b --- /dev/null +++ b/CVE-2022/CVE-2022-415xx/CVE-2022-41545.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2022-41545", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:13.450", + "lastModified": "2025-02-18T18:15:13.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Feb/12", + "source": "cve@mitre.org" + }, + { + "url": "https://www.netgear.com/about/security/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf", + "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Feb/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json index 7006af2386f..128164b9132 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48221", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.717", - "lastModified": "2025-02-18T15:15:12.600", + "lastModified": "2025-02-18T17:15:15.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.6, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-362" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-362" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json index b42e62e46f1..7ab101a97f1 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48222", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.143", - "lastModified": "2025-02-18T15:15:12.803", + "lastModified": "2025-02-18T17:15:15.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json index f95d88df56c..6f40e3ab0bd 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48223.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48223", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.187", - "lastModified": "2025-02-14T18:15:22.503", + "lastModified": "2025-02-18T18:15:13.583", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 6.7, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.8, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json index 6a5a30e8055..7c8ec188976 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48224.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48224", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.230", - "lastModified": "2025-02-14T18:15:22.703", + "lastModified": "2025-02-18T18:15:13.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.3, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json index 5570e657d6f..eab1b8152be 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48225.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48225", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.757", - "lastModified": "2025-02-14T18:15:22.903", + "lastModified": "2025-02-18T18:15:13.887", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.3, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json index a449c26ba8c..fa63eeffa3c 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4899.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4899", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-31T20:15:07.213", - "lastModified": "2024-11-21T07:36:12.310", + "lastModified": "2025-02-18T18:15:14.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -52,6 +72,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json index 1be178ff61e..1a33012624d 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0836.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0836", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-29T21:15:07.950", - "lastModified": "2024-11-21T07:37:55.647", + "lastModified": "2025-02-18T17:15:15.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -48,6 +68,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json index 1afe5554c52..926b008ede3 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1652.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1652", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-29T21:15:07.997", - "lastModified": "2024-11-21T07:39:37.897", + "lastModified": "2025-02-18T17:15:15.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -48,6 +68,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23594.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23594.json index e5850991a24..413432effc7 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23594.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23594.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23594", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T19:15:07.187", - "lastModified": "2024-11-21T07:46:29.937", + "lastModified": "2025-02-18T18:15:14.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26829.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26829.json index 94f14b49b3d..d2f71a8244d 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26829.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26829.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26829", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T16:15:07.457", - "lastModified": "2024-11-21T07:51:58.887", + "lastModified": "2025-02-18T17:15:15.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json index afde0b0379c..ea03c916f90 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26830", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T16:15:07.507", - "lastModified": "2025-02-18T15:15:13.227", + "lastModified": "2025-02-18T17:15:16.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.2, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-434" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json index fda76439947..764bdff8348 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26858", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T20:15:07.397", - "lastModified": "2025-02-18T15:15:13.423", + "lastModified": "2025-02-18T17:15:16.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json index 61a19e49fe1..bb360da68bc 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26916", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T22:15:07.060", - "lastModified": "2025-02-18T15:15:13.617", + "lastModified": "2025-02-18T17:15:16.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-476" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26968.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26968.json index e9f174fc945..533921f4e7c 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26968.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26968.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26968", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-29T17:15:07.377", - "lastModified": "2024-11-21T07:52:08.060", + "lastModified": "2025-02-18T17:15:16.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26982.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26982.json index 7cfd70fe29c..88cd17322fa 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26982.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26982.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26982", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-29T15:15:07.667", - "lastModified": "2024-11-21T07:52:09.153", + "lastModified": "2025-02-18T17:15:16.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26984.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26984.json index 985166be4e7..6abc6905ec1 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26984.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26984.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26984", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-29T18:15:07.200", - "lastModified": "2024-11-21T07:52:09.313", + "lastModified": "2025-02-18T17:15:16.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json index 7324c5570e4..cc36e735781 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27091", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T18:15:07.043", - "lastModified": "2025-02-14T18:15:23.107", + "lastModified": "2025-02-18T18:15:14.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.2, - "impactScore": 5.9 } ] }, @@ -65,16 +45,6 @@ "value": "CWE-287" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-276" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27160.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27160.json index 8909bf445fe..b6ace25d998 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27160.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27160.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27160", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T19:15:07.320", - "lastModified": "2024-11-21T07:52:24.060", + "lastModified": "2025-02-18T17:15:16.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ @@ -123,6 +153,13 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://gist.github.com/b33t1e/6172286862a4486b5888f3cbbdc6316d", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27162.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27162.json index 0792874d7c4..5c9b1617dbe 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27162.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27162.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27162", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T20:15:07.437", - "lastModified": "2024-11-21T07:52:24.363", + "lastModified": "2025-02-18T17:15:17.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ @@ -123,6 +153,13 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28501.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28501.json index c390ea84706..e461e76b3b8 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28501.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28501.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28501", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T20:15:07.507", - "lastModified": "2024-11-21T07:55:14.620", + "lastModified": "2025-02-18T17:15:17.357", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28502.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28502.json index 7b8fb9be4e5..25b0363dec6 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28502.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28502.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28502", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.080", - "lastModified": "2024-11-21T07:55:14.753", + "lastModified": "2025-02-18T17:15:17.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json index 13ed3f4ca79..5f071f9faf0 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28508", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.353", - "lastModified": "2025-02-18T15:15:14.280", + "lastModified": "2025-02-18T17:15:17.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,26 +32,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 } ] }, @@ -75,16 +55,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28509.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28509.json index 6381b72140b..04e9616a3d4 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28509.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28509.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28509", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.397", - "lastModified": "2024-11-21T07:55:15.647", + "lastModified": "2025-02-18T17:15:17.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-327" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json index 86c633d028a..1498ccdbf9f 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29218", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T21:15:07.237", - "lastModified": "2025-02-18T15:15:14.460", + "lastModified": "2025-02-18T17:15:18.033", "vulnStatus": "Modified", "cveTags": [ { @@ -39,26 +39,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -72,16 +52,6 @@ "value": "NVD-CWE-noinfo" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-400" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json index fcadcb10c1e..feb64fdb86a 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34397.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34397", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.470", - "lastModified": "2025-02-14T17:15:14.477", + "lastModified": "2025-02-18T18:15:14.710", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "La unidad principal Mercedes Benz NTG 6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Durante el an\u00e1lisis, puede provocar que el servicio se bloquee." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-770" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json index 08e975aa033..47184089557 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34398.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34398", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.603", - "lastModified": "2025-02-14T17:15:14.640", + "lastModified": "2025-02-18T18:15:14.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Algunos valores de esta tabla son archivos serializados seg\u00fan la librer\u00eda Boost. La librer\u00eda Boost contiene una vulnerabilidad/desreferencia de puntero nulo." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json index 1d8be01b2a1..2431031f182 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34399.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34399", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.730", - "lastModified": "2025-02-14T17:15:14.790", + "lastModified": "2025-02-18T18:15:14.933", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Algunos valores de esta tabla se archivan en serie seg\u00fan la librer\u00eda Boost. La versi\u00f3n de la librer\u00eda Boost contiene una vulnerabilidad de desbordamiento de enteros." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-190" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json index 21656ded1ee..437c43d8ef2 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34400", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.847", - "lastModified": "2025-02-14T17:15:14.933", + "lastModified": "2025-02-18T18:15:15.043", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. En caso de analizar un archivo, el servicio intenta definir el encabezado dentro del archivo y lo convierte en una cadena con terminaci\u00f3n nula. Si falta alg\u00fan car\u00e1cter, devolver\u00e1 un puntero nulo." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json index 2d3b3aaa3d2..6b94a2662e0 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34402.json @@ -2,51 +2,20 @@ "id": "CVE-2023-34402", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T23:15:09.337", - "lastModified": "2025-02-14T17:15:15.087", + "lastModified": "2025-02-18T18:15:15.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside file is encapsulate another file, which service will drop during processing. Due to missed checks, attacker can achieve Arbitrary File Write with service speech rights." - } - ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", - "baseScore": 7.7, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.5, - "impactScore": 5.2 - } - ] - }, - "weaknesses": [ + }, { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] + "lang": "es", + "value": "La unidad principal NTG6 de Mercedes-Benz contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Dentro del archivo se encapsula otro archivo, que el servicio descartar\u00e1 durante el procesamiento. Debido a las comprobaciones omitidas, el atacante puede lograr una escritura arbitraria de archivo con derechos de voz del servicio." } ], + "metrics": {}, "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json index a86c626b840..95dde54c83b 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49780", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-12T08:15:08.013", - "lastModified": "2025-02-12T15:15:12.077", + "lastModified": "2025-02-18T18:15:15.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,28 +16,6 @@ } ], "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ], "cvssMetricV30": [ { "source": "vultures@jpcert.or.jp", @@ -71,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json index 1100fad626a..7f8f8417c11 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12314", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-18T05:15:09.987", - "lastModified": "2025-02-18T15:15:14.687", + "lastModified": "2025-02-18T17:15:18.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", - "baseScore": 7.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 2.7 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-524" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-524" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json index bc0405f2dde..83947abf0c7 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12315", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T09:15:08.247", - "lastModified": "2025-02-12T15:15:12.527", + "lastModified": "2025-02-18T18:15:15.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-922" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-922" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json index 88165647511..0b47b036d5f 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12586", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.607", - "lastModified": "2025-02-13T15:15:17.200", + "lastModified": "2025-02-18T18:15:15.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "El complemento Chalet-Montagne.com Tools de WordPress hasta la versi\u00f3n 2.7.8 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/2ce05a44-762b-4aaf-b88a-92c830fd8ec4/", diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json index 978c9a8e52a..c029ea591c4 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12599.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12599", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T05:15:12.790", - "lastModified": "2025-02-11T05:15:12.790", + "lastModified": "2025-02-18T18:15:15.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,27 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", - "baseScore": 7.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -69,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json index 9e2e3761e4c..2b82e2457a4 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12939", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T07:15:10.967", - "lastModified": "2024-12-26T07:15:10.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:45:17.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Hl0kk/cve/blob/main/sql-hi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289295", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289295", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.467816", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json index 6b9ea9bc224..74ad2c27e44 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12962", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T19:15:07.710", - "lastModified": "2024-12-26T19:15:07.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:51:27.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/UnrealdDei/cve/blob/main/sql5.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289327", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289327", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468921", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json index 882f2bbd6ba..f1905eb67ad 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12978", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T04:15:05.603", - "lastModified": "2024-12-27T04:15:05.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:51:08.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/UnrealdDei/cve/blob/main/sql7.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469145", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json index 1d8103b6413..c3fd0b2dc45 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12979", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T05:15:07.130", - "lastModified": "2024-12-27T05:15:07.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:50:22.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/705298066/cve/blob/main/xss-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289355", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289355", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469180", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json index 08b05a3aaf6..adae9469c9c 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12980", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T05:15:07.353", - "lastModified": "2024-12-27T05:15:07.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:49:54.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,75 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/705298066/cve/blob/main/xss-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289356", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289356", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469181", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json index cde67b8cf31..43b9024e164 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13012", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T12:15:04.970", - "lastModified": "2024-12-29T12:15:04.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:53:25.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289703", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289703", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469228", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json index 08a1b3a2592..a9d2c66b91c 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13120", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.917", - "lastModified": "2025-02-13T15:15:17.520", + "lastModified": "2025-02-18T18:15:18.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versi\u00f3n 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 4.8, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.7, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/5b70798c-c30d-42e6-ac72-821c5568b9b5/", diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json index 2fd846250f3..c0360feba33 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13365", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.547", - "lastModified": "2025-02-12T15:15:12.860", + "lastModified": "2025-02-18T18:15:18.303", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-434" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json index c53502d8f3b..ea5bb4c93b1 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13435", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.727", - "lastModified": "2025-02-12T15:15:13.093", + "lastModified": "2025-02-18T18:15:18.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json index 7b8e5e89041..c32383eb979 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13473", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.610", - "lastModified": "2025-02-12T15:15:13.270", + "lastModified": "2025-02-18T18:15:18.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json index a68ad67be6d..69ae7f5eb2d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13528", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:12.130", - "lastModified": "2025-02-12T10:15:12.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:53:58.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -42,27 +62,64 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpfactory:customer_email_verification_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.9.6", + "matchCriteriaId": "E63FD3E3-008B-4258-B199-D1B5B22BF650" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.9.2/includes/class-alg-wc-ev-emails.php#L151", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3238136/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0b3798e3-45fe-4829-9012-dc728d4af87f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json index 705ffc92a5e..2592410a097 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13606", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T10:15:09.310", - "lastModified": "2025-02-13T10:15:09.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:46:05.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wiselyhub:js_help_desk:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.9", + "matchCriteriaId": "469EE478-AB85-434C-887C-6D8543E2F56E" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/js-support-ticket/tags/2.8.8/includes/classes/uploads.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8ed5d5d-86b0-40ac-a093-31392dea13a2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json index 2e6c35412aa..7eac7b33651 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13639", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T09:15:07.273", - "lastModified": "2025-02-13T09:15:07.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:15:51.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:edmonsoft:read_more_\\&_accordion:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.3", + "matchCriteriaId": "2AE287A4-AD6C-4A5E-8EAC-CE6411F910A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/files/ReadMoreAdminPost.php#L9", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/files/ReadMoreAdminPost.php#L98", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3239533/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/expand-maker/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65849267-8bb5-48fd-b95e-e89a1e744fe0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json index 6d1303588bc..1bbc25bb6e9 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13794", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T08:15:08.430", - "lastModified": "2025-02-12T15:15:14.040", + "lastModified": "2025-02-18T18:15:19.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-693" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-693" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json index 083dd231d08..8e062b7ee6d 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13821", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T08:15:08.660", - "lastModified": "2025-02-12T15:15:14.643", + "lastModified": "2025-02-18T18:15:19.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-285" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-285" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json index aa0df6142a0..d302c280590 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13867", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-13T10:15:09.847", - "lastModified": "2025-02-13T10:15:09.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:41:21.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tangiblewp:listivo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.68", + "matchCriteriaId": "F8C70E98-9299-4E9F-BB1C-DFD63B83C170" + } + ] + } + ] + } + ], "references": [ { "url": "https://themeforest.net/item/listivo-classified-ads-wordpress-theme/34032749", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/705c2322-bb52-4337-b0dd-6bf04bd1b0e0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json index 34bd3e992b8..2756def8bad 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28047", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:31.983", - "lastModified": "2025-02-13T15:15:17.957", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:20.030", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 0.8, "impactScore": 4.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 0.8, - "impactScore": 4.0 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-20" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-20" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json index c2b773d688f..440732d3caf 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2932.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2932", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:46.830", - "lastModified": "2024-11-21T09:10:52.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:02:22.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:donbermoy:online_chatting_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85923067-902A-42B7-BB5E-4C6ACE3990C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258012", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258012", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304257", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/CveSecLook/cve/issues/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258012", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258012", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304257", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json index 949b9997b8c..dc690010ea5 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2934", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:47.100", - "lastModified": "2024-11-21T09:10:52.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:04:28.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:todo_list_in_kanban_board:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "27CB9DC9-6E25-4220-AAE3-0AFBFCB3F1AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258013", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258013", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304677", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258013", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258013", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304677", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json index 3738b2d6e73..b3a29bb2285 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2935.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2935", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T01:15:47.360", - "lastModified": "2024-11-21T09:10:52.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:05:15.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,42 +140,94 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:todo_list_in_kanban_board:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "27CB9DC9-6E25-4220-AAE3-0AFBFCB3F1AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258014", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258014", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304678", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258014", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258014", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304678", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json index 6ccc4b2720a..09ec17fe3fd 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31506.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31506", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-09T18:15:10.467", - "lastModified": "2024-11-21T09:13:40.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:23:42.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Sourcecodester Online Graduate Tracer System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro \"id\" en admin/admin_cs.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/CveSecLook/cve/issues/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json index c59a900dde2..002af3e7371 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3224", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T02:15:08.097", - "lastModified": "2024-11-21T09:29:11.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:07:28.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%203.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308631", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%203.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259069", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259069", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308631", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json index 8c0cdebf9cf..5f12a5a96a8 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3225.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3225", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T02:15:08.347", - "lastModified": "2024-11-21T09:29:11.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:08:27.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%204.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259070", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259070", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308642", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%204.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259070", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259070", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308642", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json index 09e387fd45d..b87215281a1 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3320.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3320", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T00:15:08.147", - "lastModified": "2024-11-21T09:29:23.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:09:26.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:elearning_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D25131F4-0CEA-4740-B2D3-10DCD0F73C58" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/qqqyc/vuln/blob/main/eLearning%20System-XSS-01.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310103", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/qqqyc/vuln/blob/main/eLearning%20System-XSS-01.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310103", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json index cb5fd1ef517..faae6a070d9 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3321", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T01:15:51.747", - "lastModified": "2024-11-21T09:29:23.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:10:07.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:elearning_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D25131F4-0CEA-4740-B2D3-10DCD0F73C58" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/qqqyc/vuln/blob/main/eLearning%20System-XSS-04.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259389", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259389", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310122", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/qqqyc/vuln/blob/main/eLearning%20System-XSS-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310122", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json index 21bae6c0e1e..42d7e6c409e 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3347.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3347", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-05T16:15:08.203", - "lastModified": "2024-11-21T09:29:25.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:37:35.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sanchitkmr:airline_ticket_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "372BFE63-287C-4C84-BBD0-2EC286241668" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/thisissuperann/Vul/blob/main/Airline-Ticket-Reservation-System-01.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259451", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259451", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/thisissuperann/Vul/blob/main/Airline-Ticket-Reservation-System-01.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259451", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259451", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310184", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json index 3fae43513bd..c229dd76888 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3363", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-06T09:15:08.093", - "lastModified": "2024-11-21T09:29:27.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:39:16.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:online_library_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "186F3A8F-1536-4F17-A0EE-C498E4012F4B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-05", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259467", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259467", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310429", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-05", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259467", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259467", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.310429", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json index ce647421b12..1e26806ad1c 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3612", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T00:15:07.393", - "lastModified": "2024-11-21T09:29:59.263", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:46:18.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:warehouse_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A3D87A95-4BF0-4185-AA36-E28AA953F740" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260269", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260269", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312700", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260269", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260269", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312700", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json index 46b0bb5c01a..d786aa1aa37 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3613", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T00:15:07.700", - "lastModified": "2024-11-21T09:29:59.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:48:26.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:warehouse_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A3D87A95-4BF0-4185-AA36-E28AA953F740" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260270", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312701", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260270", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260270", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312701", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json index 433b2e594e2..b239b351643 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3614.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3614", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T02:15:46.990", - "lastModified": "2024-11-21T09:29:59.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:47:31.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:warehouse_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A3D87A95-4BF0-4185-AA36-E28AA953F740" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260271", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312703", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS3.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312703", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json index 1d876974075..e8c24da814f 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37020", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:35.190", - "lastModified": "2025-02-13T15:15:18.320", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:20.377", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", - "baseScore": 3.8, - "baseSeverity": "LOW", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.0, - "impactScore": 1.4 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-1281" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-1281" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json new file mode 100644 index 00000000000..2ee0f43c1b2 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-39327", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T17:15:18.440", + "lastModified": "2025-02-18T17:15:18.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Access Control vulnerability in Atos Eviden IDRA before 2.6.1 could allow the possibility to obtain CA signing in an illegitimate way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://eviden.com/solutions/digital-security/digital-identity/", + "source": "cve@mitre.org" + }, + { + "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/view", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json new file mode 100644 index 00000000000..ea7d7ffd417 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-39328", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:20.633", + "lastModified": "2025-02-18T18:15:20.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Permissions in Atos Eviden IDRA and IDCA before 2.7.0. A highly trusted role (Config Admin) could exceed their configuration privileges in a multi-partition environment and access some confidential data. Data integrity and availability is not at risk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://eviden.com/solutions/digital-security/digital-identity/", + "source": "cve@mitre.org" + }, + { + "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/view", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json index b280f58047f..0fed2dc8e11 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39356", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:36.527", - "lastModified": "2025-02-13T15:15:18.507", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:20.850", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", - "baseScore": 7.4, - "baseSeverity": "HIGH", - "attackVector": "ADJACENT_NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 4.0 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-476" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json index 28af6e9462d..f9208882c06 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39365", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:36.670", - "lastModified": "2025-02-13T15:15:18.687", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:21.077", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 6.7, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.8, - "impactScore": 5.9 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json index 1bca431da45..c403bdb8d5e 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39813", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:37.567", - "lastModified": "2025-02-13T15:15:18.883", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:21.553", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 6.7, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.8, - "impactScore": 5.9 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json new file mode 100644 index 00000000000..25b182f1b6f --- /dev/null +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-4028", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-02-18T18:15:25.473", + "lastModified": "2025-02-18T18:15:25.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Keycloak. This issue may allow a privileged attacker to use a malicious payload as the permission while creating items (Resource and Permissions) from the admin console, leading to a stored cross-site scripting (XSS) attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-4028", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276418", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json index 6c461675986..a00f2d9e5c7 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41917", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:38.160", - "lastModified": "2025-02-13T16:16:29.390", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:22.120", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 0.8, "impactScore": 6.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.8, - "impactScore": 6.0 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-367" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-367" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json index 50d012a36a4..b806910dc60 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42405", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:38.477", - "lastModified": "2025-02-13T15:15:19.117", - "vulnStatus": "Received", + "lastModified": "2025-02-18T18:15:22.900", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -80,26 +80,6 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 6.7, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.8, - "impactScore": 5.9 } ] }, @@ -113,16 +93,6 @@ "value": "CWE-427" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-427" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json index 8658a33d6f3..97f362226e1 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46922", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.230", - "lastModified": "2025-02-14T18:15:23.333", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:23.653", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 1480 y 2400. La ausencia de una verificaci\u00f3n nula conduce a una denegaci\u00f3n de servicio en amdgpu_cs_parser_bos en Xclipse Driver." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json index fe37535b827..7158de6247f 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46923", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.347", - "lastModified": "2025-02-14T18:15:23.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:24.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "Se descubri\u00f3 un problema en Samsung Mobile Processor Exynos 2200, 1480 y 2400. La ausencia de una verificaci\u00f3n nula genera una denegaci\u00f3n de servicio en amdgpu_cs_ib_fill en Xclipse Driver." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json index 83a4445c920..2160d09e835 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47264", "sourceIdentifier": "security@synology.com", "published": "2025-02-13T07:15:09.990", - "lastModified": "2025-02-13T15:15:19.400", + "lastModified": "2025-02-18T18:15:24.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 4.9, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.2, - "impactScore": 3.6 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-22" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-22" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json index 0a05c0f8164..7aedafb1567 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48170", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:26.243", - "lastModified": "2025-02-10T18:15:26.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:59:46.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "PHPGurukul Small CRM 3.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de un payload manipulado inyectado en el nombre en profile.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:small_crm:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7E5041FC-F03B-4093-9FA3-33F2158A41C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://medium.com/@jose.inaciot/cve-2024-48170-bee6ccb773d4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json new file mode 100644 index 00000000000..110d9ca5df7 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49589", + "sourceIdentifier": "cve-coordination@palantir.com", + "published": "2025-02-18T18:15:25.300", + "lastModified": "2025-02-18T18:15:25.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Restricted Views backed objects (OSV1) could be bypassed under specific circumstances due to a software bug, this could have allowed users that didn't have permission to see such objects to view them via Object Explorer directly. This software bug did not impact or otherwise make data available across organizational boundaries nor did it allow for data to be viewed or accessed by unauthenticated users. \nThe affected service have been patched and automatically deployed to all Apollo-managed Foundry instances." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@palantir.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@palantir.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16", + "source": "cve-coordination@palantir.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json index f0f01a37ed3..51c448f295b 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4972.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4972", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T09:15:18.277", - "lastModified": "2024-11-21T09:43:58.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:38:56.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D38EAE8E-4A68-4510-891B-4B761B3E9080" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264537", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264537", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335199", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264537", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264537", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335199", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json index 1cf40863012..d5bd3af2f97 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4973", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:10.973", - "lastModified": "2024-11-21T09:43:59.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:41:10.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D38EAE8E-4A68-4510-891B-4B761B3E9080" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264538", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264538", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335200", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264538", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264538", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335200", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json index e64fb70cbb9..de44e788e13 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4974", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:11.973", - "lastModified": "2024-11-21T09:43:59.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:41:36.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D38EAE8E-4A68-4510-891B-4B761B3E9080" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264540", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264540", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264540", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264540", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335205", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json index 6e2c20f8c61..a96f2ef9e90 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4975", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T10:15:12.703", - "lastModified": "2024-11-21T09:43:59.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:42:21.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -120,38 +140,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_chat_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D38EAE8E-4A68-4510-891B-4B761B3E9080" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264539", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264539", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335206", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.264539", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.264539", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.335206", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json new file mode 100644 index 00000000000..5b405f5ae85 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50608.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-50608", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:25.667", + "lastModified": "2025-02-18T18:15:25.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_metrics_ng() at prom_rw_prot.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://fluentbit.io/announcements/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/fluent/fluent-bit/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json new file mode 100644 index 00000000000..5b5dec191d9 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50609.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-50609", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:25.833", + "lastModified": "2025-02-18T18:15:25.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://fluentbit.io/announcements/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/fluent/fluent-bit/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json index 18784870297..a0f37b6bf83 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51122", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.603", - "lastModified": "2025-02-14T17:15:15.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:25.977", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "La vulnerabilidad de Cross Site Scripting en Zertificon Z1 SecureMail Z1 CertServer v.3.16.4-2516-debian12 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros ST, L, O, OU, CN." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51122", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json index 6cd83e5b59b..2cc847b143c 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51123", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.717", - "lastModified": "2025-02-14T17:15:15.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:26.130", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-200" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json index 24f48d81046..d962ec12b90 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51440", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:39.990", - "lastModified": "2025-02-14T17:15:16.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:26.283", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-269" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://sharedobject.blog/posts/nothing-bpf/", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json new file mode 100644 index 00000000000..a53463511a2 --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51505", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:26.420", + "lastModified": "2025-02-18T18:15:26.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Atos Eviden IDRA before 2.7.1. A highly trusted role (Config Admin) could leverage a race condition to escalate privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://eviden.com", + "source": "cve@mitre.org" + }, + { + "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/view", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json index 729e62713af..ea260666fcf 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53704", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.203", - "lastModified": "2025-02-18T15:15:16.290", + "lastModified": "2025-02-18T17:15:18.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "Una vulnerabilidad de autenticaci\u00f3n incorrecta en SSLVPN authentication mechanism permite a un atacante remoto eludir la autenticaci\u00f3n." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", - "baseScore": 8.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 4.2 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "PSIRT@sonicwall.com", diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json index 6301a4117d6..5db8c5418e9 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54916", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.227", - "lastModified": "2025-02-12T16:15:42.160", + "lastModified": "2025-02-18T18:15:26.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Un problema en la clase SharedConfig de Telegram Android APK v.11.7.0 permite que un atacante f\u00edsicamente pr\u00f3ximo evite la autenticaci\u00f3n y escale privilegios manipulando el valor de retorno del m\u00e9todo checkPasscode." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "attackVector": "PHYSICAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-287" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://drive.google.com/file/d/1knf8-_fFUSLd3ZmbEpy0_OVzSN1UR1JR/view?usp=sharing", diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json new file mode 100644 index 00000000000..b7505242f82 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55460.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55460", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T17:15:19.013", + "lastModified": "2025-02-18T17:15:19.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A time-based SQL injection vulnerability in the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 allows attackers to execute arbitrary code via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Ap0k4L1p5/CVE-research/tree/master/CVE-2024-55460", + "source": "cve@mitre.org" + }, + { + "url": "https://sgsrs.boardroomlimited.com/taxelection/login.aspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json new file mode 100644 index 00000000000..79261c95203 --- /dev/null +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56882.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56882", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:26.830", + "lastModified": "2025-02-18T18:15:26.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cves.at/posts/cve-cve-2024-56882/writeup/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json new file mode 100644 index 00000000000..94d5c784799 --- /dev/null +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56883.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56883", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:27.287", + "lastModified": "2025-02-18T18:15:27.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the \"id\" parameter is replaced with the ID of another user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cves.at/posts/cve-cve-2024-56883/writeup/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json index eddef4efd70..c75ae8ae323 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56940", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.643", - "lastModified": "2025-02-14T17:15:16.590", + "lastModified": "2025-02-18T18:15:27.463", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Un problema en la funci\u00f3n de carga de im\u00e1genes de perfil de LearnDash v6.7.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante cargas excesivas de archivos." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-770" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json index 021019f5a97..874f842c5db 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57601", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.747", - "lastModified": "2025-02-14T17:15:16.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:27.663", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "La vulnerabilidad de Cross Site Scripting en Alex Tselegidis EasyAppointments v.1.5.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro legal_settings." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://hkohi.ca/vulnerability/13", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json index 705f427b4e0..7c6d2d137db 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57604", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:41.100", - "lastModified": "2025-02-14T17:15:17.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:27.827", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "Un problema en MaysWind ezBookkeeping 0.7.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente token." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-269" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/mayswind/ezbookkeeping/issues/33", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json index a2b15e49aca..44e85ce75d1 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57605", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:41.210", - "lastModified": "2025-02-14T17:15:17.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:15:27.983", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,42 +15,7 @@ "value": "La vulnerabilidad de Cross Site Scripting en Daylight Studio Fuel CMS v.1.5.2 permite a un atacante escalar privilegios a trav\u00e9s de los componentes /fuel/blocks/ y /fuel/pages." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 5.4, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.3, - "impactScore": 2.7 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://hkohi.ca/vulnerability/3", diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json index 83c0d11e1d4..31ebdb1bf3f 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57970", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-16T04:15:21.843", - "lastModified": "2025-02-18T15:15:17.343", + "lastModified": "2025-02-18T17:15:19.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", - "baseScore": 4.0, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.5, - "impactScore": 1.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-126" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-126" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json index d1977e55f6b..2b8f1599ac0 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7809", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T02:15:03.763", - "lastModified": "2024-08-19T18:11:18.537", + "lastModified": "2025-02-18T17:36:46.073", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -159,8 +159,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7842.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7842.json index ddd03504ca0..a7d2073223d 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7842.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7842.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7842", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T22:15:07.310", - "lastModified": "2024-08-21T14:13:38.923", + "lastModified": "2025-02-18T17:37:49.770", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -159,8 +159,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7843.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7843.json index 56fbd54aa5e..8b576c6c457 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7843.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7843.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7843", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T23:15:10.453", - "lastModified": "2024-08-21T14:13:11.157", + "lastModified": "2025-02-18T17:39:02.267", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -159,8 +159,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7844.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7844.json index 5aa7130dc23..62811413ae5 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7844.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7844.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7844", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T23:15:10.740", - "lastModified": "2024-08-21T14:12:43.497", + "lastModified": "2025-02-18T17:38:06.470", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7845.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7845.json index ae78d4ddf3a..64399e9fc90 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7845.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7845", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-16T02:15:18.080", - "lastModified": "2024-09-26T15:10:57.870", + "lastModified": "2025-02-18T17:39:16.643", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json index a4e1d3b315c..3883992fd03 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7931.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7931", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-19T22:15:06.980", - "lastModified": "2024-08-21T14:08:54.820", + "lastModified": "2025-02-18T17:38:19.927", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json index c94b0e198a6..e40984bbb83 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7949.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7949", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-20T02:15:06.817", - "lastModified": "2024-08-21T19:15:13.600", - "vulnStatus": "Modified", + "lastModified": "2025-02-18T17:36:38.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -149,8 +149,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tamparongj_03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5125D70E-82BD-42A9-9230-B74E92A5688E" + "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5" } ] } @@ -193,7 +193,10 @@ }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json index 5c92e0fa024..b77ff195e2b 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0054.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0054", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:09.650", - "lastModified": "2025-02-11T06:15:19.863", + "lastModified": "2025-02-18T18:15:28.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 5.4, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.3, - "impactScore": 2.7 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json index 28f5d06cbcb..918946bd97f 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0064.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0064", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:09.803", - "lastModified": "2025-02-11T15:15:19.070", + "lastModified": "2025-02-18T18:15:28.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", - "baseScore": 8.7, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.3, - "impactScore": 5.8 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-732" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-732" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json index 3bef6234139..2248acee486 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0506", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:14.360", - "lastModified": "2025-02-12T15:15:15.613", + "lastModified": "2025-02-18T18:15:28.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", - "baseScore": 6.4, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.1, - "impactScore": 2.7 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json index db6bcd68e70..6e0ce198e74 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0525.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0525", "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T10:15:09.490", - "lastModified": "2025-02-11T15:15:19.370", + "lastModified": "2025-02-18T18:15:28.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,42 +59,8 @@ "providerUrgency": "NOT_DEFINED" } } - ], - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 - } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-200" - } - ] - } - ], "references": [ { "url": "https://advisories.octopus.com/post/2024/sa2025-02/", diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json index d23996430a7..bc5c9932295 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0526.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0526", "sourceIdentifier": "security@octopus.com", "published": "2025-02-11T11:15:15.923", - "lastModified": "2025-02-11T15:15:19.520", + "lastModified": "2025-02-18T18:15:28.993", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,42 +59,8 @@ "providerUrgency": "NOT_DEFINED" } } - ], - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-22" - } - ] - } - ], "references": [ { "url": "https://advisories.octopus.com/post/2024/sa2025-03/", diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json index 38bd5d8b038..a1c4ffb9319 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0934.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0934", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-31T20:15:32.893", - "lastModified": "2025-01-31T20:15:32.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T18:49:12.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment_call_job_search_ajax-sqli.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.294243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.294243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.491802", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json index cb0d742e10c..3bf88244eba 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0995.json @@ -2,20 +2,47 @@ "id": "CVE-2025-0995", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.127", - "lastModified": "2025-02-15T02:15:09.127", + "lastModified": "2025-02-18T17:15:19.383", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in V8 in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free en V8 en Google Chrome anterior a 133.0.6943.98 permiti\u00f3 que un atacante remoto potencialmente explotara la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json index 71847b9868a..c1d11a2fdef 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0996.json @@ -2,16 +2,43 @@ "id": "CVE-2025-0996", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.260", - "lastModified": "2025-02-15T02:15:09.260", + "lastModified": "2025-02-18T18:15:29.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in Browser UI in Google Chrome on Android prior to 133.0.6943.98 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n inadecuada en la interfaz de usuario del navegador en Google Chrome para Android anterior a la versi\u00f3n 133.0.6943.98 permiti\u00f3 que un atacante remoto falsificara el contenido del cuadro multifunci\u00f3n (barra de URL) a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,16 @@ "value": "CWE-1007" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1007" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json index 97f0894fd01..73231635b96 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0997.json @@ -2,20 +2,47 @@ "id": "CVE-2025-0997", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.377", - "lastModified": "2025-02-15T02:15:09.377", + "lastModified": "2025-02-18T18:15:29.347", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Navigation in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free en la navegaci\u00f3n en Google Chrome anterior a la versi\u00f3n 133.0.6943.98 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una extensi\u00f3n de Chrome manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json index 4281ddd8f86..63c2e4eba8c 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json @@ -2,20 +2,47 @@ "id": "CVE-2025-0998", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.483", - "lastModified": "2025-02-15T02:15:09.483", + "lastModified": "2025-02-18T18:15:29.550", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds memory access in V8 in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "El acceso a la memoria fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 133.0.6943.98 permiti\u00f3 que un atacante remoto ejecutara c\u00f3digo arbitrario dentro de un entorno protegido a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json index d90b21cc924..dfda67182fc 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1143.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1143", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-02-11T04:15:08.163", - "lastModified": "2025-02-11T06:15:20.100", + "lastModified": "2025-02-18T18:15:29.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.4, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.5, - "impactScore": 5.9 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-798" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-798" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json index 6dc91e512f5..434e7c08116 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1145.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1145", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-02-11T04:15:08.480", - "lastModified": "2025-02-11T06:15:20.510", + "lastModified": "2025-02-18T18:15:29.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json index 9c1da983b0e..5e00b4ffdd8 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1160", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T23:15:15.387", - "lastModified": "2025-02-11T15:15:19.790", + "lastModified": "2025-02-18T18:15:30.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -138,16 +118,6 @@ "value": "CWE-1392" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-1392" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json index 13cba7392f7..fb3ec322562 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1162.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1162", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T23:15:15.553", - "lastModified": "2025-02-11T15:15:20.047", + "lastModified": "2025-02-18T18:15:30.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json index cb84fad98ae..86711519030 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1165.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1165", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T01:15:09.947", - "lastModified": "2025-02-11T06:15:20.700", + "lastModified": "2025-02-18T18:15:30.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-434" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json index f4fb6ae885b..339b04c2e8f 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1166.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1166", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.100", - "lastModified": "2025-02-11T06:15:20.937", + "lastModified": "2025-02-18T18:15:30.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-434" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json index 9db6d332ff5..af37b20b5f3 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1167.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1167", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.570", - "lastModified": "2025-02-11T06:15:21.153", + "lastModified": "2025-02-18T18:15:30.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json index 1c99faf4115..baf526d45fd 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1168.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1168", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T02:15:37.733", - "lastModified": "2025-02-11T06:15:21.367", + "lastModified": "2025-02-18T18:15:31.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json index a8f21164e55..d9ad3ca6ea1 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1169", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T03:15:07.640", - "lastModified": "2025-02-11T06:15:21.570", + "lastModified": "2025-02-18T18:15:31.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", - "baseScore": 3.5, - "baseSeverity": "LOW", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.1, - "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-94" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json index 54818fd2cd9..25116dc0114 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1170", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T03:15:07.810", - "lastModified": "2025-02-11T06:15:21.800", + "lastModified": "2025-02-18T18:15:31.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", - "baseScore": 3.5, - "baseSeverity": "LOW", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.1, - "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-94" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json index ef18f331fd2..2d210c13b55 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1171", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T04:15:08.630", - "lastModified": "2025-02-11T06:15:22.010", + "lastModified": "2025-02-18T18:15:31.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", - "baseScore": 3.5, - "baseSeverity": "LOW", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.1, - "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-94" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json index 68086a01890..f0abaab1d40 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1172", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T04:15:08.800", - "lastModified": "2025-02-11T06:15:22.230", + "lastModified": "2025-02-18T18:15:31.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json index 4c36aae6ea7..a91ae430a44 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1173", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T05:15:13.530", - "lastModified": "2025-02-11T05:15:13.530", + "lastModified": "2025-02-18T18:15:32.097", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -63,27 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 4.7, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 1.2, - "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json index ef001c79e20..004f8dd2a76 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1183", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:07.863", - "lastModified": "2025-02-12T15:15:16.520", + "lastModified": "2025-02-18T18:15:32.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json index 0254abf057b..cdc86ce4b4a 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1184", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:08.410", - "lastModified": "2025-02-12T15:15:16.723", + "lastModified": "2025-02-18T18:15:32.483", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json index 22c7f7239ff..92a4ce039ae 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1185", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T08:15:08.870", - "lastModified": "2025-02-12T15:15:16.917", + "lastModified": "2025-02-18T18:15:32.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-74" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json index 016d910a396..0242a6dbc60 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1186", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T08:15:09.153", - "lastModified": "2025-02-12T15:15:17.140", + "lastModified": "2025-02-18T18:15:32.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-502" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-502" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json index 2e2909378d4..c1f2633b376 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1188", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T09:15:08.803", - "lastModified": "2025-02-12T15:15:17.407", + "lastModified": "2025-02-18T18:15:33.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json index 02a40cc88d4..37172ebf1bc 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1190.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1190", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T10:15:14.740", - "lastModified": "2025-02-12T10:15:14.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:47:00.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,73 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment-load_applicants-xss.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295096", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295096", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496670", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json index 777bb088768..578fe3ca027 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1191.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1191", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T11:15:08.480", - "lastModified": "2025-02-12T11:15:08.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T17:51:51.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9215127-FF2A-4CDB-9B49-188F8D10ED7D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Keyand/Multi-Restaurant-Table-Reservation-System-Search/blob/main/Multi%20Restaurant%20Table%20Reservation%20System%20approve-reject.php%20has%20Sqlinjection.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295097", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295097", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json index fd7ffa61f5a..2ce68fce3a6 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1192.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1192", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T11:15:10.727", - "lastModified": "2025-02-12T11:15:10.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T17:52:35.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9215127-FF2A-4CDB-9B49-188F8D10ED7D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Keyand/Multi-Restaurant-Table-Reservation-System-Search/blob/main/Multi%20Restaurant%20Table%20Reservation%20System%20select-menu.php%20has%20Sqlinjection.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295098", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295098", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496730", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json index 80e8db11cc8..2dc8e1d8a09 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1197", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:08.983", - "lastModified": "2025-02-12T15:15:17.670", + "lastModified": "2025-02-18T18:15:33.303", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-89" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json index 80fce8530bd..fa6faa0fce4 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1199.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1199", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:09.537", - "lastModified": "2025-02-12T13:15:09.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:06:10.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "171FB833-CA5D-4229-B7BB-D0439B34A990" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yesec/Best-church-management-software/blob/main/role_crud.php_SQLi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295107", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295107", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496946", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json index 9295c00c407..c397cc5f8ec 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1201.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1201", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T14:15:32.297", - "lastModified": "2025-02-12T14:15:32.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:01:07.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "171FB833-CA5D-4229-B7BB-D0439B34A990" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yesec/Best-church-management-software/blob/main/profile_crud.php_SQLi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295109", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295109", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json index cfd856a6cb0..f2e9c3995ce 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1202", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T15:15:17.920", - "lastModified": "2025-02-12T15:15:17.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:02:04.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "171FB833-CA5D-4229-B7BB-D0439B34A990" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yesec/Best-church-management-software/blob/main/edit_slider.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295110", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295110", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496954", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json index de2095bd9fb..935b14ec323 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1358", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T20:15:07.990", - "lastModified": "2025-02-18T15:15:18.157", + "lastModified": "2025-02-18T17:15:19.737", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -80,26 +80,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -142,16 +122,6 @@ "value": "CWE-862" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-352" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json index 5cbb27c1b2f..88f82a3be6d 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21401", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-15T00:15:27.163", - "lastModified": "2025-02-18T15:15:18.357", + "lastModified": "2025-02-18T17:15:20.057", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", - "baseScore": 4.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 1.0, - "impactScore": 3.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-601" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-601" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json index 89911e8dfff..3a51abffef5 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22480", "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-13T16:16:48.777", - "lastModified": "2025-02-13T16:16:48.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T18:39:56.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-61" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:supportassist:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5.13.1", + "matchCriteriaId": "7446C348-8779-4BDC-BC2D-ECB76D81050A" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000275712/dsa-2025-051", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json index 396dff43726..e61e4f36fcc 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23187.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23187", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:10.117", - "lastModified": "2025-02-11T15:15:21.037", + "lastModified": "2025-02-18T18:15:33.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 1.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-862" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-862" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json index a2a0c235fc6..51f500a02f0 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24200", "sourceIdentifier": "product-security@apple.com", "published": "2025-02-10T19:15:40.107", - "lastModified": "2025-02-13T16:24:24.953", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-18T18:15:33.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,26 +36,6 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 4.6, - "baseSeverity": "MEDIUM", - "attackVector": "PHYSICAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 0.9, - "impactScore": 3.6 } ] }, @@ -73,16 +53,6 @@ "value": "CWE-863" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-863" - } - ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json index 16582b41638..75e5306b186 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24869.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24869", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.140", - "lastModified": "2025-02-11T06:15:22.913", + "lastModified": "2025-02-18T18:15:33.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 1.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-863" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-863" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json index 99589f6ed1a..69ccfefa7e0 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24870.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24870", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.280", - "lastModified": "2025-02-11T06:15:23.113", + "lastModified": "2025-02-18T18:15:33.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 1.5, "impactScore": 4.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", - "baseScore": 6.0, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.5, - "impactScore": 4.0 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-921" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-921" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json index 8ca67653d02..3eb000e244c 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24872.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24872", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.437", - "lastModified": "2025-02-11T06:15:23.310", + "lastModified": "2025-02-18T18:15:34.153", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "baseScore": 4.3, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 1.4 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-863" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-863" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json index e2c427c0185..d4101c465fb 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24874.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24874", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.580", - "lastModified": "2025-02-11T06:15:23.523", + "lastModified": "2025-02-18T18:15:34.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.6, - "impactScore": 5.2 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-1021" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-1021" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json index 96e7ad1083c..2c534dd1922 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24875.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24875", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.733", - "lastModified": "2025-02-11T06:15:23.720", + "lastModified": "2025-02-18T18:15:34.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.6, - "impactScore": 5.2 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-352" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-352" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json index fc50705dbec..4aa3b348f20 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24876.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24876", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:11.887", - "lastModified": "2025-02-11T06:15:23.923", + "lastModified": "2025-02-18T18:15:34.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", - "baseScore": 8.1, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.2 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-601" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-601" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json index d5fe922103b..448aad41ec8 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25241.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25241", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:12.027", - "lastModified": "2025-02-11T06:15:24.120", + "lastModified": "2025-02-18T18:15:34.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 5.4, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.5 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-862" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-862" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json index fd12b7d8429..234fd0d3070 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25243.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25243", "sourceIdentifier": "cna@sap.com", "published": "2025-02-11T01:15:12.170", - "lastModified": "2025-02-11T06:15:24.330", + "lastModified": "2025-02-18T18:15:35.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", - "baseScore": 8.6, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 4.0 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-22" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-22" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json new file mode 100644 index 00000000000..34f6e61e8e2 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-25300", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-18T18:15:35.330", + "lastModified": "2025-02-18T18:15:35.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel=\"noopener\"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel=\"noopener\"` is imposed on all `target=\"_blank\"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ain/smartbanner.js/commit/fce8c31dfe04033d9d005a89694d3e7a60784f89", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json index 238ed1c5425..b2048393d7c 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25898", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.867", - "lastModified": "2025-02-18T14:59:38.510", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-18T18:15:35.503", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-787" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json b/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json new file mode 100644 index 00000000000..0332896c044 --- /dev/null +++ b/CVE-2025/CVE-2025-260xx/CVE-2025-26058.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-26058", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T18:15:35.653", + "lastModified": "2025-02-18T18:15:35.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Webkul QloApps v1.6.1 exposes authentication tokens in URLs during redirection. When users access the admin panel or other protected areas, the application appends sensitive authentication tokens directly to the URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mano257200/QloApps-VUL", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json index 9bbfec65465..6872e82cdb6 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26344", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.273", - "lastModified": "2025-02-12T15:15:18.757", + "lastModified": "2025-02-18T18:15:35.783", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-306" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-306" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json index bc80e6d6309..429d42aa2aa 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26345", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.407", - "lastModified": "2025-02-12T15:15:18.930", + "lastModified": "2025-02-18T18:15:35.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-306" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-306" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json index c4bce30c330..aef481bda0b 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26408.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26408", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.617", - "lastModified": "2025-02-11T15:15:21.377", + "lastModified": "2025-02-18T18:15:36.097", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "Se puede acceder a la interfaz JTAG de los dispositivos Wattsense Bridge mediante acceso f\u00edsico a la PCB. Despu\u00e9s de conectarse a la interfaz, es posible acceder por completo al dispositivo. Esto permite a un atacante extraer informaci\u00f3n, modificar y depurar el firmware del dispositivo. Todas las versiones conocidas se ven afectadas." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "PHYSICAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 0.9, - "impactScore": 5.2 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", @@ -49,16 +26,6 @@ "value": "CWE-1191" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-1191" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json index d148b0857a6..40700fb5815 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26409.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26409", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.743", - "lastModified": "2025-02-11T15:15:21.537", + "lastModified": "2025-02-18T18:15:36.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "Se puede acceder a una interfaz serial con acceso f\u00edsico a la PCB de los dispositivos Wattsense Bridge. Despu\u00e9s de conectarse a la interfaz, es posible acceder al gestor de arranque, as\u00ed como a un mensaje de inicio de sesi\u00f3n de Linux. El acceso al gestor de arranque se puede utilizar para obtener un shell ra\u00edz en el dispositivo. Este problema se ha solucionado en las versiones de firmware recientes BSP >= 6.4.1." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "attackVector": "PHYSICAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 0.9, - "impactScore": 5.9 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", @@ -53,16 +30,6 @@ "value": "CWE-1299" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-1299" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json index 67ef6b8f431..8d6f05c0fdf 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26410", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.863", - "lastModified": "2025-02-11T15:15:21.700", + "lastModified": "2025-02-18T18:15:36.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "El firmware de todos los dispositivos Wattsense Bridge contiene las mismas credenciales de usuario y ra\u00edz codificadas. La contrase\u00f1a de usuario se puede recuperar f\u00e1cilmente mediante intentos de descifrado de contrase\u00f1as. Las credenciales recuperadas se pueden utilizar para iniciar sesi\u00f3n en el dispositivo a trav\u00e9s del shell de inicio de sesi\u00f3n que est\u00e1 expuesto por la interfaz serial. El usuario de puerta trasera se ha eliminado en el firmware BSP >= 6.4.1." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", @@ -49,16 +26,6 @@ "value": "CWE-798" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-798" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json index 3a49ed3124f..564f675549f 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26411.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26411", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.973", - "lastModified": "2025-02-11T15:15:21.847", + "lastModified": "2025-02-18T18:15:36.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "Un atacante autenticado puede usar el Administrador de complementos de la interfaz web de los dispositivos Wattsense Bridge para cargar archivos Python maliciosos en el dispositivo. Esto le permite a un atacante obtener acceso remoto a la ra\u00edz del dispositivo. Un atacante necesita una cuenta de usuario v\u00e1lida en la interfaz web de Wattsense para poder llevar a cabo este ataque. Este problema se solucion\u00f3 en las versiones recientes de firmware BSP >= 6.1.0." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", @@ -49,16 +26,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-434" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json index 447f9fc0846..a52d7415772 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26543", "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:19.707", - "lastModified": "2025-02-13T15:15:21.080", + "lastModified": "2025-02-18T18:15:36.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", - "baseScore": 7.1, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.7 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-352" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-352" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json new file mode 100644 index 00000000000..bc3576d3db6 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-26620", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-18T18:15:36.767", + "lastModified": "2025-02-18T18:15:36.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Duende.AccessTokenManagement is a set of .NET libraries that manage OAuth and OpenId Connect access tokens. Duende.AccessTokenManagement contains a race condition when requesting access tokens using the client credentials flow. Concurrent requests to obtain an access token using differing protocol parameters can return access tokens obtained with the wrong scope, resource indicator, or other protocol parameters. Such usage is somewhat atypical, and only a small percentage of users are likely to be affected. Duende.AccessTokenManagement can request access tokens using the client credentials flow in several ways. In basic usage, the client credentials flow is configured once and the parameters do not vary. In more advanced situations, requests with varying protocol parameters may be made by calling specific overloads of these methods: `HttpContext.GetClientAccessTokenAsync()` and `IClientCredentialsTokenManagementService.GetAccessTokenAsync()`. There are overloads of both of these methods that accept a `TokenRequestParameters` object that customizes token request parameters. However, concurrent requests with varying `TokenRequestParameters` will result in the same token for all concurrent calls. Most users can simply update the NuGet package to the latest version. Customizations of the `IClientCredentialsTokenCache` that derive from the default implementation (`DistributedClientCredentialsTokenCache`) will require a small code change, as its constructor was changed to add a dependency on the `ITokenRequestSynchronization` service. The synchronization service will need to be injected into the derived class and passed to the base constructor. The impact of this vulnerability depends on how Duende.AccessTokenManagement is used and on the security architecture of the solution. Most users will not be vulnerable to this issue. More advanced users may run into this issue by calling the methods specified above with customized token request parameters. The impact of obtaining an access token with different than intended protocol parameters will vary depending on application logic, security architecture, and the authorization policy of the resource servers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DuendeSoftware/foss/commit/a33332ddec0ebf3c048ba85427e3c77d47c68dac", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/DuendeSoftware/foss/security/advisories/GHSA-qxj7-2x7w-3mpp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 837b3b8d2a9..5ae0afb986f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-18T17:01:33.653463+00:00 +2025-02-18T19:00:55.301513+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-18T17:00:05.117000+00:00 +2025-02-18T18:59:46.050000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281644 +281658 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `14` -- [CVE-2024-13689](CVE-2024/CVE-2024-136xx/CVE-2024-13689.json) (`2025-02-18T15:15:15.547`) -- [CVE-2024-57045](CVE-2024/CVE-2024-570xx/CVE-2024-57045.json) (`2025-02-18T15:15:16.677`) -- [CVE-2024-57046](CVE-2024/CVE-2024-570xx/CVE-2024-57046.json) (`2025-02-18T15:15:16.783`) -- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-02-18T15:15:16.890`) -- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-02-18T15:15:16.977`) -- [CVE-2025-21702](CVE-2025/CVE-2025-217xx/CVE-2025-21702.json) (`2025-02-18T15:15:18.530`) -- [CVE-2025-21703](CVE-2025/CVE-2025-217xx/CVE-2025-21703.json) (`2025-02-18T15:15:18.633`) -- [CVE-2025-22207](CVE-2025/CVE-2025-222xx/CVE-2025-22207.json) (`2025-02-18T16:15:20.467`) +- [CVE-2022-41545](CVE-2022/CVE-2022-415xx/CVE-2022-41545.json) (`2025-02-18T18:15:13.450`) +- [CVE-2024-39327](CVE-2024/CVE-2024-393xx/CVE-2024-39327.json) (`2025-02-18T17:15:18.440`) +- [CVE-2024-39328](CVE-2024/CVE-2024-393xx/CVE-2024-39328.json) (`2025-02-18T18:15:20.633`) +- [CVE-2024-4028](CVE-2024/CVE-2024-40xx/CVE-2024-4028.json) (`2025-02-18T18:15:25.473`) +- [CVE-2024-49589](CVE-2024/CVE-2024-495xx/CVE-2024-49589.json) (`2025-02-18T18:15:25.300`) +- [CVE-2024-50608](CVE-2024/CVE-2024-506xx/CVE-2024-50608.json) (`2025-02-18T18:15:25.667`) +- [CVE-2024-50609](CVE-2024/CVE-2024-506xx/CVE-2024-50609.json) (`2025-02-18T18:15:25.833`) +- [CVE-2024-51505](CVE-2024/CVE-2024-515xx/CVE-2024-51505.json) (`2025-02-18T18:15:26.420`) +- [CVE-2024-55460](CVE-2024/CVE-2024-554xx/CVE-2024-55460.json) (`2025-02-18T17:15:19.013`) +- [CVE-2024-56882](CVE-2024/CVE-2024-568xx/CVE-2024-56882.json) (`2025-02-18T18:15:26.830`) +- [CVE-2024-56883](CVE-2024/CVE-2024-568xx/CVE-2024-56883.json) (`2025-02-18T18:15:27.287`) +- [CVE-2025-25300](CVE-2025/CVE-2025-253xx/CVE-2025-25300.json) (`2025-02-18T18:15:35.330`) +- [CVE-2025-26058](CVE-2025/CVE-2025-260xx/CVE-2025-26058.json) (`2025-02-18T18:15:35.653`) +- [CVE-2025-26620](CVE-2025/CVE-2025-266xx/CVE-2025-26620.json) (`2025-02-18T18:15:36.767`) ### CVEs modified in the last Commit -Recently modified CVEs: `87` +Recently modified CVEs: `183` -- [CVE-2024-2849](CVE-2024/CVE-2024-28xx/CVE-2024-2849.json) (`2025-02-18T16:57:52.660`) -- [CVE-2024-2930](CVE-2024/CVE-2024-29xx/CVE-2024-2930.json) (`2025-02-18T17:00:05.117`) -- [CVE-2024-31144](CVE-2024/CVE-2024-311xx/CVE-2024-31144.json) (`2025-02-18T15:15:16.050`) -- [CVE-2024-41710](CVE-2024/CVE-2024-417xx/CVE-2024-41710.json) (`2025-02-18T15:28:00.123`) -- [CVE-2024-46740](CVE-2024/CVE-2024-467xx/CVE-2024-46740.json) (`2025-02-18T16:15:17.540`) -- [CVE-2024-50090](CVE-2024/CVE-2024-500xx/CVE-2024-50090.json) (`2025-02-18T16:15:17.740`) -- [CVE-2024-50282](CVE-2024/CVE-2024-502xx/CVE-2024-50282.json) (`2025-02-18T16:15:17.927`) -- [CVE-2024-53061](CVE-2024/CVE-2024-530xx/CVE-2024-53061.json) (`2025-02-18T16:15:18.113`) -- [CVE-2024-53192](CVE-2024/CVE-2024-531xx/CVE-2024-53192.json) (`2025-02-18T16:15:18.313`) -- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-02-18T15:15:16.290`) -- [CVE-2024-56180](CVE-2024/CVE-2024-561xx/CVE-2024-56180.json) (`2025-02-18T15:15:16.500`) -- [CVE-2024-56557](CVE-2024/CVE-2024-565xx/CVE-2024-56557.json) (`2025-02-18T16:15:18.597`) -- [CVE-2024-56642](CVE-2024/CVE-2024-566xx/CVE-2024-56642.json) (`2025-02-18T16:15:18.770`) -- [CVE-2024-57725](CVE-2024/CVE-2024-577xx/CVE-2024-57725.json) (`2025-02-18T15:15:17.067`) -- [CVE-2024-57778](CVE-2024/CVE-2024-577xx/CVE-2024-57778.json) (`2025-02-18T15:15:17.207`) -- [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-18T15:15:17.343`) -- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2025-02-18T16:15:19.110`) -- [CVE-2025-1298](CVE-2025/CVE-2025-12xx/CVE-2025-1298.json) (`2025-02-18T15:15:18.007`) -- [CVE-2025-1358](CVE-2025/CVE-2025-13xx/CVE-2025-1358.json) (`2025-02-18T15:15:18.157`) -- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-02-18T15:15:18.357`) -- [CVE-2025-25530](CVE-2025/CVE-2025-255xx/CVE-2025-25530.json) (`2025-02-18T16:15:20.723`) -- [CVE-2025-25897](CVE-2025/CVE-2025-258xx/CVE-2025-25897.json) (`2025-02-18T15:00:36.487`) -- [CVE-2025-25990](CVE-2025/CVE-2025-259xx/CVE-2025-25990.json) (`2025-02-18T15:15:18.790`) -- [CVE-2025-25994](CVE-2025/CVE-2025-259xx/CVE-2025-25994.json) (`2025-02-18T15:15:18.923`) -- [CVE-2025-25997](CVE-2025/CVE-2025-259xx/CVE-2025-25997.json) (`2025-02-18T15:15:19.063`) +- [CVE-2025-1197](CVE-2025/CVE-2025-11xx/CVE-2025-1197.json) (`2025-02-18T18:15:33.303`) +- [CVE-2025-1199](CVE-2025/CVE-2025-11xx/CVE-2025-1199.json) (`2025-02-18T18:06:10.360`) +- [CVE-2025-1201](CVE-2025/CVE-2025-12xx/CVE-2025-1201.json) (`2025-02-18T18:01:07.620`) +- [CVE-2025-1202](CVE-2025/CVE-2025-12xx/CVE-2025-1202.json) (`2025-02-18T18:02:04.383`) +- [CVE-2025-1358](CVE-2025/CVE-2025-13xx/CVE-2025-1358.json) (`2025-02-18T17:15:19.737`) +- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-02-18T17:15:20.057`) +- [CVE-2025-22480](CVE-2025/CVE-2025-224xx/CVE-2025-22480.json) (`2025-02-18T18:39:56.053`) +- [CVE-2025-23187](CVE-2025/CVE-2025-231xx/CVE-2025-23187.json) (`2025-02-18T18:15:33.497`) +- [CVE-2025-24200](CVE-2025/CVE-2025-242xx/CVE-2025-24200.json) (`2025-02-18T18:15:33.667`) +- [CVE-2025-24869](CVE-2025/CVE-2025-248xx/CVE-2025-24869.json) (`2025-02-18T18:15:33.810`) +- [CVE-2025-24870](CVE-2025/CVE-2025-248xx/CVE-2025-24870.json) (`2025-02-18T18:15:33.987`) +- [CVE-2025-24872](CVE-2025/CVE-2025-248xx/CVE-2025-24872.json) (`2025-02-18T18:15:34.153`) +- [CVE-2025-24874](CVE-2025/CVE-2025-248xx/CVE-2025-24874.json) (`2025-02-18T18:15:34.330`) +- [CVE-2025-24875](CVE-2025/CVE-2025-248xx/CVE-2025-24875.json) (`2025-02-18T18:15:34.493`) +- [CVE-2025-24876](CVE-2025/CVE-2025-248xx/CVE-2025-24876.json) (`2025-02-18T18:15:34.673`) +- [CVE-2025-25241](CVE-2025/CVE-2025-252xx/CVE-2025-25241.json) (`2025-02-18T18:15:34.967`) +- [CVE-2025-25243](CVE-2025/CVE-2025-252xx/CVE-2025-25243.json) (`2025-02-18T18:15:35.160`) +- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-18T18:15:35.503`) +- [CVE-2025-26344](CVE-2025/CVE-2025-263xx/CVE-2025-26344.json) (`2025-02-18T18:15:35.783`) +- [CVE-2025-26345](CVE-2025/CVE-2025-263xx/CVE-2025-26345.json) (`2025-02-18T18:15:35.940`) +- [CVE-2025-26408](CVE-2025/CVE-2025-264xx/CVE-2025-26408.json) (`2025-02-18T18:15:36.097`) +- [CVE-2025-26409](CVE-2025/CVE-2025-264xx/CVE-2025-26409.json) (`2025-02-18T18:15:36.230`) +- [CVE-2025-26410](CVE-2025/CVE-2025-264xx/CVE-2025-26410.json) (`2025-02-18T18:15:36.357`) +- [CVE-2025-26411](CVE-2025/CVE-2025-264xx/CVE-2025-26411.json) (`2025-02-18T18:15:36.473`) +- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-18T18:15:36.597`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1a0e0a7dc30..b07379e4066 100644 --- a/_state.csv +++ b/_state.csv @@ -106981,7 +106981,7 @@ CVE-2017-6889,0,0,018364325a3e0fac2dc4b41278cd9bdc4de0c0d65da4443987d01f7570a102 CVE-2017-6890,0,0,52498a7329ef340ecd2ec731470a9af21ffa666ab23f7e9f4c385c92424bb39b,2024-11-21T03:30:44.153000 CVE-2017-6891,0,0,6e28c13a3351e00cb4015ef462aa93654e47f11362b3c6db7e1dbb8768e36b9f,2024-11-21T03:30:44.277000 CVE-2017-6892,0,0,09c34e9956d1de758f5c038b7b4e8c2e980dd001d0d3f9326c0eedefe670054e,2024-11-21T03:30:44.423000 -CVE-2017-6894,0,0,1d1f151069e7f14904e8f405f8337287e0b938d9cbfe312df4dc5048099f78e5,2024-11-21T03:30:44.550000 +CVE-2017-6894,0,1,b2ac7ba1edf0ccb65f2fdb3569ce3c35f56d17a58ad06f17c66a4e49cf450799,2025-02-18T18:15:08.657000 CVE-2017-6895,0,0,385777a91e129f04ef9c2f41f5ea92f187b5c571031dfc26a284b1e4d4dd3cdf,2024-11-21T03:30:44.670000 CVE-2017-6896,0,0,43e62fddfb9b3d090b07865cdff9756997ae3ab90698ff732c9d636c3d3065ae,2024-11-21T03:30:44.830000 CVE-2017-6899,0,0,33bc851fc224274ec8219b7028214b1fb5cebb33d5905397969634dc360a28f0,2024-11-21T03:30:44.990000 @@ -149123,7 +149123,7 @@ CVE-2020-1413,0,0,975428d8492505474ee413ccc5f42b40886bab2909613de2f0e69ae434d5f2 CVE-2020-14130,0,0,1ffd29468bc116ef62a7b8f93edfd5e5fdb933756efb910059a606bcc9650f8c,2024-11-21T05:02:43.583000 CVE-2020-14131,0,0,9224ff836d5107b4085af2ceb158f9035e49ab18c7015adf1c8c3ccd60e8594d,2024-11-21T05:02:43.700000 CVE-2020-1414,0,0,3cdd63dbe746253ba551579245ccc1441a0346060c7f1a62d5f01c2dd107c9ef,2024-11-21T05:10:27.297000 -CVE-2020-14140,0,0,b303bec13e8c480894aab9b714f02cbdf8e880120563c62fee3251238d2601f8,2024-11-21T05:02:43.803000 +CVE-2020-14140,0,1,ea966fb809c6df80665c5a79a9a3e00be2cfad6b4e2996803fda8678d9843520,2025-02-18T18:15:09.703000 CVE-2020-14144,0,0,3419abc74789040952ba64ed98da7aaa59c6d22600067bda548e8c0289a10257,2024-11-21T05:02:43.917000 CVE-2020-14145,0,0,7c4a85670f77a707c1bc207f989743aa72a25bbd4510a573e1b5f128098e11fd,2024-11-21T05:02:44.080000 CVE-2020-14146,0,0,8a333d3551997661687a70ceeff92b90e8297ed391d42a156a18426b1d27def9,2024-11-21T05:02:44.243000 @@ -152555,8 +152555,8 @@ CVE-2020-1968,0,0,8dd45388ec44ac321a681ada3d189da03e0f02708f423eea3f20161ccd817f CVE-2020-19682,0,0,de66eb60c1808d6e5a0bb64c9eacab68989f40295ec6db0a880e367b55f61674,2024-11-21T05:09:19.373000 CVE-2020-19683,0,0,cc3ef760683550ca9495211e2f4f0c869863e6903472df986067de653efaf561,2024-11-21T05:09:19.530000 CVE-2020-1969,0,0,bd9f49a98ad543d77a8214d913e1ed1b4f56591bd018723df14a8a068726c075,2023-11-07T03:19:39.247000 -CVE-2020-19692,0,1,7f260c96d75c5b443b8b872dec4e302f255477d0bc310cff7fb517ff9145de12,2025-02-18T15:15:11.590000 -CVE-2020-19693,0,1,b5d87c0147e22c028906f5d67dcc40149f4eb9751f0a63d25b7fdebd9080d03d,2025-02-18T15:15:12.407000 +CVE-2020-19692,0,1,e8f0a91b3c3e341080058af37274d589c099f15dc86892c12bee207279ddfe80,2025-02-18T17:15:10.650000 +CVE-2020-19693,0,1,04416a9174b09f4d571e4cd46f0e4bbc9caf6bd81616bd423b2f24c3f9cc31e9,2025-02-18T17:15:11.297000 CVE-2020-19695,0,0,6115879a09e501e85f4fc63634f821fab295f3df0873d88cdc944342d793ab21,2025-02-14T20:15:31.860000 CVE-2020-19697,0,0,90559cd46229e821328de13f626f88775e66d3af88432331bf51bc30bdc19a21,2025-02-14T20:15:32.023000 CVE-2020-19698,0,0,9d802db7209a05d363679e7d8885308fb5c287656ebeae027c922fbbca980adf,2025-02-14T19:15:11.397000 @@ -153751,7 +153751,7 @@ CVE-2020-23256,0,0,3a28647b096682a62651d74f45d8245cb11dd7d2a22261e5d5a1884f41e09 CVE-2020-23257,0,0,58db84c4712c69083c7e5549cc4247538f9d8b1ff47d27c2b85116149b1b8247,2025-02-13T17:15:26.383000 CVE-2020-23258,0,0,1f38838d4737e0dd5397d959b39c571a6fd5dba0c6b25adba2ea5eb1b372b877,2025-02-13T17:15:26.553000 CVE-2020-23259,0,0,23eebc435ab87cb5354b07a6863a92d25030f7a9e38d303cc92620023484804b,2025-02-14T19:15:12.967000 -CVE-2020-23260,0,0,c8d4bcd4f6566df1a1b24a762ba4e2a3c46412f991c4f0eb7fccbb6382f4bd5b,2025-02-14T18:15:18.170000 +CVE-2020-23260,0,1,edf34371fadad038cfc55cdf1e6f42d4c37232e8d8540c2919237fea4202c12b,2025-02-18T17:15:11.410000 CVE-2020-23262,0,0,fffc7685d282282eeb9ace2348e3c639140e4340826553fa80a47320d3339a9c,2024-11-21T05:13:41.493000 CVE-2020-23263,0,0,074f53a073be3c949fbf4c3478e91ec811329cbaae658e8a9a3a516888062e94,2024-11-21T05:13:41.623000 CVE-2020-23264,0,0,597e0be4544083f2a608229fe817e6dc6c5fd55e117fce86f80d984cc3647ac1,2024-11-21T05:13:41.767000 @@ -153778,7 +153778,7 @@ CVE-2020-23320,0,0,83f81c373bdad359cd1aaa4dae93e90f0904deeb9fd430dfcc77df086f7b8 CVE-2020-23321,0,0,beb4699d496203fcf22e90f379245496cb57265544359d9effb4a46070ed27b1,2024-11-21T05:13:44.707000 CVE-2020-23322,0,0,36f0928b828783213d78d02356c86043af3c894b8274bb425139ae0c00baa8ee,2024-11-21T05:13:44.850000 CVE-2020-23323,0,0,e594eccfced38cfa0be16522ec3000a4463535089b84ab095c8b2012cce62340,2024-11-21T05:13:45 -CVE-2020-23327,0,0,0a9e2b7d9ee42ea0059487c9bd484263081b7916c959fa99efd830ea2abea200,2025-02-14T18:15:19.153000 +CVE-2020-23327,0,1,48b417c2dc834109b841a22544cd3438cf221eb53b216db6122ddbf02c68b1f0,2025-02-18T17:15:11.537000 CVE-2020-23330,0,0,50915e7010b3b8fde9cb0505791b18a5dc62c0f8f39345ebcd2f2732caa9483f,2024-11-21T05:13:45.270000 CVE-2020-23331,0,0,3d192e77bcdfacce4206a166857b86127cc000a3d88422a6c5db031360fd529f,2024-11-21T05:13:45.410000 CVE-2020-23332,0,0,804a8823028762d0232f75fa1da0df49d5c1b4393f73ca47e4a2d34cd4d2685d,2024-11-21T05:13:45.547000 @@ -157572,7 +157572,7 @@ CVE-2020-29303,0,0,9324a1109a4405f778ed00a25caf94537859c7c4361b894b1a4aff9a99573 CVE-2020-29304,0,0,2067a6abd921b719f93b9166624f69a5658e87a70c7826d713edb7fd35c05d12,2024-11-21T05:23:53.477000 CVE-2020-2931,0,0,0dd9ebfa857cb1b9a8530d553862231a165f43150caaade4bb33e191c7f5d3cd,2024-11-21T05:26:39.737000 CVE-2020-29311,0,0,e63971687a01d5b4bd876cbaa4125f86a3b8cea330c7607a9d1e1c74c97ce807,2024-11-21T05:23:53.633000 -CVE-2020-29312,0,0,f76199c633e09daaa6aad6e015297aff65fb5ef60fcc9de8c6a0bb052f03b7b0,2025-02-14T18:15:19.360000 +CVE-2020-29312,0,1,ac9947a3da7cb3d6cdeb6bcb1a90d60fc3d4406ad3e439b0a4c8a18c126e8791,2025-02-18T17:15:11.653000 CVE-2020-29315,0,0,a274b8b84fe4c0f0f33e93388bb3a7917118a77417f3f7d9686b5dafaff00b00,2024-11-21T05:23:53.957000 CVE-2020-2932,0,0,9efbe13439e5d7cebef915d73895a77d9d0bf0545932b8aded18c5143eb63f6e,2024-11-21T05:26:39.897000 CVE-2020-29321,0,0,2b48dc81db593f39d27fd8985dfb88cbc8e5641e59c15fd7daddbc2e93f3e130,2024-11-21T05:23:54.107000 @@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 -CVE-2020-3432,0,0,8614608f3d94ea8f07e4e6f06ef7290b646e03e5c4030741ee4e021e6b30b4be,2025-02-12T15:15:10.460000 +CVE-2020-3432,0,1,95c64972df835e085b2fae9ea962c2b05ad745d4a5e6908c7fbaa34828380db2,2025-02-18T18:15:09.930000 CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 @@ -168097,7 +168097,7 @@ CVE-2021-21548,0,0,e80187ad2950a294a09661ea49be95505d3f571dbd9ab97003d898e1d0358 CVE-2021-21549,0,0,5a72c9373b5f3678521b4794d922020eae70ef71ec64d4a07514540bc3837529,2024-11-21T05:48:34.457000 CVE-2021-2155,0,0,eb4c03a926d31556ec740f7b42e3a4a271a44933a2669c0de73d97afb2830623,2024-11-21T06:02:29.657000 CVE-2021-21550,0,0,7b689bab33a09088da87dc915a31847831a8baf8d2382c09a29233f12dce427b,2024-11-21T05:48:34.590000 -CVE-2021-21551,0,1,b45157399bbce6f0b6f63538ebd2b85806e1b1b0d0faf9004d161d9f773c7558,2025-02-18T15:46:11.177000 +CVE-2021-21551,0,0,b45157399bbce6f0b6f63538ebd2b85806e1b1b0d0faf9004d161d9f773c7558,2025-02-18T15:46:11.177000 CVE-2021-21552,0,0,f6ecc9c2646156934a1124feca474788bf8777a4ccb7dc9918b5dcb68da8dbf7,2024-11-21T05:48:34.887000 CVE-2021-21553,0,0,767ebd1895f45e230d4b3fbd59734888f2385fa2c2212ab406a048c3362d69f4,2024-11-21T05:48:35.023000 CVE-2021-21554,0,0,46e432f9c20f997faef495d3f022ea7b2c24aa5b671ef6c0fc7280bc0f7d926d,2024-11-21T05:48:35.170000 @@ -173365,7 +173365,7 @@ CVE-2021-28211,0,0,ff828dfa313b5633328b79a14614e30ee0c99e76171542b9736c21b43aef5 CVE-2021-28213,0,0,c55f79d4f6b6118720fed6f3d872fa5f8eb22142522249a95caa231015f9311c,2024-11-21T05:59:22.620000 CVE-2021-28216,0,0,ade6611edae65c0073869cbcc09cc1d4710d2a98840bf644994e49c750390edc,2024-11-21T05:59:22.720000 CVE-2021-28233,0,0,65948d93221bced88226f7ec8a34b1647ad8a53c68daf804a458ee07682cef82,2024-11-21T05:59:22.823000 -CVE-2021-28235,0,0,da45f67538dc20009310a206b96a240e124118f7bc3e8af4aa75eb3f534dd927,2025-02-14T18:15:19.620000 +CVE-2021-28235,0,1,e090a8e5268f771ec889db8e482d49109b0d514f1750550bf6858bb9a6cff3ad,2025-02-18T17:15:11.817000 CVE-2021-28236,0,0,edec8cfc622a0716141d3d606b288cc1030900e3265685ba319002c064a43a22,2024-11-21T05:59:23.120000 CVE-2021-28237,0,0,c36445855bb0b48b90cff9779a46e91e1e9519216d73871a2e764f6d293985bc,2024-11-21T05:59:23.273000 CVE-2021-28242,0,0,e614b752349c5f0351c3c554092835b7579208b9ac3898d83f2bb48160cdeca1,2024-11-21T05:59:23.413000 @@ -175965,7 +175965,7 @@ CVE-2021-31698,0,0,18879fc156700073c7a073cbd0e6053679215f66065703a6e52fa6870e235 CVE-2021-31701,0,0,3b7fc844e3574f68535b41bcf1a4ff96d11dda31f6d6f71deffcd2f477a5a422,2024-11-21T06:06:08.213000 CVE-2021-31702,0,0,3b51184e31b3cd07b45d3f25cbc2d8ea9a00bd6683da84dcd5221c9151503465,2024-11-21T06:06:08.350000 CVE-2021-31703,0,0,22adff2322527385489568250286f2b7a48e2986f4721e744c9306658835a696,2024-11-21T06:06:08.477000 -CVE-2021-31707,0,0,ad6eb0c193ea2c2589b6306593e903ef669490a1a189e9dec40a3ec2b317cb50,2025-02-14T18:15:19.870000 +CVE-2021-31707,0,1,c324ea63b3274cc832e5020a3553313e924f9e78d4896107ae8c74484b6ad757,2025-02-18T17:15:11.973000 CVE-2021-31711,0,0,5836dc98e69840056d02b3b4b9ab892963f019edd8fd880f83716d65b4cbdefc,2025-01-29T15:15:10.630000 CVE-2021-31712,0,0,37e669b62610110cdd762e83824512920f41fcca6caba3fdc2f22fcab37a94c5,2024-11-21T06:06:08.890000 CVE-2021-31718,0,0,580996eb0d7c77f0e6e30fc28e4dee664cbfaa246540e61ec25791a23ceb3fa6,2024-11-21T06:06:09.030000 @@ -176587,7 +176587,7 @@ CVE-2021-32666,0,0,4c4f2af3e07d949d9f533b85801d6e54199dec3fadaa68fd8814ba1855b0c CVE-2021-32667,0,0,ef8541c06111d0bab98474eb5da3a8d7c3249aea97b723721aa826691e6bfab3,2024-11-21T06:07:29.533000 CVE-2021-32668,0,0,cf45e88602f8ac16d709848fc98217e07394a7c2e681df75e2b57f6e07141e7e,2024-11-21T06:07:29.667000 CVE-2021-32669,0,0,6af6bbf82599d5bd79e690444ce63875cb3125ad4d7b429668cb5dd4f0b214a2,2024-11-21T06:07:29.780000 -CVE-2021-3267,0,0,37ff17b5c88113a0cb8222837b73bfdc153ad54341dc117b62e0298925a9cedd,2025-02-14T18:15:21.857000 +CVE-2021-3267,0,1,581e30370a2d88eee0a76bf8d68e62c91e3fe8268578a1987b49a1e4c5981135,2025-02-18T18:15:10.127000 CVE-2021-32670,0,0,c059ca373c2cc10c4107a6b57718cf70bb59bfbc65dc5e45b104b4683317eea2,2024-11-21T06:07:29.883000 CVE-2021-32671,0,0,16b7de915e14c7e140e7cec4c3b8300c375eefe72f58528c9b3daf7ac04b945b,2024-11-21T06:07:29.993000 CVE-2021-32672,0,0,b1c8790ab38b9bc6d33ba4274ffcfe26f77aa9fc819cf60ded82ce58f171a013,2024-11-21T06:07:30.103000 @@ -194906,7 +194906,7 @@ CVE-2022-25596,0,0,e20895499b50f257835b5cef4ccb445e059a896f4752a079569605fe5e1a9 CVE-2022-25597,0,0,eaf37006afa9b701597a13e86a6a8b9dcd23db62b468f93a19bc35ac7c3bdc9a,2024-11-21T06:52:24.670000 CVE-2022-25598,0,0,71bd9180efa2a8b6c83e3b611fbc1013a1ddce4691267feb04933d7262365773,2024-11-21T06:52:24.793000 CVE-2022-25599,0,0,b2500cb798c90f66522b41c69e71517db2f6434ee5e39ea15b171e36b340a1fb,2024-11-21T06:52:24.917000 -CVE-2022-2560,0,1,76499e3463de56f9dfdde31f5da65b99e4e8dda3455c16cb790a47b23dffd960,2025-02-18T16:15:10.817000 +CVE-2022-2560,0,1,870d7ff06518ee7c666328caa22836987f9dc66ffc8ce1277afd0156bec0310c,2025-02-18T17:15:12.910000 CVE-2022-25600,0,0,495b4f6c50a3d5cda10e78d5d8ebcc64b109954b157fc78da0e3a2ad57d29580,2024-11-21T06:52:25.050000 CVE-2022-25601,0,0,3dbf007ef693de272e8034005f728c29b9ddfaba0684d5643181ce0cd9f79fb5,2024-11-21T06:52:25.193000 CVE-2022-25602,0,0,42071c67cba7690029535ff818083bdd303016e39e645999fd4f9bcbe45b73f2,2024-11-21T06:52:25.333000 @@ -194917,7 +194917,7 @@ CVE-2022-25606,0,0,f88974541eb3aa3a839095fe8d26a0574cfc401492b671fc89527187563cd CVE-2022-25607,0,0,4315807fe55335037587ad4704a9d2df0c06852be854f37614ed33a9c7d8034e,2024-11-21T06:52:25.970000 CVE-2022-25608,0,0,5a9acd8289576bd8a115f40e2c67e4376263bf0971af6ae43e6f89e05a419f1a,2024-11-21T06:52:26.110000 CVE-2022-25609,0,0,599de89a5a011caeba847a172dec58ccd9b1ee3d45d7b41cf184df65b49da5e7,2024-11-21T06:52:26.233000 -CVE-2022-2561,0,1,cf9fbb69422957338b663b01a457a426c4f28047f792f9304090478a6cd296f4,2025-02-18T16:15:11.030000 +CVE-2022-2561,0,1,0102cc2f4737cbb0e68e1a47ee386c0b6480c1670798e02e04d52f0fdff56f86,2025-02-18T17:15:13.043000 CVE-2022-25610,0,0,63b2067f59f7d4a1932ce97af52643e33bc4cb7a351d7eead5f7bd19e7a96fd1,2024-11-21T06:52:26.353000 CVE-2022-25611,0,0,642a5ed9c9d3e03bed247169366e2e3d0121a3af4fb9988816db035e26288f0d,2024-11-21T06:52:26.477000 CVE-2022-25612,0,0,6585fbc0b1fc2637237fd46922b6d370aff096201ee86368ec9c334416ab691b,2024-11-21T06:52:26.593000 @@ -196438,7 +196438,7 @@ CVE-2022-2749,0,0,7aa26a0c23dc155071b3059a24689083204379ce2615654a58696d67869e26 CVE-2022-27490,0,0,caa845b0bc3c21e72ec430c1bb91d0947629956b0eead13ce1096d9d7ae094cd,2024-11-21T06:55:49.757000 CVE-2022-27491,0,0,8a7d2a569689762339050e1db2eba7ddc2305665c61fafc0e8565e91ee3fb10b,2024-11-21T06:55:49.903000 CVE-2022-27492,0,0,ced91e0048ca7c83b66693a736c13d17d779d0f9b27c488111d6615fa1e551b6,2024-11-21T06:55:50.043000 -CVE-2022-27493,0,1,574b83e21bd3e183e90bfdb529f2c8e271fcb46c3853eec91fb6a4fd3817419b,2025-02-18T16:15:09.020000 +CVE-2022-27493,0,0,574b83e21bd3e183e90bfdb529f2c8e271fcb46c3853eec91fb6a4fd3817419b,2025-02-18T16:15:09.020000 CVE-2022-27494,0,0,b5e4c7775e0d6176d23b0fb12b6a970b96dbce2c8884f72b3a008868b3622bc6,2024-11-21T06:55:50.290000 CVE-2022-27495,0,0,71ecb2cc76801c85c8467f4395a420002118e2b27be3cfb1821a32679e396cc2,2024-11-21T06:55:50.420000 CVE-2022-27496,0,0,525472f4d923f606f377ed6195861e6894790651b972bda97b2d24b4e96f84ab,2024-11-21T06:55:50.550000 @@ -197043,7 +197043,7 @@ CVE-2022-28246,0,0,42e72399563b8c397b24f5e80e1002917bc453725243f9a631a46b8760810 CVE-2022-28247,0,0,d91e41860bc8e908ac7755fa918ae493c1b0e1029ea2b2056474b9de3bf43e07,2024-11-21T06:57:01.847000 CVE-2022-28248,0,0,4c158f114b85533d8f8f6dbcc7d56eb3e048d749afb1c18f2771c4bc03f575d0,2024-11-21T06:57:01.967000 CVE-2022-28249,0,0,a59055a5419ab6c55b17a30346ba204a34fc7fccc3398b4f67e692bb248781fe,2024-11-21T06:57:02.090000 -CVE-2022-2825,0,1,40f70f6e9293a0a2adb70eb6f87e41444a7b7795afc5d1a781898b0c3c230f18,2025-02-18T16:15:11.223000 +CVE-2022-2825,0,1,80eca6ce9ef72de2fd4a294a01e926787f446d21bd58238143d20672b4849a0f,2025-02-18T17:15:13.183000 CVE-2022-28250,0,0,283a2e1a389e53f2a177db94792d609666d9596289fd137bbe4f4bdbc75daba8,2024-11-21T06:57:02.223000 CVE-2022-28251,0,0,32e68a13357ce7ffa3e0f8f15098c1b43fe63e6e04e7216ae09a4d7571dcb7bb,2024-11-21T06:57:02.350000 CVE-2022-28252,0,0,c1c1a9374bea5d81dab884e8cfdf3684b057f64cc61c4a729c7d851db38a852a,2024-11-21T06:57:02.483000 @@ -197225,7 +197225,7 @@ CVE-2022-28471,0,0,22daddaeedef7bf9aab39f3549190b2978c74d629d8530f5d0fe76defac80 CVE-2022-28477,0,0,e71a98c918c772ec3dfb27061456e47f05943a8f0537c4c7b6c2b43844e0347d,2024-11-21T06:57:24.360000 CVE-2022-28478,0,0,8d9bda9a2e1a2e9d91bb3cc6c0b2ec7e8233af87753711810fc4eb8554a71ad1,2024-11-21T06:57:24.503000 CVE-2022-28479,0,0,bf3ccfb37fd50246d1ee97aa4ea7efaf57fa4c4e5539490bf2c40fe8021ca895,2024-11-21T06:57:24.650000 -CVE-2022-2848,0,1,15aac2bbc76a073ca891b3e3ba3f9fb9bf9e09c4d3707e4aa233f2752b51e5d3,2025-02-18T16:15:11.440000 +CVE-2022-2848,0,1,43daabb5fcdc46c4d2b95ad5dd3089ec4e018ee6075a6a750394249c5fb68654,2025-02-18T17:15:13.367000 CVE-2022-28480,0,0,e54d1704695ba9f75944951bfd24a58836e23ddb8fee804a7b42639257c1adc9,2024-11-21T06:57:24.790000 CVE-2022-28481,0,0,17953b88e80bda6244bb3c037dfcaee26ba958ace6634f14c6cd34c20e8e36e9,2024-11-21T06:57:24.937000 CVE-2022-28487,0,0,adbca582fe216ceea0244fed85d992720694ffad6c331fdf3b6d541c21b44d1c,2024-11-21T06:57:25.087000 @@ -197379,10 +197379,10 @@ CVE-2022-28681,0,0,b8f43a20c2b57f6a0047369d1b230ed63c65321a6161ac4f8a31ae69a945d CVE-2022-28682,0,0,bcb0dd1ae49198f8c0556b2624b0e12d2675714cdc534d6a7c47a01283a9b4f7,2024-11-21T06:57:44.080000 CVE-2022-28683,0,0,816d2a1520e8e5feb91adc57ce7b5e8c27cb3af115756c8d55ddd45d4976a7f8,2024-11-21T06:57:44.193000 CVE-2022-28684,0,0,9dc7594b3784884140b568f0f3dc9b301f745444d48b4d2178b9170bf14bdfe3,2024-11-21T06:57:44.340000 -CVE-2022-28685,0,1,13fdb21feec95cfcf189f49dfca8222824884ec433e23637260407a27e43da2b,2025-02-18T16:15:09.603000 -CVE-2022-28686,0,1,cebc1c945513cb1513b6df344dcd83d493529699cb43e1a8063801dc36e15a7b,2025-02-18T16:15:09.843000 -CVE-2022-28687,0,1,cea133e37c0d577f02bf1101ea517f348ecd561600f39ac93e5ef05a72fe43d0,2025-02-18T16:15:10.037000 -CVE-2022-28688,0,1,55c73171fec355065b988971451e8c5b848b33b671f4f0c66ded8fff4eeeea1b,2025-02-18T16:15:10.237000 +CVE-2022-28685,0,0,13fdb21feec95cfcf189f49dfca8222824884ec433e23637260407a27e43da2b,2025-02-18T16:15:09.603000 +CVE-2022-28686,0,1,b0d383d489bc21a9318a66d45fce10b5342b189940311da945d08b69c985e9a8,2025-02-18T17:15:12.487000 +CVE-2022-28687,0,1,2a90993793a8c1ef71f0c46d8fd89a38ea33810f78f047934dc905144d8329a6,2025-02-18T17:15:12.630000 +CVE-2022-28688,0,1,f0f6c010ad9cc225396f427f541fcab95dd22ccdbe7466b6e3ef2ea37229d5df,2025-02-18T17:15:12.773000 CVE-2022-28689,0,0,4edf7f56430cc28a3558cb1cd6b706bef48e22bf9a07b07fb6c8e6a850c09772,2024-11-21T06:57:44.890000 CVE-2022-2869,0,0,a6c41e2e21e8e9f4dc93eb0145cd5fd437c35477a6c25e9b79b4ec21715ae9b8,2024-11-21T07:01:50.573000 CVE-2022-28690,0,0,4e56822b4ca0b82e0ba605af45b9bee55966330e5871f1dc9b7083b71a61e0d7,2024-11-21T06:57:45.003000 @@ -197546,7 +197546,7 @@ CVE-2022-28854,0,0,4d1c220322567ff9f4708969d7d10eb6959c2e153abb29c60fad9cd137da4 CVE-2022-28855,0,0,bf12e5d75021f7d2d78ab47b552c3ab814362b0a565c0ae025e8b59ea8cc14af,2024-11-21T06:58:04.083000 CVE-2022-28856,0,0,97b5cb854c42e2bba4bec2f848d8712db4c9642ef906b4e7ec288909a1b2f958,2024-11-21T06:58:04.200000 CVE-2022-28857,0,0,5a8fdec603118a8974a915694450f8aa4b6b3ba53be0b982bbbdbf1bfe0eb3cb,2024-11-21T06:58:04.323000 -CVE-2022-28858,0,1,9e7e73d449279aab38a9df1761b011f1b66cfa107d24ed8c9c98f0221de31ce3,2025-02-18T16:15:10.440000 +CVE-2022-28858,0,0,9e7e73d449279aab38a9df1761b011f1b66cfa107d24ed8c9c98f0221de31ce3,2025-02-18T16:15:10.440000 CVE-2022-28859,0,0,a02312803b54899a0654f8646f9d712bf9ef577e625f0fe5c5597df0c05b7184,2024-11-21T06:58:04.560000 CVE-2022-2886,0,0,28abfd9bb6d6a1fe516db20229db64e5d00f417a56ab77e71cb1ddbabe24ffa6,2024-11-21T07:01:52.320000 CVE-2022-28860,0,0,4d02378e35e0791603644de01c1793437119d0059fb13a48a51bed20a880b488,2024-11-21T06:58:04.703000 @@ -198099,7 +198099,7 @@ CVE-2022-29503,0,0,fe6627b1984ed177ece5e234f18079d6f3fc74ce3b11a4bd045d18a306497 CVE-2022-29504,0,0,22a099b727838bb2a7351196b16a44e93ae2bd9429da35a97f193aa24f9c461f,2023-11-07T03:46:02.927000 CVE-2022-29505,0,0,359fae353ad08726f4eb696e09d2ad139e0df88243f5d6fd78bf52cc106df861,2024-11-21T06:59:12.817000 CVE-2022-29506,0,0,3962b51c5c27127830a629454b32828486786c50629dfc167ed1a3c071df6910,2024-11-21T06:59:12.933000 -CVE-2022-29507,0,1,945b58f924585e3341e2c3d1e885edf8373ff44b156db3427d9d9620e3f37437,2025-02-18T16:15:10.620000 +CVE-2022-29507,0,0,945b58f924585e3341e2c3d1e885edf8373ff44b156db3427d9d9620e3f37437,2025-02-18T16:15:10.620000 CVE-2022-29508,0,0,029dbe6b5c8453a90a1bede64abc7355dcd4eee2e86a4c637313c074f5e8cda3,2024-11-21T06:59:13.490000 CVE-2022-29509,0,0,28be0bb8f6027f6a3f64d19fc3df6f9375536374635311b07102c0cc08182e76,2024-11-21T06:59:13.617000 CVE-2022-2951,0,0,0a2ab5f8c78419f2afab990815bc7f66b5f4d6d9104075eb34ffa8066ce52a9b,2024-11-21T07:01:58.693000 @@ -198782,8 +198782,8 @@ CVE-2022-30339,0,0,3752c3c3cc032eed4b27ca759aaebc5ec1adf39736f2cfe61daef3ea66c5f CVE-2022-3034,0,0,5c7e97206f861f8937214e842d44d73bcfc2d42e6a9832cbe40d23463f86d42e,2024-11-21T07:18:40.767000 CVE-2022-30349,0,0,1502fdca93af2f2fb8fdb1da0bfe070323f5d06a96905cf324e92ccd13f478b2,2024-11-21T07:02:37.547000 CVE-2022-3035,0,0,bf6be6957711d5b66d4248608b532e9c19657a792f5a7125498c149a2a66b5ba,2024-11-21T07:18:40.897000 -CVE-2022-30350,0,0,b400f271927bbd597f1e4e7ea090501ea762fbbaf584497f723d209ea8b850c4,2024-11-21T07:02:37.680000 -CVE-2022-30351,0,0,8757b1fc90bb6eeb048293d7153d32060b08b304b5382f65670a2114b1396074,2024-11-21T07:02:37.823000 +CVE-2022-30350,0,1,ed751e923b3a96b34458dd692170c32a2938b32156000ce1598a6632e8c93353,2025-02-18T17:15:13.513000 +CVE-2022-30351,0,1,5562f9d8bb5d06114ca89c7fc11c9afd5a6fcef419f83e04d24207243be119e0,2025-02-18T17:15:13.697000 CVE-2022-30352,0,0,055c949f41fd222c433fa54cc2ef07c2c9049caccea54f17b2936ea350d57e9c,2024-11-21T07:02:37.960000 CVE-2022-30354,0,0,eb724c37c8ad233d59fff3cc3af52fa03bc0055411d3d04e63aaf38447928b38,2024-11-21T07:02:38.100000 CVE-2022-30355,0,0,b70351ecf7be3f959ce3dbe39f6774af45b7ef9784abe3a2755386e27a3a9d4f,2024-10-28T13:58:09.230000 @@ -200045,7 +200045,7 @@ CVE-2022-31795,0,0,e87150b97c1595f70c15af39b375b9e3a356b56a2e94be20560be511f6e8d CVE-2022-31796,0,0,14e0f1b4cee5370b95f4e2647aeeffe69e5474ef0322e9f54b5182239dbd3879,2024-11-21T07:05:20.900000 CVE-2022-31798,0,0,e549cf30b2c66e83ee0fcd8c913e23d35c726aceb746d6eb9a6de0bb4572e411,2024-11-21T07:05:21.057000 CVE-2022-31799,0,0,b267b7ae01f62f80ffb0216b260fd93dca79abaa52716c5b918a57dad17ae0e3,2024-11-21T07:05:21.203000 -CVE-2022-3180,0,0,6b8ddd4c0b91459e469a0bcd25e464fc4449c7a4fb067aa6a4b381fa0de90e44,2025-02-12T15:15:10.730000 +CVE-2022-3180,0,1,e10ceaf49d469cae70f8b74eea62c633e91c0f82efb6510500441cc815036161,2025-02-18T18:15:13.290000 CVE-2022-31800,0,0,6db4ef6ef8456fee479b75712875c618f6bf7e29ea191a42b8cb2155d6ab01f6,2024-11-21T07:05:21.370000 CVE-2022-31801,0,0,15a9fabf68274e7f2ba1fa15bae069bfe9e501270dca5df64319063297383989,2024-11-21T07:05:21.537000 CVE-2022-31802,0,0,930da7f9507ef8219beb1bd2fd7f97d299cec36695d5708783a3954bd5782360,2024-11-21T07:05:21.673000 @@ -201225,7 +201225,7 @@ CVE-2022-33205,0,0,ad8faf3876c0077e3cb7d3d6e29faf9b902785a9eceab895247358a4f738f CVE-2022-33206,0,0,e32e9be49b2eb2c4208bef01f53fd6d8a5f6271a592dbd0c7b2725f0c3f9d4ba,2024-11-21T07:07:42.970000 CVE-2022-33207,0,0,e4e6e0d2c508d1fdcbf5089ac279cd3000758bacc2fa3199bf3036006f634fc2,2024-11-21T07:07:43.093000 CVE-2022-33208,0,0,2a6f2df46feca332d01a82d64766bae5ecf7c98e1aa88ac96cab3c28dffdb603,2024-11-21T07:07:43.217000 -CVE-2022-33209,0,1,8ef77cad81932fd6188fdadf89d706a5a1ae5b860bd89c91721b6ba1ecb1e7b8,2025-02-18T16:15:11.617000 +CVE-2022-33209,0,0,8ef77cad81932fd6188fdadf89d706a5a1ae5b860bd89c91721b6ba1ecb1e7b8,2025-02-18T16:15:11.617000 CVE-2022-3321,0,0,0b6f40cf08d2d5ed5e532a099454d95b632accf8c53ec46ef50e3d2a8b5fa145,2024-11-21T07:19:17.507000 CVE-2022-33210,0,0,2696f6298e82345893f2e01081ffb8df669d3082c9469855a36269a3df50848a,2024-11-21T07:07:43.520000 CVE-2022-33211,0,0,827df58dbc8d588d3b82af3e9575085e665db249aae05c37ee62cd1a91ffe7c2,2024-11-21T07:07:43.700000 @@ -202092,7 +202092,7 @@ CVE-2022-34484,0,0,3f533b42daa5e7fd1f916268062039bde8318359b70f5d96545b1be970c41 CVE-2022-34485,0,0,cf1c5fe8184d6bbd2a9c1cd4bc47ae63f9b901e1b67c37ad6be7e135040e3c02,2024-11-21T07:09:40.087000 CVE-2022-34486,0,0,73a71e1f77d0db95faf44d581ebc7697f58e47daa52f286b1737b58b52030cc1,2024-11-21T07:09:40.210000 CVE-2022-34487,0,0,6ce1ccea025a4a271a03bc9f211e020097976ad6b82aba7dc5230a69f3b14d2a,2024-11-21T07:09:40.343000 -CVE-2022-34488,0,1,5bd7380e268f73f286ab4df14ba1a4022f5c04a59282ab2c65a94c6700b0d5c6,2025-02-18T16:15:11.813000 +CVE-2022-34488,0,0,5bd7380e268f73f286ab4df14ba1a4022f5c04a59282ab2c65a94c6700b0d5c6,2025-02-18T16:15:11.813000 CVE-2022-3449,0,0,0388ee85291cdb5d5e1be71b8006e97d902b56f4af3c11559fb4a756ab252692,2024-11-21T07:19:32.820000 CVE-2022-34491,0,0,6187ed181d7b674a78943e3d774b41de94989ca40b50c2995c2fe8e77a783692,2023-11-07T03:48:43.663000 CVE-2022-34494,0,0,8444dd94d30d9fcb0438cd24fba1ee60981ff98fc80786b17183be67509bd0c9,2024-11-21T07:09:40.703000 @@ -202257,7 +202257,7 @@ CVE-2022-3471,0,0,495d0e8dcc7168cf73d6752bd352dc355254512638404907315f8c8587cf20 CVE-2022-34710,0,0,873660d048e28a149e24e157bf627764663cd5072c4620ae24c67a19668c7527,2024-11-21T07:10:01.627000 CVE-2022-34711,0,0,c44da15e9a9f787ffdb3f343336e0d67972465f3cc3917d88950889394348c41,2024-11-21T07:10:01.790000 CVE-2022-34712,0,0,b3b95e93f77b00695ba541618424625a617fac2c395c356b58b85959b0196871,2024-11-21T07:10:01.950000 -CVE-2022-34713,0,1,2f94f2d82dff054953e34a660855d92ec8337c2f9a6efa036d564437fb454930,2025-02-18T15:06:15.647000 +CVE-2022-34713,0,0,2f94f2d82dff054953e34a660855d92ec8337c2f9a6efa036d564437fb454930,2025-02-18T15:06:15.647000 CVE-2022-34714,0,0,cd7847bb81aa6cee536f4b993097e8160f3dd670d1c0e9f6376413be64c73e46,2024-11-21T07:10:02.283000 CVE-2022-34715,0,0,1a6430359b7e294a3661adff75f8cbcd008524c0b3380f11bf12898f184ac7f2,2024-11-21T07:10:02.580000 CVE-2022-34716,0,0,823de494d6afe6089e979b6e89b590f446004ca2a60a6ac4e68b91b576e3ce40,2024-11-21T07:10:02.710000 @@ -204223,7 +204223,7 @@ CVE-2022-36965,0,0,0ca23e8ac16cb88858e1fe0eb569827b54b6cfc7d3aeecce850c21cf96b18 CVE-2022-36966,0,0,fccbf34c70f1f2f8ada911a76c54bfb7636a8f0bb16cef989a57c4cc9e296b6c,2024-11-21T07:14:10.403000 CVE-2022-36967,0,0,3ece16c6a6e55181708868bbad5290d8849bd16a56f97d5755153213a266ceea,2024-11-21T07:14:10.527000 CVE-2022-36968,0,0,f423ae7f2d865457f2551156d8fb7595788a1b7c0617aa72595eafd6ad4f563f,2024-11-21T07:14:10.677000 -CVE-2022-36969,0,1,f9de56edb316c33ae9002ada5cbf6c225a11c92e9932b9c8ffe5dbb24be9fcb2,2025-02-18T16:15:11.987000 +CVE-2022-36969,0,1,23d88af4c4fd390f3600de9464c8f3e191d14bdf99224992136f51d883fc3ffc,2025-02-18T17:15:13.860000 CVE-2022-3697,0,0,2f8b38c5a7b1843fbd9fd8a8a356e31179919e604675a74b4f7d9b071a38d1ee,2024-11-21T07:20:03.293000 CVE-2022-36970,0,0,cb3c9c8a4054905fdd0c810ac8bf9d3add8718beb8c8c6fa550ec3a3d4370b03,2024-11-21T07:14:10.953000 CVE-2022-36971,0,0,9a126f8836db514d07730137b1743a7c1da7b8e3225a7872e1dc3a89ae49569b,2024-11-21T07:14:11.087000 @@ -204513,17 +204513,17 @@ CVE-2022-37348,0,0,839121da509d7997c32a937a2927f2a149c85a419aa5334432df88972878e CVE-2022-37349,0,0,be4c38fe75bdf20aeed9cb31e90b4ed76bbc7c21e042d700d48481bc68a7343f,2024-11-27T20:11:45.410000 CVE-2022-3735,0,0,6a3a0d98c65ef51e5e82db93717d565b35d58fd0d38d66a0856b2386409b0e4d,2024-11-21T07:20:08.103000 CVE-2022-37350,0,0,2b8c3c24a3100b5d8e15e20e8e0d1fc730171430393e497c152d93645d5758fe,2024-11-27T20:11:45.410000 -CVE-2022-37351,0,1,d5b8044a97760d6c3234d0a8fd27735626dfde61898efd736ea6515abb08e21e,2025-02-18T16:15:12.197000 -CVE-2022-37352,0,1,f61c84cce450042b8c3be2e1dac417a8c1d9f399e47918172cadaab2818d7e42,2025-02-18T16:15:12.407000 -CVE-2022-37353,0,1,8a685d2101ee9c996c0441515374084c6315df48869471bc8b533638c837669b,2025-02-18T16:15:12.613000 -CVE-2022-37354,0,1,76831841e61d25ac28d8d2d714ad74be6c1f83759ad1c4fdd8f4a96b207cf21d,2025-02-18T16:15:12.807000 -CVE-2022-37355,0,1,aac48491f25019390b2ebcae75dd23911f9273182a607c612c75f13b1d8a9c53,2025-02-18T16:15:13 -CVE-2022-37356,0,1,f85d6dc20ac1d33a6f06b49f45e0e101ac386f9508c0a853de0ee1142b5987f4,2025-02-18T16:15:13.190000 -CVE-2022-37357,0,1,c6aa4356d882113ccf9068f91803a778fd76dc9bc9b24c6f11dc3eeeca46c767,2025-02-18T16:15:13.383000 -CVE-2022-37358,0,1,248c48d7aae1d619d41ba5f9aad6790a3a8578110c35c90b6c7480cdbec9b559,2025-02-18T16:15:13.563000 -CVE-2022-37359,0,1,8e1d405058a35dad2fc42f0173eb2d5d81acb1529bee17e71ece202f651d9586,2025-02-18T16:15:13.747000 +CVE-2022-37351,0,1,a88305e7b8ec830efbd0eb4669374a55bb7f8bc3543dcf1eac1396d1c2596333,2025-02-18T17:15:13.997000 +CVE-2022-37352,0,1,4d43f7cac45ddfdd778baeae1326afb80b2cb1738c073ac718187a30a502a83a,2025-02-18T17:15:14.133000 +CVE-2022-37353,0,1,c2e371cd9c078f07ef3eb442ce4990d0e1b649576be42b01854a06fcbab44c96,2025-02-18T17:15:14.270000 +CVE-2022-37354,0,1,f386caa3381334314afcb9be1ef1c55d07d42630cff6625be1a0023542ff0084,2025-02-18T17:15:14.403000 +CVE-2022-37355,0,1,78e1f8190d32e850ff53c1425324bf04b706bed82a6a075a139736bf4905499e,2025-02-18T17:15:14.543000 +CVE-2022-37356,0,1,f4a003f778f3f862f10569f53508196458a98df8a7990f2ac1f1b3418ea49cbb,2025-02-18T17:15:14.680000 +CVE-2022-37357,0,1,5d6b268baf7f7285b0d135068402d876f63ce195fa3bbf6fa51d008c3d76b1a0,2025-02-18T17:15:14.820000 +CVE-2022-37358,0,1,541ff7108d0e2ff4361422f529560e0ce68b760ec55fa23e2bf194fc67b9b09c,2025-02-18T17:15:14.957000 +CVE-2022-37359,0,1,b0139e3106a9ba38c32c458bcc2355f8f2bccbd692f99e958775bafcbb8fb103,2025-02-18T17:15:15.100000 CVE-2022-3736,0,0,dd1289d0aeed63a5c6b3760a10b956fb9d3fddd85d529817d7d1f2e9a1ed6ea9,2024-11-21T07:20:08.243000 -CVE-2022-37360,0,1,90e9b2914e31243dff9f80f7d72ff9db2f0e855d0d259f42c3dd7f02da1e65f0,2025-02-18T16:15:13.940000 +CVE-2022-37360,0,1,71ed70ec814deab57c5b09e85bc7c3e3f73c5519a6440eb610efcdd427bd3d0a,2025-02-18T17:15:15.240000 CVE-2022-37361,0,0,3ba217ae52772213ee60da4f905ed8e862327f9b6db9244049f77d49ebc5aa06,2024-11-27T20:11:45.410000 CVE-2022-37362,0,0,c03ac04d696b68b10b811ec3825b2727875f9968ad246df0c4439e546ab54bdb,2024-11-27T20:11:45.410000 CVE-2022-37363,0,0,e48d1b5269159bc30e4686ce829dddc03df755715a821c209d4f3f893da32be1,2024-11-27T20:11:45.410000 @@ -204856,7 +204856,7 @@ CVE-2022-37965,0,0,7382339f174de9fdc4b84849a25276f93f4cba28d66c4e02be65e6c4c9a26 CVE-2022-37966,0,0,e7ca4037eaa67c01820375a90d40ed51c66c9acd2b7e40a9f1ea8dc246ba3edb,2025-01-02T22:15:09.867000 CVE-2022-37967,0,0,f583f9211879c0c61033a7b05dcaffc689e2c7f204c11c47debf243169222056,2025-01-02T22:15:10.010000 CVE-2022-37968,0,0,6a79a831585dfc274b8d06497d20b84f4f0f567a45a9c981f18e711d1714e0cd,2025-01-02T22:15:10.143000 -CVE-2022-37969,0,1,9d1eadc38cb0600b3949309c7df5f942430e24319949aadeb5b16b38a5e317b3,2025-02-18T15:05:07.903000 +CVE-2022-37969,0,0,9d1eadc38cb0600b3949309c7df5f942430e24319949aadeb5b16b38a5e317b3,2025-02-18T15:05:07.903000 CVE-2022-3797,0,0,1d258bd702d02d61f24422c553d0aeb93ad0a41da7597475f19b3996eb769180,2024-11-21T07:20:15.157000 CVE-2022-37970,0,0,e7f565127a61644046a05135c4956f50b7b6d230fb402b297bf3685c102bf1dc,2025-01-02T22:15:10.263000 CVE-2022-37971,0,0,3eed1a5f28bd8db707e5862d22ffbad5d063c63f776130157ef9ee169fa1c3c9,2025-01-02T22:15:10.393000 @@ -205622,7 +205622,7 @@ CVE-2022-38902,0,0,0bd5ef2dfe8316484f8c6d7482b1c583413e4573c37fdf89a96403f325086 CVE-2022-3891,0,0,2be78a92b98d47adb36fc65d0ff218706c484f069fbfa886887fecec474e9b83,2024-11-21T07:20:27.710000 CVE-2022-38916,0,0,a11d9ae396e5442a1e1b83293983e520978271a6b8ff587580e4509a9a60d827,2024-11-21T07:17:15.400000 CVE-2022-3892,0,0,d95718c65c426e5ff39e6f74427991f85da1cec4cb39d5907cab3ebcddf469de,2024-11-21T07:20:27.833000 -CVE-2022-38922,0,1,75f26da8291c19cb45af748b522f8547a93a4d05875ae6104d4bc55adad5e809,2025-02-18T16:15:14.143000 +CVE-2022-38922,0,0,75f26da8291c19cb45af748b522f8547a93a4d05875ae6104d4bc55adad5e809,2025-02-18T16:15:14.143000 CVE-2022-38923,0,0,49de48be827439aad30a1200f1f3b4997a55bea4b903a7990aec70cc1069ef83,2025-02-14T20:15:32.203000 CVE-2022-38928,0,0,6b98a5bb7c0fa08033d7aaa0d401c575e5bf6c62505e34d5677b96483eb9fdf9,2024-11-21T07:17:15.873000 CVE-2022-3893,0,0,169977ea85d0f87efc6cc15872f3136d1ff5790f1b49d91b9e93fa4cc18a8375,2024-11-21T07:20:27.953000 @@ -207183,7 +207183,7 @@ CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb CVE-2022-41045,0,0,2c7746ae8e1e932b2d88ac880d0098f2cc0f1b86f29deb55d7d9973c6c689257,2024-11-21T07:22:30.670000 CVE-2022-41047,0,0,6a0ae7ce4562257b0d603bd01b91f8be796bd6f172a32ffa93b6cd11cdc35e85,2024-11-21T07:22:30.820000 CVE-2022-41048,0,0,480414d14aca950b2941a5ecf68dabd47716cb3806071b62a04418f97fdf5db2,2024-11-21T07:22:30.990000 -CVE-2022-41049,0,1,8ccee6a4917e04d77593cb07a5fd9144c6398eed50a20a486b4ea7c3222555d4,2025-02-18T15:02:20.783000 +CVE-2022-41049,0,0,8ccee6a4917e04d77593cb07a5fd9144c6398eed50a20a486b4ea7c3222555d4,2025-02-18T15:02:20.783000 CVE-2022-4105,0,0,cd1b56dce82e30d11c9a21d18fca44a3e88c77944c888fa8e763622943817a5d,2024-11-21T07:34:35.557000 CVE-2022-41050,0,0,b9a7da6a62895ac068765a81a1753cf10ca24d8496ba063a3fb037f63af3ecb4,2024-11-21T07:22:31.310000 CVE-2022-41051,0,0,91f5c37a632e3e8c803acf4d44cacf6e6914c78e08e48fffc960383c791cc77d,2024-11-21T07:22:31.457000 @@ -207209,7 +207209,7 @@ CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f CVE-2022-41078,0,0,2bafa7e567944ce69e58f4c25c11be178f784c5f8aeb892c2b58f2f3bc426e0e,2024-11-21T07:22:34.130000 CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6ade,2024-11-21T07:22:34.253000 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 -CVE-2022-41080,0,1,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000 +CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000 CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000 CVE-2022-41082,0,0,b6b4e5125804eda18b18c5254fdf07d51e04e80e78d97f6677c805c3c481e123,2025-02-04T18:15:32.070000 CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000 @@ -207598,6 +207598,7 @@ CVE-2022-41540,0,0,0835f451e4365b2ba89b1d7b967d89d4dd5dc079f33fca09331bff3bc262e CVE-2022-41541,0,0,00e52175bebb5443f9ce3da1abf7765314cf802ecb11e4a93b1fe3d7e8087047,2024-11-21T07:23:21.950000 CVE-2022-41542,0,0,8fc7301d48c78688e1f0813f0699c56fa4214aeaacc0eee0cbdaeba78bf09c2b,2024-11-21T07:23:22.110000 CVE-2022-41544,0,0,1fe2c736ec60ca94bc01e4d892da5a8b005e452379dc8b2a17138c769a86955a,2024-11-21T07:23:22.273000 +CVE-2022-41545,1,1,13129666988195e0c1b41db8bb41b2f22e29a6a85c7df4577bb12055b07adb41,2025-02-18T18:15:13.450000 CVE-2022-41547,0,0,1d064e47065a065d677a23b5cabaadf74eb0a67a027ac98d2d0675b1107c294f,2024-11-21T07:23:22.430000 CVE-2022-4155,0,0,2d65b604119b329133f9f2c1484c9bf55ce99c29c3775bcdd528e10d29f39beb,2024-11-21T07:34:41.050000 CVE-2022-41550,0,0,3a6240656d5395b782af363482d974d3bf61a1eb38881afd5e24851fdc41727b,2024-11-21T07:23:22.563000 @@ -212326,11 +212327,11 @@ CVE-2022-48217,0,0,2db66377450a2693874a7822c694ae856a4d238b3dbbf8a1729f58effc577 CVE-2022-48219,0,0,1e0a9254f8a4ff75cfb5e8f8a9952b48af204b78dbe1ccd97aec4e82c9b9b99d,2024-11-21T07:32:58.903000 CVE-2022-4822,0,0,a8a8a99a2c91e4fc7dd77404d27c148186c734ac4ebee8234ff1ebbbe394bdae,2024-11-21T07:36:00.857000 CVE-2022-48220,0,0,663550da87924a5a0cd6886dfeb55c8611229593a43699dc627b6c59762a7035,2024-11-21T07:32:59.083000 -CVE-2022-48221,0,1,8e2b6ae95b56c1ec354dd13a73e6f16c93f2d3bfd4f5ac2a77c5adbba4615406,2025-02-18T15:15:12.600000 -CVE-2022-48222,0,1,672326fbe2ac7aba88e52da31832fdd5a20e47d0b8342cf0cad6c4633e11be9b,2025-02-18T15:15:12.803000 -CVE-2022-48223,0,0,27d6b67daff3b23e83f3b18569807a955e5a339f08da09cf3478a30845e757f3,2025-02-14T18:15:22.503000 -CVE-2022-48224,0,0,94b36feb3339eccc317c82f96017e292429a84f2f92b12839aa24a95d48e2890,2025-02-14T18:15:22.703000 -CVE-2022-48225,0,0,70a21bc233df7974e16705f02ad67bbb6b9de8ee1683ad1cefccc4ef0a022d21,2025-02-14T18:15:22.903000 +CVE-2022-48221,0,1,ca8042206acf8bbe5ab8d06da517e03935b23ac2553b8f50a7556beb4c4b9a24,2025-02-18T17:15:15.380000 +CVE-2022-48222,0,1,bf5cbaf6fcd494890022d431ad5042a44f2417b09667f89eead63cb06fabffa1,2025-02-18T17:15:15.490000 +CVE-2022-48223,0,1,fe6a9804925bc25acb7becdbe84c06c51690b64529500c3f4f9bb880cd2eb04b,2025-02-18T18:15:13.583000 +CVE-2022-48224,0,1,fe0076754de1253fe5fd03fb372f91c22e0d7f00127748552dbd132d756c2e7c,2025-02-18T18:15:13.747000 +CVE-2022-48225,0,1,cfc2cc30563c772bf3d3f29e892f1b47eca4af4de9185053df2b3eba005edeef,2025-02-18T18:15:13.887000 CVE-2022-48226,0,0,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103bd6c,2025-02-13T22:15:08.423000 CVE-2022-48227,0,0,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000 CVE-2022-48228,0,0,e450ba11de27b02775ab6aaff3059b429ddbf2bdeda640fed595f3d8a8f6a0f9,2025-02-14T17:15:12.873000 @@ -213059,7 +213060,7 @@ CVE-2022-48986,0,0,ab815bdb331536c4b34a4b7dc5daabc5943ae78ead18a9b1ac12dab6b3393 CVE-2022-48987,0,0,4d52570dd55ef410b618febfbbc403798beca02e23089a5afd5939bdadd2ea3b,2024-11-01T15:27:26.880000 CVE-2022-48988,0,0,52c32e61824bafd3c64b452806ce39dcfe8447d7180b7c4205a1f2049ab57f7a,2024-11-01T15:20:42.073000 CVE-2022-48989,0,0,8150a990e631fcd9cdd155dfea55371b524a10498eacf3bc94153d59c67d5513,2024-10-25T16:02:05.787000 -CVE-2022-4899,0,0,e6a7360a4efc823e90c0a31bba48c069d11832b6e5d81ec2d2cf0d14e92e0889,2024-11-21T07:36:12.310000 +CVE-2022-4899,0,1,8c9342b3a437452912f0b12018733a3710ea587077e64119834b848ccc17d847,2025-02-18T18:15:14.023000 CVE-2022-48990,0,0,5a26f0031d4d221a80ff4638e22432ff3b67a26a667174b84cac2502ea760d19,2024-10-25T16:03:41.527000 CVE-2022-48991,0,0,e3ef6eb8c025890b85dc2df1ae5404054e6d75d606c6f45c632cf48eac300916,2024-11-07T19:36:33.167000 CVE-2022-48992,0,0,71d57c5f497a5760d2f40f7f5bf244e299148de84dbe35d6976e369f44f5296b,2024-10-25T15:51:38.037000 @@ -213404,7 +213405,7 @@ CVE-2023-0220,0,0,e05dc53e7df0257b386411675d30bf07fe2878de7c6c26b2206eb3f6c3f230 CVE-2023-0221,0,0,552fdbf9cca2c0cc2192330242786d81d481672178c2df7f8d811d4075e7deb6,2024-11-21T07:36:46.403000 CVE-2023-0223,0,0,f970018ad447d52f5c4c73db31e1dc382548828a36a7df9a5f4ce6851743b9e5,2024-11-21T07:36:46.520000 CVE-2023-0224,0,0,3bae8323d50ead6a758de985f14ad7ccb408e4655e031f23a9a22291bd0e9c0a,2024-11-21T07:36:46.640000 -CVE-2023-0225,0,1,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e85,2025-02-18T16:15:14.343000 +CVE-2023-0225,0,0,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e85,2025-02-18T16:15:14.343000 CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000 CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000 CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000 @@ -213989,7 +213990,7 @@ CVE-2023-0832,0,0,ba41f2346967ce23a1fad0fa301c2a3277157ab48eef2cebd36ddd0f8cdd98 CVE-2023-0833,0,0,f81b6b3cc9236c71eabe9aab2aac33e27e38e08305ea33b572bccb587f566a1f,2024-11-21T07:37:55.277000 CVE-2023-0834,0,0,f547e455350402eb14d9713ee1c5d718a3dd5b6fb1b58e1884afffe07b8d19de,2024-11-21T07:37:55.420000 CVE-2023-0835,0,0,a9891930ece6dea40b7e4389126adcd46fe85e5e39e2c8f933f450ceb36d22f9,2025-02-13T16:15:37.380000 -CVE-2023-0836,0,0,40031da1f2a5ea4805c0baacea6910b41c7aa80a324261de616e2f08889c931a,2024-11-21T07:37:55.647000 +CVE-2023-0836,0,1,207b91da8453e3a7c9afe266eb45b2a66466cfbd1117244f43335bdaf34375fe,2025-02-18T17:15:15.600000 CVE-2023-0837,0,0,7b3be44a33690bff444f14e8dbc445da966bed070d4a3fba52e0beabbe425325,2024-11-21T07:37:55.763000 CVE-2023-0838,0,0,69efdc650e292dffa70d5346205426679dbb07638649772819fca39e78fdfebc,2025-02-10T21:15:13.510000 CVE-2023-0839,0,0,59de6945d22d4f5a2e4faad808b3a6c1accf2b1b643f4e1ee9548bb5635258bf,2024-11-21T07:37:56.017000 @@ -214767,7 +214768,7 @@ CVE-2023-1648,0,0,cf2ae4707604cc3161d6256f04f3d3986d8fb6a4dfac6ccbf0616ea71e0b6e CVE-2023-1649,0,0,583c36f882fdfaf419c56ee286bf26ddf39d02e44d9c05c1bcc24e2656ee1ef2,2025-02-04T21:15:22.817000 CVE-2023-1650,0,0,3ef22b9677a710ec82a750681dad98357125266c59a84635e81833b951695f0f,2025-02-04T21:15:22.987000 CVE-2023-1651,0,0,a996c073605204695631addb3d31e929868d3786d69d3f4e9899b7faa070f4e7,2024-11-21T07:39:37.787000 -CVE-2023-1652,0,0,3bf79818e59f508c9fe22f8a992d7b4904cd46b8103f6744d55e2ab094f306e2,2024-11-21T07:39:37.897000 +CVE-2023-1652,0,1,cfa53cc9a83a7197386804ceddce663f516347605f0aa10bc4cf555d05115059,2025-02-18T17:15:15.777000 CVE-2023-1654,0,0,f66ce85144c753ce38a79afb2e23a08e27849201bc1668ccb06ae1849b22b606,2024-11-21T07:39:38.010000 CVE-2023-1655,0,0,893dd63aaa59598fb245bffb6fff6c7970c9825949e937eee21ced0be221238e,2024-11-21T07:39:38.133000 CVE-2023-1656,0,0,90160f5d41319a5264c2d86be6512803e9f2161dd6d5b5ef7e2b2f32e3fc273c,2024-11-21T07:39:38.257000 @@ -218138,7 +218139,7 @@ CVE-2023-2359,0,0,5b0daa02023b96b9445d07c8c3ef946375046635bf15f251791dc74ee4ef05 CVE-2023-23590,0,0,407a071dc8212e3773f17e38b4b42f346b0b3df1b4a82221154d46b918b90640,2024-11-21T07:46:29.520000 CVE-2023-23591,0,0,7b8e9795aa84c5bbc03fbfd2c5d2c3b808a8956761e11d986ad6358b9c477a50,2025-02-10T16:15:32.820000 CVE-2023-23592,0,0,2d908edf3d42b6cb689c0c1078c9a9acacf4346d851c620b8c56cf1906463ec6,2024-11-21T07:46:29.793000 -CVE-2023-23594,0,0,b901a8cc953e3d6132f9a0c01fbeb5821aa3dbaeb62eed9c246c45557d81597b,2024-11-21T07:46:29.937000 +CVE-2023-23594,0,1,f348de21f9fe09563339f17e960ffb27bec8813e804d17339ba0dede057511a4,2025-02-18T18:15:14.270000 CVE-2023-23595,0,0,7463a098c26ccf54bc9d3edde61bcfbe3a8b8c1c76c6d58173a013718173a489,2024-11-21T07:46:30.073000 CVE-2023-23596,0,0,f2d299c1f15bc11f3258819d0f245754e7582c46c7acbf2a6e53315c04330796,2024-11-21T07:46:30.213000 CVE-2023-23597,0,0,6c4d8693493557220e3c6c31fd8cce049bcf6941da9f01a15e1638e35e30d1a9,2024-11-21T07:46:30.347000 @@ -219080,7 +219081,7 @@ CVE-2023-24709,0,0,95724b3cdd469490b5d656e22c325de29d60ac897a910128b841653f99d55 CVE-2023-2472,0,0,5b068f2698671e693c1ba4453c6de14a4f23024ba22de1ed71b24f9a54d16713,2025-01-08T16:15:28.610000 CVE-2023-24720,0,0,6b8bed746e2c0ccf07d91fd8c0cf084ef06296dda35fea10ff93f652dde8ce24,2025-02-11T20:15:32.117000 CVE-2023-24721,0,0,713c683cf74d5b07e827992264dc10f34b57246cabaf877eef720bd3ce53e5b3,2025-02-11T16:15:32.340000 -CVE-2023-24724,0,1,05a88cd95e33a4726ae4f06c87ceb395258f4b7f4993ae98d8cca6d83f32f84b,2025-02-18T15:15:13.037000 +CVE-2023-24724,0,0,05a88cd95e33a4726ae4f06c87ceb395258f4b7f4993ae98d8cca6d83f32f84b,2025-02-18T15:15:13.037000 CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000 CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000 CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000 @@ -220804,9 +220805,9 @@ CVE-2023-2682,0,0,883bce2206d03db51cea0ab1d843f03b819277c9a2a2455a2e8add44a10db5 CVE-2023-26820,0,0,c1b2df4f3d711036f9d1df790a72ba4148e747b21132588a6d5e5e60b93d8021,2025-02-12T21:15:12.463000 CVE-2023-26822,0,0,962ffff9470d823e1ee37e85ddd889c14bbf8c919a0b61f3b268dbcf52cf811b,2025-02-11T18:15:24.467000 CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000 -CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a680,2024-11-21T07:51:58.887000 +CVE-2023-26829,0,1,a7de895aacb5ac6edc183f3cba63000f990fa46b1e26a5793ebc960d01c5b542,2025-02-18T17:15:15.977000 CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000 -CVE-2023-26830,0,1,683ce7c3beff509b5543a502bd9fd65955fa34b1bc868ad726700b30fe133648,2025-02-18T15:15:13.227000 +CVE-2023-26830,0,1,7e92996f8ba4921907cbabffcf77709cb61c548f13fd0d4929e0cae735bf7cf1,2025-02-18T17:15:16.143000 CVE-2023-26839,0,0,e18b17b8b760de23c33835c07c5d11b0e19565942bcd80c3f25ae67fe72322fd,2025-02-04T15:15:16.863000 CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000 CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000 @@ -220822,7 +220823,7 @@ CVE-2023-26852,0,0,92473505fbecdaca1afc72f8b22055c72b6a07c64a2c882c9140469f3f369 CVE-2023-26855,0,0,72a6531eb988dcf5d74667601b0db11debc7ecc9d10fec80ea6b5e15cf8baf25,2025-02-13T16:15:39.787000 CVE-2023-26856,0,0,bdf472bd0bc53b7d5acfe01fdb6a149a576f0180ff8a4f241faf4d19028918fd,2025-02-13T16:15:39.953000 CVE-2023-26857,0,0,e21e327f166ccc2afbd4492ef259c134b672585fcbee5ca9e205c0ce8e68a712,2025-02-13T16:15:40.150000 -CVE-2023-26858,0,1,faf3b84a327b91b11bb5f976dc43b4d6846a8075d326d47528ed907e28e1cf49,2025-02-18T15:15:13.423000 +CVE-2023-26858,0,1,f9ba0ef1a7e04b50c2cefc957772e68908e5a610ae034c372e05261e796b5031,2025-02-18T17:15:16.257000 CVE-2023-26859,0,0,a179140c87ebd4b86459c9ecbb765889c33de21f0da40c45371354b42d1fc8ca,2024-11-21T07:52:01.090000 CVE-2023-2686,0,0,b0249e40da84fca5e5393ccc5f3eb8ae24ec76d0f3735f9ce1e6cb23621be6b7,2024-11-21T07:59:05.023000 CVE-2023-26860,0,0,e65324dc2f0817d7039700acdb97e67ce3e2cd765240c766ea61aa993b7bb5a5,2025-02-11T17:15:19.957000 @@ -220843,7 +220844,7 @@ CVE-2023-2691,0,0,cdad972a5b1dab057475eceea91b8b4e4026bc1b9e8ac8399b2c1d0f44fa14 CVE-2023-26911,0,0,3c699ec1125fd44557b4cc318bbc724cc49305c037cd57a71dc1c77604421632,2024-11-21T07:52:02.973000 CVE-2023-26912,0,0,cc82d907f2264644f2eb78c39d7d27bf176738b96b7b283566a267dc32dd9582,2024-11-21T07:52:03.133000 CVE-2023-26913,0,0,daf6e3585a7ed0249ea37f260c167a69001cd51ef355afc64cddc00b14b53f37,2024-11-21T07:52:03.300000 -CVE-2023-26916,0,1,52b077727d939243051208ac43aa37f3e6caa024c4d543367793dd5cb31c6890,2025-02-18T15:15:13.617000 +CVE-2023-26916,0,1,497f635c8dba305fbce8fab06f9d3581177331fb53214aef703a9fe9f75e5b3a,2025-02-18T17:15:16.370000 CVE-2023-26917,0,0,194a99a53507a39df42526194e8d2506a79a7f17d25af812d6883f6f110580ce,2025-02-11T16:15:36.753000 CVE-2023-26918,0,0,d35475953c7452a05db300575f9a8df61ae7e6e990c6789633f144b55663e74c,2025-02-07T16:15:34.957000 CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884d89,2025-02-11T18:15:25.377000 @@ -220853,7 +220854,7 @@ CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef6 CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000 CVE-2023-26923,0,0,a32f0d476b87c565247b808c5771feae62c9104227b5b4c6c5968c4b92a3a400,2024-11-21T07:52:04.503000 CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000 -CVE-2023-26925,0,1,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000 +CVE-2023-26925,0,0,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000 CVE-2023-2693,0,0,63e3f6a21dbf47f13e9b9a150880a4fe740c6c2f1f979959b365464cba000e79,2024-11-21T07:59:05.913000 CVE-2023-26930,0,0,b2fbe64d3a5b0a40857304c5801b3c2cefb7ecf91b0c92157e84a0e74b934da4,2024-11-21T07:52:04.953000 CVE-2023-26931,0,0,1f8040f802c66b9da260204c76dbdf8565875b00e25f3822fb6071b5f692c826,2023-11-07T04:09:44.150000 @@ -220884,7 +220885,7 @@ CVE-2023-26961,0,0,895533ab6d448d35ea0afd90e70725fa325ae4406fac3a00ec8ad575ff71f CVE-2023-26964,0,0,4667765519daaa3adf19167d9d8bdba4782695f20a8218a1df59eb613c5a1118,2025-02-11T16:15:36.943000 CVE-2023-26965,0,0,5fe050d3ed546ed5ca539a99f1d48b60d7b1c2a58f89bb8e46fdac4ee098d2d9,2025-01-06T17:15:12.030000 CVE-2023-26966,0,0,20620a4079c810d345aa9659d9a695c26cda7892607dc4020c3e9db336a0f61b,2024-11-21T07:52:07.910000 -CVE-2023-26968,0,0,a40605378aa2ff7df236c2cca85315db9fb08b9c216176847f2089aa2aadf65b,2024-11-21T07:52:08.060000 +CVE-2023-26968,0,1,40e6f92b443e315d7d6ce2c4332072b4fdba6fb9811c4bf6abdf2ccad6ee4639,2025-02-18T17:15:16.483000 CVE-2023-26969,0,0,c1a5d9c52adbb2cc58e2c37ebbdb569a934dad998bd6280039a8b9d57768b847,2025-02-07T16:15:35.163000 CVE-2023-2697,0,0,e0c08e3755d3fb0093fcfafbdb7613c26088cf801338d9a8460a4c709b6d3a70,2024-11-21T07:59:06.423000 CVE-2023-26974,0,0,ddb2049675944dcb333839c1e37f264444fe2aa6e9b926466393f398812a9900,2025-02-13T16:15:40.673000 @@ -220893,8 +220894,8 @@ CVE-2023-26978,0,0,1e5a4cdd358294c4ce748cd3a6ab7cc151dfc85b05367acce6f3359789075 CVE-2023-26979,0,0,66b0efdaa6eb21ceb345e2387325cc8f012679d8c4c8371b71a022bac4b7d79c,2024-11-21T07:52:08.813000 CVE-2023-2698,0,0,b001f4b031b6063b45565e8d502999daf8f00d862b243efe1ea83c90afe19edf,2024-11-21T07:59:06.553000 CVE-2023-26980,0,0,3adfbfabf81989e2cd93911180b3b4c022ef04ed0522f4ac8d4766babdcf918f,2024-11-21T07:52:08.977000 -CVE-2023-26982,0,0,845b257bb24dce4d1c30f0145a1303038dd4dcf4eb2ff568fe8a72d633bf6974,2024-11-21T07:52:09.153000 -CVE-2023-26984,0,0,3b99ec789769ff958d010fdceb1bb0d916624b799ff3b877ca7adbc158bf4ebe,2024-11-21T07:52:09.313000 +CVE-2023-26982,0,1,d2a8d1e7c6c2e1f7b2f395e8d2e5058036014e83dc98d9b0760a8d44b2093092,2025-02-18T17:15:16.650000 +CVE-2023-26984,0,1,03e59bd42e61b596f0c6eba527f1662717effa8f0c64075fc9beff674ed27eb5,2025-02-18T17:15:16.817000 CVE-2023-26986,0,0,94a9ca1cf50bdd19fafa94e5e971b449f42a846e0edee43ac0ab234f9a96a360,2025-02-11T18:15:25.667000 CVE-2023-26987,0,0,7e0a4eaa4d803abc17024cde6c193682bcccb5a7d9831d5d98e1851f634d4d3c,2025-01-30T17:15:13.323000 CVE-2023-2699,0,0,1c04a3cc51ebb405d698cee0fe2e32f286ab499340c1d6cc19532b802b686fe7,2024-11-21T07:59:06.680000 @@ -220918,7 +220919,7 @@ CVE-2023-27019,0,0,6ae87986cd7cb7c06ebb70007c3caccf5a8f318951fb08179c2547d9bef2a CVE-2023-2702,0,0,89db1f202b02a106932fedf9649fa2fe945911614dd941a764165f7605194bcf,2024-11-21T07:59:07.040000 CVE-2023-27020,0,0,2fd3363eea0280fba0331e4ff9991d28a4ed9e5bab08dd6ea65a0c6a12f1c3fa,2025-02-12T17:15:15.087000 CVE-2023-27021,0,0,31dc1993cf2235b941a85a3fd10f67604bc4fc88f219aaabbc3c3a1713a02d6e,2025-02-12T17:15:15.277000 -CVE-2023-27025,0,1,88a8b7825ec2badc1c3157c1cc019bd293aee046f60ee013450cfe3bc87d7baa,2025-02-18T16:15:14.717000 +CVE-2023-27025,0,0,88a8b7825ec2badc1c3157c1cc019bd293aee046f60ee013450cfe3bc87d7baa,2025-02-18T16:15:14.717000 CVE-2023-2703,0,0,3609292fde1d1aacb0aa8f87f677168f34fca1193c36d1529bad688fb28841da,2024-11-21T07:59:07.153000 CVE-2023-27032,0,0,e875dabdae70d3bc01bc804badd0a6e9f298cc4e0ef121b744f83395d9fc6ad0,2025-02-10T16:15:33.903000 CVE-2023-27033,0,0,563e9a589bd884d69713b9513c0ef1e92d34512120fc6cc7fb93b1c346976b4d,2025-02-12T17:15:15.500000 @@ -220964,7 +220965,7 @@ CVE-2023-27088,0,0,02388a593b99babc1f18f212d3a41091d176beb534c47dbe7068491745b34 CVE-2023-27089,0,0,7b2c8bdddfb2317066cff5c96a764d30bb910711b4e8d6bb04ba7efb74dfbf43,2025-02-14T17:15:13.770000 CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08 CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000 -CVE-2023-27091,0,0,f86a2899fcddbc2f1a0075b1ce6fe65ae6b87d6707bab315e9b6e4deab518756,2025-02-14T18:15:23.107000 +CVE-2023-27091,0,1,17a7b5261302c28e15dd27d73684171a9a7734aebe7f6790e6711cf73bf58d52,2025-02-18T18:15:14.490000 CVE-2023-27092,0,0,cf3f3f0aaada06ef1105abffb2ded8a829e5905a1e5298bb29b9a9ff84578a52,2025-02-06T16:15:34.183000 CVE-2023-27093,0,0,75ab2d12a6e9a95bb315b505a78454ddc548197730f843a655ef303062aa9b5e,2024-11-21T07:52:18.680000 CVE-2023-27094,0,0,efe71e92652676c9e8d5adcd8c0958e6d181e1ab904060580293934e81cb5b9f,2024-11-21T07:52:18.833000 @@ -221002,12 +221003,12 @@ CVE-2023-2715,0,0,9fed0daeff41969bcf8004121ebe76307716264f4dbd86f501f34cf8e41f2a CVE-2023-27150,0,0,a7fb341ea935be349b83ec099c5ae048f809619dabe8dcfb854a9f1420730b42,2024-11-21T07:52:23.410000 CVE-2023-27151,0,0,6ca0ff73b2619a50944c698fbea13cb7d8caa108a58ea5dea5afc824bff683f7,2024-11-21T07:52:23.580000 CVE-2023-27152,0,0,b7060ca5f8d33052be20d58629e10c78d1ac35d9cb5c9bde5643340fccf09668,2024-11-21T07:52:23.777000 -CVE-2023-27159,0,1,8a3caa8c77d336a6494d769b7fc3c07c9e059e0a758d024941edd96385f97de6,2025-02-18T15:15:13.813000 +CVE-2023-27159,0,0,8a3caa8c77d336a6494d769b7fc3c07c9e059e0a758d024941edd96385f97de6,2025-02-18T15:15:13.813000 CVE-2023-2716,0,0,c75f06874d7c6c43f410fe356c1ef7bc0209b04427c5c0e8715f03873d4fb142,2024-11-21T07:59:09.430000 -CVE-2023-27160,0,0,122547e8abe049817524df44380b58496ff0f4900946923a4a9fcaa6baf0882b,2024-11-21T07:52:24.060000 +CVE-2023-27160,0,1,f8e3c0927fa8e3a458e06512c5fac0b87b17bd3451b384b1b7f5d8ac2decee26,2025-02-18T17:15:16.980000 CVE-2023-27161,0,0,c1c225c9c880e409b8a8480b7b198b4a1a1c9251b029153c521538f7810295fc,2024-11-21T07:52:24.213000 -CVE-2023-27162,0,0,e4cb3c54985d114e1cae604477a240a9090b16c645a117ec58340d339263a972,2024-11-21T07:52:24.363000 -CVE-2023-27163,0,1,9c101eb5654766d13e0254c345cf17aee1d3261a77ddc2387286e3f4d41516ca,2025-02-18T16:15:14.970000 +CVE-2023-27162,0,1,8f603f2e0c3fd7aa8ee57c03ccd280cde9a2325dd8868559c30c8a46c1d296f6,2025-02-18T17:15:17.150000 +CVE-2023-27163,0,0,9c101eb5654766d13e0254c345cf17aee1d3261a77ddc2387286e3f4d41516ca,2025-02-18T16:15:14.970000 CVE-2023-27164,0,0,92ebbb8e2a47cbcbbfb56a213309c52630a9aa5e012b6519949b14cf38a80c99,2024-11-21T07:52:24.667000 CVE-2023-27167,0,0,3ce9a2589b54172eace8e138ec0b8e990fb54060e9678beb0dda03b6727ed36e,2024-11-21T07:52:24.820000 CVE-2023-27168,0,0,f5ed98440bf9c281464a4cf0da65aedc7cda805ca2bf7d5ca1abd326046c72cf,2024-11-21T07:52:24.970000 @@ -222222,15 +222223,15 @@ CVE-2023-28498,0,0,d9f43a5d49512b99fe23be6805c5f8bda3e29564247713faa58aa2f176b6c CVE-2023-28499,0,0,518288bfaddb33c82f8494cb6855906a783805c75daa59fa52464f87e1164f46,2024-11-21T07:55:14.317000 CVE-2023-2850,0,0,c555fba69c2f5ce171fcaefcbd101aa2733a50819ad9a4570d1194b3fa6064ac,2024-11-21T07:59:25.033000 CVE-2023-28500,0,0,ef554dc6eafe9b1ca470603250cc7f8eed745ad3b97dafe91430386f3a7630aa,2024-11-21T07:55:14.447000 -CVE-2023-28501,0,0,915fb292fd9e9e841d488a9ff0fe13831c600d84db3c831b1a27305ff6fdf198,2024-11-21T07:55:14.620000 -CVE-2023-28502,0,0,933001f4d8faea1f30dedab9736e82dc5cddfa1df039fae2b2e18dba0615f73a,2024-11-21T07:55:14.753000 -CVE-2023-28503,0,1,ff2bba0e5777e730f90ca8f0e544cf2c6d75016afc60de3ffdc18e9d2b007df8,2025-02-18T16:15:15.190000 -CVE-2023-28504,0,1,54b5a4a021f46a0551ce9880d88717dccae938637a077d64f2d63dad7b26b5da,2025-02-18T16:15:15.373000 -CVE-2023-28505,0,1,ecfef376552e2183b2a6f5ccfd9a97b196085414f8f6d785b7f4fb8c1bf70b30,2025-02-18T16:15:15.550000 -CVE-2023-28506,0,1,005acd927aca933902f81b5fa86d88a73ac9182ea956fd928728a7e41e2fed74,2025-02-18T16:15:15.727000 -CVE-2023-28507,0,1,e16a2c80507923fe6466b7e09864d6601b35d8e6ebecbd5619c8aa58b1953d59,2025-02-18T15:15:14.060000 -CVE-2023-28508,0,1,f897bf5ede43331bf490f3d7435ddb3131128bd40ce2e27290b464509aa2cee4,2025-02-18T15:15:14.280000 -CVE-2023-28509,0,0,d23369db7fab213305e6bcfd0b61e4ffebc8e0434cf6bcc1004e350f64272b38,2024-11-21T07:55:15.647000 +CVE-2023-28501,0,1,2fb1637f12749510605ed692e73b7c19d5c7b550a683dea77d6a0fb365a07258,2025-02-18T17:15:17.357000 +CVE-2023-28502,0,1,c98a7db29fff10ad01c75a4f0a15cee63265c00c9914430ff73f8ad6647a1292,2025-02-18T17:15:17.543000 +CVE-2023-28503,0,0,ff2bba0e5777e730f90ca8f0e544cf2c6d75016afc60de3ffdc18e9d2b007df8,2025-02-18T16:15:15.190000 +CVE-2023-28504,0,0,54b5a4a021f46a0551ce9880d88717dccae938637a077d64f2d63dad7b26b5da,2025-02-18T16:15:15.373000 +CVE-2023-28505,0,0,ecfef376552e2183b2a6f5ccfd9a97b196085414f8f6d785b7f4fb8c1bf70b30,2025-02-18T16:15:15.550000 +CVE-2023-28506,0,0,005acd927aca933902f81b5fa86d88a73ac9182ea956fd928728a7e41e2fed74,2025-02-18T16:15:15.727000 +CVE-2023-28507,0,0,e16a2c80507923fe6466b7e09864d6601b35d8e6ebecbd5619c8aa58b1953d59,2025-02-18T15:15:14.060000 +CVE-2023-28508,0,1,f2887014d60ad02bfd1c7eed99df8c0ca7b48815e9e7072567064f3970ee14a0,2025-02-18T17:15:17.723000 +CVE-2023-28509,0,1,edb6d4ae15ddcdb55e0109eb9a402d9af64743cd790b67266e389240a64c1128,2025-02-18T17:15:17.853000 CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343ae7,2024-11-21T07:59:25.183000 CVE-2023-28512,0,0,bc046f04a34eb8e9b06ac8b0a405f5510b39eacef271407f3f356b209b2ed0e4,2025-01-29T21:26:57.827000 CVE-2023-28513,0,0,e9946240011947f68ba84203cd8006bb612def46b47525afd835dea122138d0a,2024-11-21T07:55:15.897000 @@ -222814,8 +222815,8 @@ CVE-2023-29134,0,0,397a9f3e630dbbabdab5793eee6ca6dd65adb77983cd6c4b14455eac5113f CVE-2023-29137,0,0,8076322fcc6d24a14b3a1dde3c14cbc7205520ab126c340729f53f8dfab2206a,2025-02-14T20:15:33.563000 CVE-2023-29139,0,0,8549dc3f6f4453f97357e5aef512d14ab36f212b91bd2c5ca685ffb348e7ddcd,2025-02-14T20:15:33.733000 CVE-2023-2914,0,0,b44613314f82717d0cb07c8662342f435f1919f2f997ab416019a0eadc037663,2024-11-21T07:59:33.587000 -CVE-2023-29140,0,1,f55a3fbd92333404306e7231f610a5637cfd0c078560aeff8973f3d1cf076b42,2025-02-18T16:15:15.893000 -CVE-2023-29141,0,1,5295db62e89c184f386036d95e68902d72b5432991a79960e34002d4d2572d06,2025-02-18T16:15:16.077000 +CVE-2023-29140,0,0,f55a3fbd92333404306e7231f610a5637cfd0c078560aeff8973f3d1cf076b42,2025-02-18T16:15:15.893000 +CVE-2023-29141,0,0,5295db62e89c184f386036d95e68902d72b5432991a79960e34002d4d2572d06,2025-02-18T16:15:16.077000 CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000 CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000 CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000 @@ -222887,7 +222888,7 @@ CVE-2023-29213,0,0,0659d2886cd4363f793e4197b39a7b9d1e21e8f6c5ccf0df28d873a06e45c CVE-2023-29214,0,0,d695ebe20fd00d2f656f330ff8760ed69ae973785d1517327ff89cd4d04f9abc,2024-11-21T07:56:43.730000 CVE-2023-29215,0,0,1c36bb444821ace92da838cb3ef17e921a87b502ec0676faabef0901c0dabc0a,2025-02-13T17:16:17.720000 CVE-2023-29216,0,0,1e95092c16d53f0529738b1c70a171f74070a0c064e3c012922a63c29a4037fa,2025-02-13T17:16:17.877000 -CVE-2023-29218,0,1,3652a7dff068d019905f63b4de3ade0f5e1e9781c786e870980f715d4361105f,2025-02-18T15:15:14.460000 +CVE-2023-29218,0,1,28cd1820f850076517b76d323ec986260afd501b9d4fc41916514106dd0b0759,2025-02-18T17:15:18.033000 CVE-2023-2922,0,0,6b3cd96fa545989db321db97c7346e47d72663d6eea89a4b0a7fcb4be798cc72,2024-11-21T07:59:34.243000 CVE-2023-2923,0,0,1785972f4d67cc8f83c3ca06db4e8914d84b21d5ccc07e0e55911e9b5fccfc46,2024-11-21T07:59:34.390000 CVE-2023-29234,0,0,e385146e4d7c4c78d2e9cb7adbf33a377f9e20552e4901285521032e1cede747,2025-02-13T17:16:18.023000 @@ -226938,13 +226939,13 @@ CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608 CVE-2023-34394,0,0,5024dd48b5a3dae7028cef62d61893803441cad1bf0497670d85da6b8c6740d0,2024-11-21T08:07:09.990000 CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bddefe,2024-11-21T08:07:10.127000 CVE-2023-34396,0,0,cabb805a02df64f428d581ac19cc4a5993ad0b37fa13e2c2b635c0e2751edd5c,2025-02-13T17:16:36.117000 -CVE-2023-34397,0,0,4dcb8c2f369cf6aa81bd143703a384a84f3d6f06ad9e452a9092b78a02889c55,2025-02-14T17:15:14.477000 -CVE-2023-34398,0,0,43fbc9995447dbf36a12b91e5c513cc66c11c4f52a06af32faf20f92f6039908,2025-02-14T17:15:14.640000 -CVE-2023-34399,0,0,5ca9c79d07a0eed86009de7626ef80e829d5712f066e69ff7cf9281ee1a9a9db,2025-02-14T17:15:14.790000 +CVE-2023-34397,0,1,968d08976f0f53af203512cc9ad3a9675cdeab94705e6bf3fed8e33be2b90774,2025-02-18T18:15:14.710000 +CVE-2023-34398,0,1,34e3794baffbd143e99f7886e0a6a7587a2b1a10d06b10d405f14b0486e3f594,2025-02-18T18:15:14.820000 +CVE-2023-34399,0,1,5bb4fa21fe1dfabbd46b052daf11a7780561a7e121380f1baa494272f98d714c,2025-02-18T18:15:14.933000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 -CVE-2023-34400,0,0,5a074108ed168764e3b4bd70fc729486e7e989f41a27084470ea99d1344149a0,2025-02-14T17:15:14.933000 +CVE-2023-34400,0,1,6dda43fc54d4c044a74ef9a113750681ad42a24e16fdf370e87b37643ae87b42,2025-02-18T18:15:15.043000 CVE-2023-34401,0,0,a56ec84af0fc63a7e1b026ee8045ffc0b54afd7dbac33da84057cec72673c587,2025-02-13T23:15:08.867000 -CVE-2023-34402,0,0,82c91e85de59b1ff4e9705d15acb6fb7c7c7ea6990ff661965d27cd67ea6faf3,2025-02-14T17:15:15.087000 +CVE-2023-34402,0,1,c78a2dbf7fa8393f8c25b5b8b21eaeb697d4d71524fdbb2a5c375603e6120769,2025-02-18T18:15:15.163000 CVE-2023-34403,0,0,eb0dca1a5f6454558c31d75b6ed692ae490c22c970720bd85806096597d47c16,2025-02-13T23:15:09.440000 CVE-2023-34404,0,0,335287281ac129a1025cb1021db0841bd6f7c8376ff5d231f9f4540744b0246e,2025-02-13T23:15:09.553000 CVE-2023-34406,0,0,36bc16e478a055fb4fedf2e4d8547169137b2607058a49615980dca05a514b16,2025-02-13T23:15:09.633000 @@ -238368,7 +238369,7 @@ CVE-2023-49777,0,0,33c519d5a7962fa4046ad12f5cca27992322c652fb741caea4eb8367807f6 CVE-2023-49778,0,0,32696ac80ddb602c52e8fe776f284fb0ae6da43b7282b564f5a7f39ba2f17407,2024-11-21T08:33:49.730000 CVE-2023-49779,0,0,208a0c4daf9d511825be4208e7428526e848b797a262491bdae905a77266c88f,2024-11-21T08:33:49.890000 CVE-2023-4978,0,0,9bf211ab4eda87736cc28a34ba658d0ccd93638d5da330e5c54fe73d74302125,2024-11-21T08:36:23.437000 -CVE-2023-49780,0,0,16847dd2a2a4c00a60add9004862c82ca549f0aa98dec760759be5d958cc4d9d,2025-02-12T15:15:12.077000 +CVE-2023-49780,0,1,c6de505a2c82852b714e9ddbd98df62b117ecf9e9e227b1280e542311bff4675,2025-02-18T18:15:15.280000 CVE-2023-49781,0,0,3563f4405dfa96098f4f59027cce7c23b059b81f69ad6687b4bbd7d42605bb73,2024-11-21T08:33:50.010000 CVE-2023-49782,0,0,d88bb5846ccf235986a34db8ee7ec2e7c4f993cc0c87f8a5d3589de125363ba3,2024-11-21T08:33:50.137000 CVE-2023-49783,0,0,cd66debb4e559f3c84e5128cc8085a7de9859741fad8a54e1384a18a6f8b2960,2024-11-21T08:33:50.277000 @@ -245574,8 +245575,8 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12314,0,1,c3752972466cca307bd35c84eef94c7242b54d78ea2bb12694801d320e65e43a,2025-02-18T15:15:14.687000 -CVE-2024-12315,0,0,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000 +CVE-2024-12314,0,1,bcedae4c1e314067f6da4c67763cbd7a36b7d994bd0bd56cbd0c70038227bc94,2025-02-18T17:15:18.227000 +CVE-2024-12315,0,1,f4f42cbb7c4e3a459f72a2dcfb318fe96851866a286888f42eab9ef89b083452,2025-02-18T18:15:15.443000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12320,0,0,4634e0ec62d582413588701c85691767f88539a726ad91381c2adf94162c1cd5,2025-01-31T18:25:31.050000 @@ -245817,7 +245818,7 @@ CVE-2024-12582,0,0,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3 CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 -CVE-2024-12586,0,0,45f01f1b478cb869be989e26e8c0f02fb866364f791fd6d1e880ba3f24fe15c3,2025-02-13T15:15:17.200000 +CVE-2024-12586,0,1,6b5fea421ab4f9fb9a49e9284be2d6bf7111e5255852562f440c3349fa3e6bb8,2025-02-18T18:15:15.673000 CVE-2024-12587,0,0,7960172962a4bd5df694844fdf178521cdb4dbd17b76b544453367f416394602,2025-01-13T20:15:27.283000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 @@ -245830,7 +245831,7 @@ CVE-2024-12595,0,0,d10767ce84f7e81d5a6ad487503289a59f4d01b86cd7eb0b224ee74e49237 CVE-2024-12596,0,0,5fc66f30988060a8b7bb1a593c82bd6c3fc2c995268e617c35d93ef410dc9a09,2024-12-18T04:15:08.253000 CVE-2024-12597,0,0,fa6e46b2c507115aae1eeb61d57b8709f3b297cf5808fdd7f912f6df3d0250c1,2025-02-05T14:58:45.730000 CVE-2024-12598,0,0,2c0e6e211745cf2c8a775604eda102619f7e15adec08efbb58ccc8f252ed3240,2025-01-17T07:15:26.577000 -CVE-2024-12599,0,0,9297193506a5cdcb15e452d02a3e08c400deb976f6e004f06c7aaa320f94ff89,2025-02-11T05:15:12.790000 +CVE-2024-12599,0,1,7841aa2cabb81cfeaf615313cc1e2889a6d6eea8a687177d6e98089597c3df01,2025-02-18T18:15:15.853000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce66367f,2025-01-25T07:15:07.807000 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 @@ -246082,7 +246083,7 @@ CVE-2024-12935,0,0,246cb0571f2507038660c0e81ab4ec24b070071c999a554a789bc643b9365 CVE-2024-12936,0,0,e5d2746e3685c47179c98ceba36645686b2bcf170b130292c0e1cc384dd3fd5e,2024-12-26T17:15:06.487000 CVE-2024-12937,0,0,b02f4e3817e0fb9a6280a4eb3a77c4cf6f0aac28b5fe415e4a1cc8de68c81754,2024-12-26T17:15:06.873000 CVE-2024-12938,0,0,815ad1fbb5ef85a31a9ed236c3e67b238fa902a4432946f8c612da393635402a,2024-12-26T06:15:05.987000 -CVE-2024-12939,0,0,ab7bf76242f343e8c9130dec93392fb3e0cc7565ecfb07a7696c24f1462e5214,2024-12-26T07:15:10.967000 +CVE-2024-12939,0,1,32654b6c18509bf50ed78bbb26ce0497c338f806d93597d58632deb506209b0c,2025-02-18T18:45:17.713000 CVE-2024-1294,0,0,b71ea2285980093702250bdd703066da616a4eac45cb0506e646936d244fcc0f,2024-11-21T08:50:15.277000 CVE-2024-12940,0,0,d7f154d179611651af13505b53d20f7105004eee3149ed750a04e34ae1addbbe,2024-12-26T07:15:11.637000 CVE-2024-12941,0,0,fd9696d2eb12af21d8cd287056b6ce693c42b5c4d791e1be7e6c47bc4d272f95,2024-12-26T08:15:05.117000 @@ -246108,7 +246109,7 @@ CVE-2024-12959,0,0,5225592e400663837fc5548274da6cb321b7f3df19f7584dc1065af38a815 CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066caf,2025-01-16T15:27:56.237000 CVE-2024-12960,0,0,efd466cfc9f2f6251ddec4531038becc9445ea6af683699e7ee7017154c34377,2024-12-26T18:15:21.027000 CVE-2024-12961,0,0,291b46c6482f64b2afbe8eb7bd6d496579d9c717a7992cb4d0a3a6798792113c,2024-12-26T19:15:07.563000 -CVE-2024-12962,0,0,7da95e9585c1afbd89165dc7fede25d7b9ca4d6c693429aada8872653af063dd,2024-12-26T19:15:07.710000 +CVE-2024-12962,0,1,2e934c0146c89d6547352a90e84606379fb66f2b613eb45f05a0f9592a42c1ca,2025-02-18T18:51:27.840000 CVE-2024-12963,0,0,57f82207620016a08e0cb80b0791f36983b5234c758838adbd8c3ad91e56b9fd,2024-12-27T17:15:07.317000 CVE-2024-12964,0,0,d513e19faa5f3847ffc26f78baf6678142a42a5a46d88fa1ccbe6fd4373f497d,2024-12-27T17:15:07.477000 CVE-2024-12965,0,0,ccbeba69b88040c2173fe476b8addcc60118e660d17fdf7387364ed0552b4ce6,2024-12-27T17:15:07.593000 @@ -246120,10 +246121,10 @@ CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5b CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 CVE-2024-12976,0,0,43a9acc7b69e46736fdd09ae24588944ab6f6c791f8fe6b3bbe2688255c67125,2024-12-27T19:15:08 CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000 -CVE-2024-12978,0,0,c376c8c32a61e17330cbb26bc78f66ecd82bd4792c38c1ee17dcd118f404361f,2024-12-27T04:15:05.603000 -CVE-2024-12979,0,0,3febb0786be4427a4e4f8746fc33981a0689ef410a4f5e0e987dc6f4515bca1f,2024-12-27T05:15:07.130000 +CVE-2024-12978,0,1,cc7b0fdc1d00be1abfc6d70979d368e4b6fe4326bf96f1dbdc3a2fa6ad847e89,2025-02-18T18:51:08.940000 +CVE-2024-12979,0,1,8e40633878232ed2ab53a6382d6f99518b9212e94914f1a8de9029f0cf9e02b9,2025-02-18T18:50:22.963000 CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000 -CVE-2024-12980,0,0,2c44cd3c209159ad2d04bae7492d3a83d84c8b9ef9023ff460d136df0cf0203c,2024-12-27T05:15:07.353000 +CVE-2024-12980,0,1,63204f4d95b678e5ba4d6111e311790259cdebe29e9311b61d38663cf6fa481a,2025-02-18T18:49:54.517000 CVE-2024-12981,0,0,cc3a9baaa165fd598580712be925ef902feba7ee246b99e3aafc65513c39771b,2024-12-27T06:15:23.463000 CVE-2024-12982,0,0,893f77442fc90837f9fe8793b451cee087a15ccc8805ad197e0839b6fe5fa954,2024-12-27T16:15:23.540000 CVE-2024-12983,0,0,660e4511105a84d2089d110a972b11b03704d82ea07b70bce67e29a844922ccc,2024-12-27T16:15:23.683000 @@ -246156,7 +246157,7 @@ CVE-2024-13008,0,0,08e0acc08ad511d4aaf66d53e013ba4bcad724dbdcb83eaf558ce18506f6c CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000 CVE-2024-13010,0,0,6128af853809df81eee18f8a73cc49e9b80723ec8e3b72221c6cf24311d0db40,2025-02-10T19:15:37.283000 CVE-2024-13011,0,0,362d1d0e4eaef25be8bfac936a6d705b5bfeabc389aabfe60750090901182522,2025-02-10T19:15:37.440000 -CVE-2024-13012,0,0,6e9a44ae8a28dfef14f0abf6b63707a2494b4e800a2093faa5d818a3802aed3f,2024-12-29T12:15:04.970000 +CVE-2024-13012,0,1,1d231ce471a8cf14a114e2ff543c22cef656416204d4cd3d6f5ad4910c0298f7,2025-02-18T18:53:25.830000 CVE-2024-13013,0,0,32d3d4504fff1b55efdca0cc73fd891662772b6f391fb1a6020ef9adb0a6dc01,2024-12-29T14:15:04.933000 CVE-2024-13014,0,0,34d8db6155c1e8864813ba6d4ba84300a0edc5c6bbf2734421a8a89cd4922927,2024-12-29T15:15:05.530000 CVE-2024-13015,0,0,83724ac0eee08da2b535c9278f6eaad5343673e241624d7bd1478c15016912ed,2024-12-29T16:15:05.100000 @@ -246257,7 +246258,7 @@ CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43d CVE-2024-13117,0,0,48c4c1a0deaa83ed5f11e564cf33aba28b1ea8edfb18de9dc2dbe1b856b27247,2025-02-03T15:15:16.440000 CVE-2024-13119,0,0,73826a06c11021e3ab53b915522c9178a0e342dd2d9e6f744a28454c1427d96c,2025-02-13T15:15:17.360000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 -CVE-2024-13120,0,0,4a722c39c0ecec3ebf7ba191280a147f7889b83493ac413c6a2d329ea02a1302,2025-02-13T15:15:17.520000 +CVE-2024-13120,0,1,01e8eb521e95e41e82091c7a9f1593a28634c208db510b4e1c1c474760e5f764,2025-02-18T18:15:18.040000 CVE-2024-13121,0,0,1cb32d5c81759826371137dab28ea20a0e9b2ee291d28fbf0b4811af4929e454,2025-02-13T06:15:21.050000 CVE-2024-13125,0,0,452c89b1ee668e5d6e54699ad9837fd5a4d690e2d0944aa8dce85aa2417bb1c7,2025-02-13T06:15:21.210000 CVE-2024-13129,0,0,c8465ea9fafd80ae001698785c09dec31df42294cc4a62b87a1aaef854b51892,2025-01-03T22:15:06.677000 @@ -246480,7 +246481,7 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 -CVE-2024-13365,0,0,b2637bdd89ea551a910692a25748d06b3664b9f07ef48e088d15324cf8639f1a,2025-02-12T15:15:12.860000 +CVE-2024-13365,0,1,d4c9fb3b4eb02bb797a58b6d290aa4b0d82f091aa00e734ed2f15824907289b9,2025-02-18T18:15:18.303000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 @@ -246533,7 +246534,7 @@ CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f07 CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 -CVE-2024-13435,0,0,d15c9c331d26c4aefe3cc08b7475a5a438e857c1614d3c9f92ce729847209da9,2025-02-12T15:15:13.093000 +CVE-2024-13435,0,1,89f24bc446706fa5fcd2115cd25029503fee212a6b4fbe4fee449edba1db576c,2025-02-18T18:15:18.680000 CVE-2024-13437,0,0,ac4ee3cde1737eec9f740e3f4e2e3bc68da9f2e601434dcfb63740e8fa129b22,2025-02-12T10:15:10.920000 CVE-2024-13438,0,0,c5aede0e8f4f03085f5bfd3812915c95c58edbe7342df19989694e57452a24a1,2025-02-18T06:15:11.740000 CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a6305a,2025-02-15T12:15:30.300000 @@ -246562,7 +246563,7 @@ CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 -CVE-2024-13473,0,0,6be75970459d75e2460a9f7533a8a3bdd952b09ffc2fc6a74caec379c907a870,2025-02-12T15:15:13.270000 +CVE-2024-13473,0,1,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000 CVE-2024-13475,0,0,5092e9173eadac632d984f8d6b080371e4a16d09f059f921441142bd53ed3c18,2025-02-12T10:15:11.777000 CVE-2024-13477,0,0,994d41dcdca8ea2949161c6a3039cf39facb69cdf429b9bbd695e457cde87ed6,2025-02-12T12:15:28.660000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 @@ -246603,7 +246604,7 @@ CVE-2024-13523,0,0,a01422a75b98041b28e49f24f2d7440e366f8a9a4929907951037686a612b CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000 CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000 CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000 -CVE-2024-13528,0,0,0d789a8dfbf444e422c6778fb22b658142aa2f2a828cc3fc991f1ee4d9c57658,2025-02-12T10:15:12.130000 +CVE-2024-13528,0,1,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a301d8,2025-02-18T18:53:58.897000 CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000 CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000 CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000 @@ -246663,7 +246664,7 @@ CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb848 CVE-2024-13600,0,0,56cac1498188e92740769a93fb9bbd90e1fcbfaecaef35b28b714caf9a59f0b3,2025-02-12T06:15:19.643000 CVE-2024-13601,0,0,e0015393c764a503ff79d329184d467cac0f9703697b52d602663376d3e165e8,2025-02-12T06:15:19.830000 CVE-2024-13603,0,0,f5ddc39376765e5cf70d139b9cd0562a2cffa9ee9e42ff0700edf6701aa0da37,2025-02-17T06:15:11.560000 -CVE-2024-13606,0,0,1cbdd85184ccb544c93c1632b6d2d3443b7aae450a16746f7539ee65d5330de1,2025-02-13T10:15:09.310000 +CVE-2024-13606,0,1,3678a6b8c1379d0e1b01e3251fb76bf1b3c0d7e3ee42e4cf605940cc5ab858d5,2025-02-18T18:46:05.887000 CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000 CVE-2024-13608,0,0,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000 CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000 @@ -246678,7 +246679,7 @@ CVE-2024-13626,0,0,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12 CVE-2024-13627,0,0,091818d37bd994aab1b6b18bae211dee9546cb2e17475bf34984a23caeb51798,2025-02-17T06:15:12.047000 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 CVE-2024-13636,0,0,c685b1a09dc1c258e65b547dde9c2237c56f30935eb20290c56e8541aa2b245e,2025-02-18T11:15:10.143000 -CVE-2024-13639,0,0,2fa3cbcf0e6974db61fb65364ec620ba817caf77aea64fecbbfef94d3304d5da,2025-02-13T09:15:07.273000 +CVE-2024-13639,0,1,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000 CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000 @@ -246709,7 +246710,7 @@ CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be531 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000 CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000 -CVE-2024-13689,1,1,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000 +CVE-2024-13689,0,0,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000 CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000 @@ -246759,7 +246760,7 @@ CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b8 CVE-2024-13783,0,0,ac9bfe0bdafe91bcdd1a8a8c9fc20390084611c0cb7ca54a0c41211f48373302,2025-02-18T11:15:11.600000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000 -CVE-2024-13794,0,0,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000 +CVE-2024-13794,0,1,27d6b89d805464403aa5cd7b47bffa4f0df39472970f2a8182a5a27be68e3d41,2025-02-18T18:15:19.290000 CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000 CVE-2024-13797,0,0,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 @@ -246769,7 +246770,7 @@ CVE-2024-13813,0,0,a0414a00a2a30561fb3007f9bc2cc4b58102a245d589b97ea6ee429ccb8e9 CVE-2024-13814,0,0,926ac7ba555f373e009e96f6ea518de03ed4e3d0caa0470806ccc3f9ba0042fa,2025-02-12T09:15:08.433000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 -CVE-2024-13821,0,0,65c4b871166a4f4080aaa963c4548c4e1480b7070090634519cabc498886cf1c,2025-02-12T15:15:14.643000 +CVE-2024-13821,0,1,92231948809e64858a527fe3859ea33ead7fc0306ca0e57a7c903c741fbe208f,2025-02-18T18:15:19.620000 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,aa117bb4caae4c90c9ef562f3b17aec83c186c85e2ed83fcc25ce7b11090cff4,2024-11-21T08:50:27.733000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 @@ -246784,7 +246785,7 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050 CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000 CVE-2024-13852,0,0,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 -CVE-2024-13867,0,0,b22bb2f54b64760b76b696bbb0a0a23f6d99826e999c63e0854f07bc507510b1,2025-02-13T10:15:09.847000 +CVE-2024-13867,0,1,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-13879,0,0,9feaa77a4a107496b778129b23b28c9a020cd8ce5e3b7bb155fa8c6898d38c2d,2025-02-17T16:15:15.950000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 @@ -248884,7 +248885,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6 CVE-2024-21677,0,0,9adc47e0832427eda7364295840a597f011ad6c45d28360ab29cc481ff9d8819,2024-11-21T08:54:50.897000 CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000 CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000 -CVE-2024-2168,0,1,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d64,2025-02-18T16:14:41.327000 +CVE-2024-2168,0,0,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d64,2025-02-18T16:14:41.327000 CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000 CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 @@ -250061,7 +250062,7 @@ CVE-2024-23315,0,0,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000 CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000 CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000 -CVE-2024-2332,0,1,22fcecd0efe7e826547c745f5884287caa655cdd7bc975f499fc3e660dc05509,2025-02-18T16:17:02.050000 +CVE-2024-2332,0,0,22fcecd0efe7e826547c745f5884287caa655cdd7bc975f499fc3e660dc05509,2025-02-18T16:17:02.050000 CVE-2024-23320,0,0,5358fceafc65b7c895824a066eb3639945e8b03f1c69910f4d447f806474bf37,2025-02-13T18:17:01.897000 CVE-2024-23321,0,0,7682ed0399d43e472433618b8bab56c7d3c04a20e5f559c1c72b10263abb2d72,2025-02-13T18:17:02.573000 CVE-2024-23322,0,0,0cedd9112f57f1ccea80b0ceb4198f638a5950e1d187eb161d7d108eeb3da784,2024-11-21T08:57:30.260000 @@ -250643,7 +250644,7 @@ CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2c CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 CVE-2024-23928,0,0,aa893d0bd03b0fc4eec222c87d3670cc0bd053b0b68fc8887badbad0acd19fb1,2025-01-31T17:15:13.030000 CVE-2024-23929,0,0,f24b814b1ed24e572e44263ae81453a6c749c950d9f79f981f97ff46f8081fe5,2025-01-31T17:15:13.177000 -CVE-2024-2393,0,1,e1f7416afb0d3dd6d4e614fbf7a14456c46925ea34c7eaf87ef76f8addbeb770,2025-02-18T16:20:38.263000 +CVE-2024-2393,0,0,e1f7416afb0d3dd6d4e614fbf7a14456c46925ea34c7eaf87ef76f8addbeb770,2025-02-18T16:20:38.263000 CVE-2024-23930,0,0,df289dfecd334ee530f5e32c563493e2769f96df68cc173a7e05a2e4c1e28769,2025-01-31T16:15:33.767000 CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000 CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000 @@ -250781,7 +250782,7 @@ CVE-2024-2416,0,0,ab5105a0d1f1343d53be03ce7b47733d31cfcee441fdb5367e61df3fe9b2d2 CVE-2024-24160,0,0,e19b8014b49c30329495072f174bac90c20d64ed22c36b21f9d4c3477741d674,2024-11-21T08:59:00.147000 CVE-2024-24161,0,0,f9d18845134ef760f5c37bfd6a74b031ec414e86bfd2197e0d2d8955f1e8440e,2024-11-21T08:59:00.290000 CVE-2024-2417,0,0,6199531f9155a880d068e24eef822b1edbcb6c4893517372b5d25764e9bf03fa,2024-11-21T09:09:42.537000 -CVE-2024-2418,0,1,a754a85317d98b9c2f5e469fa90178131735d4897cc7aa17f5aaf089859f272f,2025-02-18T16:22:50.640000 +CVE-2024-2418,0,0,a754a85317d98b9c2f5e469fa90178131735d4897cc7aa17f5aaf089859f272f,2025-02-18T16:22:50.640000 CVE-2024-24186,0,0,07767a469bb9f886899dec5f70186dd871757234273491c05682334a187b13be,2024-11-21T08:59:00.440000 CVE-2024-24188,0,0,c6ea63f8b5a602ecddf385c0ed8349db234fffb3df07bfe2900c73a158dad28d,2024-11-21T08:59:00.590000 CVE-2024-24189,0,0,8654f184d124e38bd222b249f6ecbca50375bc780d645047f0c354a41c91f111,2024-11-21T08:59:00.740000 @@ -251662,20 +251663,20 @@ CVE-2024-25526,0,0,65dd892c17e24b21c743b2957fe12a5da977f57606051a8d155e608c03a52 CVE-2024-25527,0,0,2feec88a1a9765ad44469f5aec4158d93cab6f4269704036d841801342c53cda,2024-11-21T09:00:57.100000 CVE-2024-25528,0,0,dd2239ad068e7da7d722a64493efa5e226739bdacd085ed884b938c870e36392,2024-11-21T09:00:57.247000 CVE-2024-25529,0,0,8f10be39f9da45d79933953178d2cdb7ce2e7a6a31718f75640d627862035de2,2024-11-21T09:00:57.463000 -CVE-2024-2553,0,1,0428c7caac4c14b66d42abc7e2c263763f56e7b075b21c530f6512b1c928cc0b,2025-02-18T16:24:04.587000 +CVE-2024-2553,0,0,0428c7caac4c14b66d42abc7e2c263763f56e7b075b21c530f6512b1c928cc0b,2025-02-18T16:24:04.587000 CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c8c6,2024-11-21T09:00:57.667000 CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000 CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000 CVE-2024-25533,0,0,a5571190d8ae1edce6fb036db178d91c19debdb8ca0e08d6186d18e2ecd0ad98,2024-11-21T09:00:58.313000 CVE-2024-2554,0,0,e205e9f72b72219de437b4511d9094a43e4fe790b95a7f65bbd3f50b303b2486,2024-11-21T09:09:59.897000 CVE-2024-25545,0,0,f63725e164070cc7f9aa69b32e1a33bf2cfbc32fe50065463242eb8374c7b6e3,2024-11-21T09:00:58.537000 -CVE-2024-2555,0,1,e08bf02feccbcc8b6fca6136ddfd134c56db00a278d54bd0b5e0f814b0b4e4e4,2025-02-18T16:52:50.603000 +CVE-2024-2555,0,0,e08bf02feccbcc8b6fca6136ddfd134c56db00a278d54bd0b5e0f814b0b4e4e4,2025-02-18T16:52:50.603000 CVE-2024-25551,0,0,650440c21f088bef59f5c6a3697f7b30ab533966a389f6fad3ff6f66329da998,2024-11-21T09:00:58.770000 CVE-2024-25552,0,0,c29492323c9c7ee00969f36b8fb3dece7caae4dcab3dbfec3c6b1f51d7fb887c,2024-11-21T09:00:58.990000 CVE-2024-25553,0,0,d425d147501fa8006dbadf60a3ee6d0e30ea870822653a9e9b85ebafb1bf219a,2024-03-01T08:15:37.950000 CVE-2024-25554,0,0,5ebde31c21d4e190368d0ea561a226f998eab9ab1a3ffbf4889f3384c5f1c9da,2024-03-01T08:15:38.107000 CVE-2024-25559,0,0,d15ef6a8292ff4e3cc5d05413efc5a3e9dcb2e2f4913411a9a6afc4ea649c703,2024-11-21T09:00:59.190000 -CVE-2024-2556,0,1,f4c80da7407f04757bd46e076f7f4e3a185b6829aa0c1e9a0fee27adafa78c35,2025-02-18T16:50:19.370000 +CVE-2024-2556,0,0,f4c80da7407f04757bd46e076f7f4e3a185b6829aa0c1e9a0fee27adafa78c35,2025-02-18T16:50:19.370000 CVE-2024-25560,0,0,7b2f14a389c4855e094fced0bf47660aa6960a07e134b3de37af09c260a2b69b,2024-11-21T09:00:59.380000 CVE-2024-25561,0,0,dea1d7704dde6d0a5306f95f9d4da9e3b9249ef4c0186b054ad470185ea987be,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,a56e4e3ba7171dbd525020e765b8f1e1293c9793670b4770b9e6bb6db8c89d53,2024-08-31T03:40:47.857000 @@ -252782,7 +252783,7 @@ CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c CVE-2024-26897,0,0,99a4a65c4d2cf2952c1beef32b5c14c24ca683dfde6ce0996f5012d6d08130fd,2024-11-21T09:03:19.780000 CVE-2024-26898,0,0,59064cab5402bdde52c986a7bd49e55f19dd21c4edcf6601694e90d218d8ee73,2024-11-21T09:03:19.907000 CVE-2024-26899,0,0,b25c468fdd9a5dde607d7e60e93a4f4378e05bbaed78a1b87031bd334bf1cf78,2024-11-21T09:03:20.160000 -CVE-2024-2690,0,1,f54be296cda9442e3719694faf713502364bcd62ae99daa0e6de3ce951368fba,2025-02-18T16:54:08.043000 +CVE-2024-2690,0,0,f54be296cda9442e3719694faf713502364bcd62ae99daa0e6de3ce951368fba,2025-02-18T16:54:08.043000 CVE-2024-26900,0,0,89eb36b4021cc9aa920b6f52a26d6c2b349256cf670208b8b8832bd853f9efc2,2024-11-21T09:03:20.300000 CVE-2024-26901,0,0,ce718d6c1afabba164002b2247fbc0f74d9cb4434a3cc5019738d6e3fcfac2ba,2024-11-21T09:03:20.453000 CVE-2024-26902,0,0,3fd3400946dbfe9fc533be7b14f34ebccba35c6430809af9d495947e583d5c1e,2024-11-21T09:03:20.690000 @@ -253393,7 +253394,7 @@ CVE-2024-27530,0,0,c97aacf77b892ac56a4dc1aa81533416df2a035271ce715380578673eab04 CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b794326183c6,2024-11-19T21:35:05.417000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 -CVE-2024-2754,0,1,f140b41aa53fbf6da0848ed003e2956f3ebbfb41a25f4725ef2371f5e6a35873,2025-02-18T16:56:54.550000 +CVE-2024-2754,0,0,f140b41aa53fbf6da0848ed003e2956f3ebbfb41a25f4725ef2371f5e6a35873,2025-02-18T16:56:54.550000 CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000 CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000 CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000 @@ -253775,7 +253776,7 @@ CVE-2024-28042,0,0,2fdf5e585680de3ff17efb3bc78e29135378fbfa431dd23f958a353437d44 CVE-2024-28044,0,0,4321e66e9abad9bc2815f064d2409efc5b717b87741f240009dbca664117840a,2024-09-04T17:12:54.973000 CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537d7d,2024-11-21T09:05:41.680000 CVE-2024-28046,0,0,08ac6a41262a30c05ef763f8296b9175ae9831f9fdea62d8c95f9945b9c74715,2024-09-06T18:40:14.330000 -CVE-2024-28047,0,0,3800d9f5b935cae9ef9605bc15b96dd4381784de21fab94bd936f4ce94aca86f,2025-02-13T15:15:17.957000 +CVE-2024-28047,0,1,009fd222e0d3ee891596f884e48d8f59b6eec7c4096c5a8e6e521e8f0af3e2f7,2025-02-18T18:15:20.030000 CVE-2024-28048,0,0,166375921280a7285874abcdec0584c225aafe530cd2ca9bad02a6525a8cff07,2024-11-21T09:05:41.997000 CVE-2024-28049,0,0,4191140b72d68518c43bb961f8171d2b3da1a3878f82c679e5f952ecd7437a12,2024-11-15T14:00:09.720000 CVE-2024-2805,0,0,fe8f764c46018c0437f3ff224d0879dfaff251abe0ca32544a20cce1c4a57b33,2025-01-24T18:45:05.873000 @@ -254064,7 +254065,7 @@ CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f72 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,eb3e3360556b68d794af1ae08995717641c6898e210d72f26e5d317c83eadaaf,2024-11-21T09:10:40.053000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 -CVE-2024-2849,0,1,b781d1db4ca087a28951b4b33976b64e85895536411670722d7577d4c6b63e42,2025-02-18T16:57:52.660000 +CVE-2024-2849,0,0,b781d1db4ca087a28951b4b33976b64e85895536411670722d7577d4c6b63e42,2025-02-18T16:57:52.660000 CVE-2024-2850,0,0,ddfa8db4983f18c60701e96d4942ce6f6bb96a73c28f0cc400ac097ced2a3a5d,2024-11-21T09:10:40.440000 CVE-2024-2851,0,0,f1913ee0996b40befd8b28b4cfd22ff585e0781b3db3dfac02bb2a05a881b3ea,2024-11-21T09:10:40.600000 CVE-2024-28515,0,0,8635dd87ea8a3a499809e352c5b7ec934d36b0555af2f64334f2b2acfc4f6a01,2024-11-21T09:06:24.533000 @@ -254670,7 +254671,7 @@ CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524 CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000 CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000 CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000 -CVE-2024-2930,0,1,238cd69f670566e1da09828c2344e755e710e55c00ffa65a462cdefa17cc700d,2025-02-18T17:00:05.117000 +CVE-2024-2930,0,0,238cd69f670566e1da09828c2344e755e710e55c00ffa65a462cdefa17cc700d,2025-02-18T17:00:05.117000 CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066114,2024-11-21T09:07:55.647000 CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000 CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000 @@ -254679,12 +254680,12 @@ CVE-2024-2931,0,0,06ccc2dcd781809116ebbd74f9b3f6ebb8a8544b117075c949793d8040784f CVE-2024-29316,0,0,fcf08fc934238242be85211e527308a25a1845e213d3df0567dedd77f3e73990,2024-11-21T09:07:56.540000 CVE-2024-29318,0,0,6b7a8de3b5f73b6e00b5cb422aecae397836bdfb0435783acd4fb94fb5e7b3ca,2024-11-21T09:07:56.760000 CVE-2024-29319,0,0,69fb3b2cb652eb32dd1d717d0873133a6783ff4c6e6a16c234669dea86327af7,2024-11-21T09:07:56.937000 -CVE-2024-2932,0,0,3d8fa2ca8cef04776b0156545950056e9fb0be6e00cd4fe1db4cd99986d942cc,2024-11-21T09:10:52.247000 +CVE-2024-2932,0,1,7dfcd60e14cfd8ce64df681f15673fc15b43b9f39bdd7925fb595f4cc6ba1ba8,2025-02-18T17:02:22.437000 CVE-2024-29320,0,0,9982221ae2ee12973c2d99f649aa7d2d34252735124519ff1ea14f9a4a1f1f89,2024-11-21T09:07:57.167000 CVE-2024-2933,0,0,aa36ab561887564bee0d2b5b8199cbbcfe3b5235044831189f4ad1e0368010a4,2024-11-21T09:10:52.387000 CVE-2024-29338,0,0,1aaa1318dec73367eb36a5d0cd1abeda9170c9dd8d554a9376a051f01884cb6d,2024-11-21T09:07:57.383000 -CVE-2024-2934,0,0,10f3e23b5b64aeec8fb2216c4864f1d9d80324e07830cba6d5f245af9f906be8,2024-11-21T09:10:52.507000 -CVE-2024-2935,0,0,bca26df077a2e6144fab89178b1b8ce212817f44efda38492b2bc35e3dc1f66f,2024-11-21T09:10:52.647000 +CVE-2024-2934,0,1,99359b2fb7db4c57009d0581bd6714cb16132767417d3a587505558e4d31e14d,2025-02-18T17:04:28.120000 +CVE-2024-2935,0,1,f031dfe275f1a69cbb504d12a677dfe4908649c2597f366d9597d863283d4434,2025-02-18T17:05:15.397000 CVE-2024-2936,0,0,e1637e9751cd50192c775246bed8a5a935eb4d558daee53b8066da607cc107cb,2025-02-13T16:31:06.233000 CVE-2024-29366,0,0,a4c37234f5475bf3e0db182bc2ff356efc3d9687878407fd7f29d2e5e10e4975,2024-11-21T09:07:57.600000 CVE-2024-29368,0,0,a20f2f01e4025099be3f62f18aff11b356a455644c555ff93a8794b70467bc8f,2024-11-21T09:07:57.823000 @@ -255995,7 +255996,7 @@ CVE-2024-31140,0,0,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376 CVE-2024-31141,0,0,d3e6234dd5f7853dd5cc5624c4460d246120bc3e8971c692c1eba3ffde4baa26,2025-01-31T15:15:12.987000 CVE-2024-31142,0,0,f0e25bdb8c8839bef9c14d66586bad0c1ebbce2b2125a4db27230c001518faa1,2024-11-21T09:12:55.110000 CVE-2024-31143,0,0,4790e02a9527ae34971a6ec375e16b193baf2e8575d041b48c7869872729bd6c,2024-11-21T09:12:55.220000 -CVE-2024-31144,0,1,27a5393bd8842a69656663a336180c002b70f462f45ce2ade6ba3fb63880e732,2025-02-18T15:15:16.050000 +CVE-2024-31144,0,0,27a5393bd8842a69656663a336180c002b70f462f45ce2ade6ba3fb63880e732,2025-02-18T15:15:16.050000 CVE-2024-31145,0,0,f3ca8145921f17e384184f2a401130163f6a98a09ec4c0f02db53b87f0633d0f,2024-11-21T09:12:55.410000 CVE-2024-31146,0,0,f936f8b5375e47cb092f8aa6bf5893d1570fca2bfcf5c7722e061d7922c4e65a,2024-11-21T09:12:55.600000 CVE-2024-3115,0,0,024eb87cadd8b40aad338eb052d3545e6328aa34b164f2cfa51cbda6bfdbee78,2024-11-21T09:28:56 @@ -256368,7 +256369,7 @@ CVE-2024-3150,0,0,75d0be56062bf1a530210c178aada19a6cec46e37ca674016ee68e74c48916 CVE-2024-31502,0,0,e1a3371156b5bfc652018b1d8fcd99dd9bbdd2be7fa3fdac29255561faa54a60,2024-11-21T09:13:39.480000 CVE-2024-31503,0,0,518cd08ef865de234cd65cfcb97b45b19d6b39872e738ecf53628254de118758,2024-11-21T09:13:39.700000 CVE-2024-31504,0,0,e609fdd3d56331d45ea8d49c7af4d1de4b29d053dc7ca378918a58ec72a1ae55,2024-11-21T09:13:39.917000 -CVE-2024-31506,0,0,202ef4bc66e0a7ae999fa116df265291b3d753f185f2487992f023f795a97e45,2024-11-21T09:13:40.153000 +CVE-2024-31506,0,1,80ac2e133d5b6ca9e826e6ab048945a8a63c37a803fc401a9799099da94a0777,2025-02-18T17:23:42.777000 CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7bc74,2024-11-21T09:13:40.310000 CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000 CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000 @@ -256818,8 +256819,8 @@ CVE-2024-32230,0,0,3a6294b82cd700b32f94546a71177093b3ea39c8512a95b325e1336833ebc CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 CVE-2024-32236,0,0,fc34b21c4f3444da90a31820b43bcfe52e5dd20b58b8287749526e7c509dae7e,2024-11-21T09:14:37.230000 CVE-2024-32238,0,0,a12c22dc2403ba80ed1de919c44facc67baef0612fb0b9d0851801fd325df7b0,2024-11-21T09:14:37.450000 -CVE-2024-3224,0,0,acafb05740ce847481d7536fba2276d9f8a8a9818421e36b2ae9f8144a1a105d,2024-11-21T09:29:11.040000 -CVE-2024-3225,0,0,01f3b17675f18d457a780167dd94c5f2717c8890ed3782f699c5fdb5381d33b7,2024-11-21T09:29:11.177000 +CVE-2024-3224,0,1,d525b73202d1694d1c856b88b4c89a65bf98285b70ca580142a5d90eed027e16,2025-02-18T17:07:28.527000 +CVE-2024-3225,0,1,1702654e86d9615f0cb87e717b5ca06a0ba87dddbca38a637d31aa56e7bfc55d,2025-02-18T17:08:27.630000 CVE-2024-32254,0,0,27db2cf4047461feeb9a479dba4cf663e9a27869b2fe97e4d3048977601a013e,2024-11-21T09:14:37.663000 CVE-2024-32256,0,0,e878fe31c26ddc2ef1ba0d5960e20d26b67e4ede83d59e4dfc5d31992bbd2f30,2024-12-03T16:15:21.697000 CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242344,2024-11-21T09:14:38.023000 @@ -257610,9 +257611,9 @@ CVE-2024-33180,0,0,da9399b180b9c898b2bb285cf6b5a084c60228e1911eb2c12238944928c62 CVE-2024-33181,0,0,f77fa0ff338a41c5a3ea92c069373f41d26a4ee1881aedefdc2e883542dba133,2024-11-21T09:16:36.363000 CVE-2024-33182,0,0,754b1bfc82877901f30165197be14c23bbe45adf5924139bc6152a54a503022e,2024-11-21T09:16:36.590000 CVE-2024-3319,0,0,6b2384a192ca6a5ada4bcf578ef4395282aa89a8c79f10a6f0748f979a25337b,2024-11-21T09:29:23.250000 -CVE-2024-3320,0,0,cfcbf61a2622860951e581e18777cb05bbab5ce5e7aee6d4a3370b7f8ba346cb,2024-11-21T09:29:23.370000 +CVE-2024-3320,0,1,416b79048009667ebea2a9250393ce863c4f05e79d329ab4818e89c87484d332,2025-02-18T17:09:26.307000 CVE-2024-33209,0,0,52675bf6875d058490a503b6a06218f66186bebf48ce6c2d6ed1557d4a1dfe58,2024-10-16T13:33:21.313000 -CVE-2024-3321,0,0,7c035b6aae08aca4e31fa20e5970deea247fc1ef9f6b1b2baa05f2d98e34a3e6,2024-11-21T09:29:23.510000 +CVE-2024-3321,0,1,906a377fcbe64ef5b99950eb8ca518c2208c9c2ac4850be5792619fd12ba9f83,2025-02-18T17:10:07.637000 CVE-2024-33210,0,0,73743f20708c4f9e949787dea033b0608d5587bb97ca1e4ca545d2d98b4d206e,2024-10-04T13:50:43.727000 CVE-2024-33211,0,0,97cf4451472bb1b67607226de425c4bb5ff9be780697933cf5decb769e9b944f,2024-11-21T09:16:37.163000 CVE-2024-33212,0,0,1319b7a4e155dd81813c77216d4a0da85219f64dc863466a0f0451f213e05bee,2024-11-21T09:16:37.397000 @@ -257747,7 +257748,7 @@ CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774 CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000 CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000 CVE-2024-33469,0,0,6f6ff2b75c61ae05d3d69f5eb1b127ef03a506ff53818706f0c7cad14959a9ab,2025-02-13T15:15:18.157000 -CVE-2024-3347,0,0,010a6f05339340c9755bf7a91eb4682737b55415634be3619f65f969c059d3b4,2024-11-21T09:29:25.703000 +CVE-2024-3347,0,1,109540eb2239c6e2b0e6781a407a2ac03392b72d587057111ce435a21b95a86f,2025-02-18T17:37:35.760000 CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000 CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000 @@ -257894,7 +257895,7 @@ CVE-2024-33626,0,0,98636f90c26fefb664facad1c749c9c80bdac5f793b6178479f366ac7b5ce CVE-2024-33627,0,0,a7e429fc28c825b791367c547d1de2f36810d89fa94a9a5f549fe9410be0f6a6,2024-11-21T09:17:16.470000 CVE-2024-33628,0,0,95701764c29a5edb4f90ca71a2dc0b00c6f0fd68df1a062eca4cf6b3b8a9258b,2024-11-21T09:17:16.580000 CVE-2024-33629,0,0,51f2fecb5a81d323d5391ce88d9e4df586d601d67656a2f2beb995ecda78dda9,2024-11-21T09:17:16.690000 -CVE-2024-3363,0,0,7900a216a414322def733d4cd70583e59772cdd772e0520f4eb3aaa2adb5684c,2024-11-21T09:29:27.830000 +CVE-2024-3363,0,1,5fff74fa36fb293889ce6856c6c6d694d677560288ae8b080be71d00425c53ea,2025-02-18T17:39:16.460000 CVE-2024-33630,0,0,c7946779691e07f8d8be839b927395b4aefd957bfb5abcc3be1692ee815cf3e0,2024-11-21T09:17:16.803000 CVE-2024-33631,0,0,ff271002fba66b3bdf0de8e1c3e1aa80a3f2583884cb0809afc3a2475c17272e,2024-11-21T09:17:16.920000 CVE-2024-33632,0,0,eab283a6021a651e97ec2b7e8fc9d9db013e87a534a2c6e52df8a4826694a734,2024-11-21T09:17:17.110000 @@ -259847,7 +259848,7 @@ CVE-2024-36116,0,0,ba2a8ad9731057f20d6e03ed1a8894458f3c315983b209d5e4b4c0aa55ede CVE-2024-36117,0,0,a1aba93efbe2397d37a6a98f5e1e8c202b911a71e7effbb8eab9fa3fbc43e3c4,2024-11-21T09:21:39.390000 CVE-2024-36118,0,0,55aed2553bb46dfac59fc7234ccc37b510c4f807b963515186e7b76a1ca890e3,2024-11-21T09:21:39.527000 CVE-2024-36119,0,0,febce6423dc1d2e5233bfe9a4afca8e952278d09d11f845e3d3d4dcea34721de,2024-11-21T09:21:39.660000 -CVE-2024-3612,0,0,37261b1f8d4f8f3e60a4ba7545fbff1de5625e8f2a102c4e896cb5c17e55333c,2024-11-21T09:29:59.263000 +CVE-2024-3612,0,1,92149e2dcffeca0078024a872fe02b35e11d7543d3168929a05ec6ad10bb0956,2025-02-18T17:46:18.770000 CVE-2024-36120,0,0,924fe4e240283c9e4b09122242d43b6afa36ddb4998623fff938f881394386d7,2024-11-21T09:21:39.810000 CVE-2024-36121,0,0,ea5bca8e895d35d44db7855d1c126aa065d33ef7972857b1e702a1fb865283d8,2024-11-21T09:21:39.927000 CVE-2024-36122,0,0,c2aeae4cdd255ad31a0a91d4f75c2d56ebaea85629207dfb3b6b08cdce139743,2024-11-21T09:21:40.070000 @@ -259856,14 +259857,14 @@ CVE-2024-36124,0,0,b2f1b33ef0b5e93fc83acbb1a2fbe3de1cc6cf9ae5da7ecc83042baff09f6 CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000 CVE-2024-36128,0,0,64d86fd38de118293b58a480f45da6320c6fd14e64e3f37e62e29a7a0f9d73bd,2025-01-03T16:24:06.250000 CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000 -CVE-2024-3613,0,0,bfdd3d9764417c982e88482e60e6b0bbe2fdb29c42418a4ff4a34629450e7794,2024-11-21T09:29:59.410000 +CVE-2024-3613,0,1,d7efa53335a963a90989cdb8baed1a666b466c1636ac70ac269c61cad948f925,2025-02-18T17:48:26.820000 CVE-2024-36130,0,0,9bd62fb5b4532bcabdec214127241940c2a7b957ead8f80f15dfd2bb2b6b6945,2024-10-24T20:35:06.217000 CVE-2024-36131,0,0,82e9fc077a37365f43bf6b187ecca0faec0000657c69313b67fae1ba4e75f642,2024-08-21T18:35:05.670000 CVE-2024-36132,0,0,5ec3d6df968dae204600f4777b4a75c8223eae8a0b29788bfbc9e03973d335e1,2024-08-12T18:53:28.710000 CVE-2024-36136,0,0,d89aed94871ac8cfa059496af404f5c0b7ae2e5b24b85fcc746aaf0e4f46af03,2024-08-15T17:31:15.880000 CVE-2024-36137,0,0,9e34edecbe1bcdaea980fdf3ecba53c1e1d2b78171ae5b3668bd0b30495a6ea6,2024-11-22T12:15:18.817000 CVE-2024-36138,0,0,1f704156cf983572fed56762ac2168623bd5a8662a04d481cdbc1a6f8d203327,2024-11-21T09:21:41.500000 -CVE-2024-3614,0,0,9207d62c0e40d7f82f5563b59defea942108ce11edd7d364dae15546f9f218fc,2024-11-21T09:29:59.557000 +CVE-2024-3614,0,1,a5b0dc23a2998bc182e73162869291ebd0f8f720b27504fa28a507737c8a0e95,2025-02-18T17:47:31.033000 CVE-2024-36140,0,0,9f1e3de454ca7f9731012af21b569b657fd8599720b9322b4c808b170265e415,2024-11-15T22:53:26.063000 CVE-2024-36141,0,0,6aefe2803cc19479c8c322c648889d80bd2f0fe49e60c34dc243950214b0328f,2024-11-21T09:21:41.830000 CVE-2024-36142,0,0,b38edc47b2d712fc8fcf7da5698e486729fd33fa9cde8b20f1156d9eda5bef28,2024-11-21T09:21:41.970000 @@ -260514,7 +260515,7 @@ CVE-2024-37017,0,0,9e9e7d245ae7636635d8fb9b7646e69ff4740b4aee32b577e749a761315fc CVE-2024-37018,0,0,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000 CVE-2024-37019,0,0,019f9cadac30cdb47b60ef4c54cc291462b2bdbecfeff69d16099a4eb4863742,2024-11-21T09:23:03.357000 CVE-2024-3702,0,0,7b265a49b93baeb4226bb63cb9a4acc5f9eb7332525eeb6794bb581c436a4163,2025-02-11T02:15:34.710000 -CVE-2024-37020,0,0,b24d388e30a48afaff8b8aed33c44274d52184ec0ad0450f5afe249c89ea7332,2025-02-13T15:15:18.320000 +CVE-2024-37020,0,1,895709f30422673637015ee6fd7e61b865c7bd1fef8fca9b2302e6ef89d980e1,2025-02-18T18:15:20.377000 CVE-2024-37021,0,0,1fef4ba12d503003c90d0df6f25b17bd91d92aaa79eec5ce352058e2de190264,2025-02-03T15:56:26.340000 CVE-2024-37022,0,0,58e15183af3d32942869fe6953f465d4e55099ab2b6c8139c4c8d08e686f90ce,2024-11-21T09:23:03.690000 CVE-2024-37023,0,0,f4f53709e1be08c5fe3fca36aa5104850c438460730a24ef5245adc14ca5b232,2024-08-20T17:12:03.330000 @@ -262415,6 +262416,8 @@ CVE-2024-39323,0,0,7e22b917354a2e5b4799a1cef4baf0b8134a833606bd812ba695ac22ead63 CVE-2024-39324,0,0,5b58097cc0f94f554b16fabf13a1485b606607c6996b61ebbc380a66c6ed83bb,2024-11-21T09:27:27.850000 CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae60e3,2024-11-21T09:27:28 CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000 +CVE-2024-39327,1,1,aa9855e49fae8aaf65bdcdb0f5a6fd291fe01f74f32303653588bdfaf2376f5f,2025-02-18T17:15:18.440000 +CVE-2024-39328,1,1,5d021857a24d2a2931ebdf28b79d8885abaa1788dce90e966810cf2f93353444,2025-02-18T18:15:20.633000 CVE-2024-39329,0,0,7ff8e254c337ee0bc8d4995df77a5971be90342987fb55e2cc6c6590b4df097e,2024-11-21T09:27:28.300000 CVE-2024-3933,0,0,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000 CVE-2024-39330,0,0,fbd31b5b3e2b3f2feac33fefc5ce863bbb8e247faa0695e58548f2d114ee1657,2024-11-21T09:27:28.523000 @@ -262441,7 +262444,7 @@ CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 CVE-2024-39354,0,0,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000 CVE-2024-39355,0,0,d2ad1313fef6b57baf9787c0b760d9dd53ba30e8795f5c7b4ce0f2c1c93d6468,2025-02-12T22:15:36.380000 -CVE-2024-39356,0,0,5803746f35c634e3fbe6d9debac0f05899b0fba5f7fa27ec12c4acdf0efbadab,2025-02-13T15:15:18.507000 +CVE-2024-39356,0,1,ce4e31149365dfc0da1a8570ece351dfb7659a5c37b1989b33f456860191b49b,2025-02-18T18:15:20.850000 CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000 CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000 CVE-2024-39359,0,0,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000 @@ -262451,7 +262454,7 @@ CVE-2024-39361,0,0,477116428326d7bdec5ce562e55d21a285643227ebfe2e1fbe27a873152d5 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-39363,0,0,1532df8dbaa164222937f85b082fd3798ad305753bec49cec27dedc9a5faf8f6,2025-01-14T16:15:31.223000 CVE-2024-39364,0,0,5c70137712c5b899f4bd053db2949ead7489ac81f5ead35b90cbcb1bbca7521a,2024-09-30T12:45:57.823000 -CVE-2024-39365,0,0,3980e019c1c0da8d2314545a9bf5cbae2388f418bd3630aa938a136b9e38b4eb,2025-02-13T15:15:18.687000 +CVE-2024-39365,0,1,337551a046a8d7091f78814d802388c8e7062d7a22d015d7f32775279186f891,2025-02-18T18:15:21.077000 CVE-2024-39367,0,0,2a0d1a1735ad2eb38f3dc83b04bfe1b4b45a382d6c816a4b8ec5c2288c0135b9,2025-01-14T16:15:31.330000 CVE-2024-39368,0,0,8d0beb90981772e56cdc456383e0ad76416c3ac8910086fb0eb28318814c835a,2024-11-15T14:00:09.720000 CVE-2024-3937,0,0,45bcfbffb0cc9dbb6ee7014f6348017c5f9d7762fdf9bb269b80a174f4d59cc1,2024-11-21T09:30:44.430000 @@ -262896,7 +262899,7 @@ CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa CVE-2024-39809,0,0,7c54e67dade0b44ea0efd84f17f0a49ecf802216ccdeab5d2cb569e5a1301da5,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,ae56d32909e36911a442ad2179b927c261a96c3ffcecf73d313c3dd6bca2e235,2024-08-23T16:16:36.907000 CVE-2024-39811,0,0,8060988dc9d75c60307c25925c80ec36adf3bc7d704c5c319322e3f2e53536e2,2024-11-15T14:00:09.720000 -CVE-2024-39813,0,0,f0ee6bcfaedcc6b2f6b3f2d217c1205e9b2b52c88f4fa36e42cfac6804a4fc55,2025-02-13T15:15:18.883000 +CVE-2024-39813,0,1,da9a48ccef424c645e8c1f550032a9711232ffb6f2bd68000bae59996100fe1b,2025-02-18T18:15:21.553000 CVE-2024-39815,0,0,3f08218977fde87b3bdca90e96b54b8d24d5f2b2ffe03ad2c9604b5683266229,2024-08-20T17:14:18.587000 CVE-2024-39816,0,0,bf31642010ea8072be479ec01a800fdc54bc0950923af17d98b842b9cf37feb3,2024-09-04T16:30:42.197000 CVE-2024-39817,0,0,e0dce784c323c74627b1c8ac6158ae7d1d8ab303285570726585ad73c67e00be,2024-09-11T19:36:18.050000 @@ -263075,6 +263078,7 @@ CVE-2024-40239,0,0,ae12c56ee9941f755c16494c8dd5bdda020fbac80ab12acdfb5936223e53e CVE-2024-4024,0,0,a77cae97d384e849e77184d79ab929b86d552816a3a00262f6d8dbbc8bdf401b,2024-12-12T16:52:12.103000 CVE-2024-40240,0,0,aeed04cfe484a1b1358812993c89c6f17cab7b8a4f5edbb8982d767f42036e4d,2024-11-13T20:04:13.080000 CVE-2024-4026,0,0,33b3d77ab9b9baca3af18c1fa45a0c153be1e97e050db1d7d75fa691b1dd64de,2024-11-21T09:42:03.233000 +CVE-2024-4028,1,1,dd195162d57e8928613af90a9d16c58e69b7ff19cec45728e1d15654a24fb415,2025-02-18T18:15:25.473000 CVE-2024-4029,0,0,df5cd0c8103e6b760c8676847fffe035d6dc3da349285ee8d2f32538714d8665,2024-11-21T09:42:03.370000 CVE-2024-4030,0,0,3a307f10ea3984c15ff103b06b7509b9645c4374d8ce702e02367c7d96ff0eae,2024-11-21T09:42:03.650000 CVE-2024-4031,0,0,c66717a29ed137320452249c910c6dc337a02df56960a90dee87aa3b86e4c54d,2024-11-21T09:42:03.867000 @@ -264047,7 +264051,7 @@ CVE-2024-41707,0,0,a3d7b79aeb6433d50f291b767e35dfd30d5dd12d277a3c66604231c335206 CVE-2024-41708,0,0,445b65b3721f3d8f292337791cbf935557797b1033365e761cbc9951f26720b4,2024-09-26T14:35:13.827000 CVE-2024-41709,0,0,2cc1be93865d85286340548125958805b824c1daf6221d632f91b966c6c7e81d,2024-11-21T09:33:01.840000 CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000 -CVE-2024-41710,0,1,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000 +CVE-2024-41710,0,0,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000 CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000 CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000 CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000 @@ -264221,7 +264225,7 @@ CVE-2024-41913,0,0,fce4e02642287f9e6160a6f8520e124ec69c6e3cdf971b0e3bd6764a9a59e CVE-2024-41914,0,0,b4cb30058ba7c15253a6b7af5171c10291a9eb5f90f7ea1c66073a44c58cafff,2024-11-21T09:33:16.507000 CVE-2024-41915,0,0,74f4b30a3490769bd45dc3bb1c6e58da7fcab263c0eccbe09541d45260e0a8a4,2024-11-21T09:33:16.650000 CVE-2024-41916,0,0,e26bbdb30f3e12989e8ba751536faaac62be571602a0259fbe27bdf53bba951f,2024-11-21T09:33:16.797000 -CVE-2024-41917,0,0,92dc114bdd46a3246d574d6385f7b98ccc87db8177d7bc7ecce5cf649b2f0c72,2025-02-13T16:16:29.390000 +CVE-2024-41917,0,1,d5672ee5466ff7c0e03f4a9ecdcc7b8983a58f4dfb47bfe6a5b387dac63aab33,2025-02-18T18:15:22.120000 CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000 CVE-2024-41922,0,0,7e03c992eccbc90ea51a8983e0cf91681fc1323d95ecf135ada02c68d1fe41ab,2024-12-18T15:15:11.163000 @@ -264690,7 +264694,7 @@ CVE-2024-42399,0,0,506142db09c821dd3d6ad2ff961d3e036eaba630fcdd840a57cad040888a4 CVE-2024-4240,0,0,0e5f31784b7162c087aca37e585256441c15b32a7e0d4b2098e6ff8a1565e011,2025-01-27T18:30:07.563000 CVE-2024-42400,0,0,b23dfd205967d309343e484e6eb5c901d62a0b3953c77493b57f0104c8430fad,2024-08-23T15:06:00 CVE-2024-42404,0,0,bb61ac33954fbd9cb789abfbcdde8b366f1c0c5dfe94d454dc594181179c8a15,2024-09-20T12:30:51.220000 -CVE-2024-42405,0,0,1f5283c7ad173a90c6af86099049721de5a75e9c135a44ca310e384e4e31c9d6,2025-02-13T15:15:19.117000 +CVE-2024-42405,0,1,0cf1df88afcfea36e5c3797a40a4d4343681a1d19708983cf1773a437830a988,2025-02-18T18:15:22.900000 CVE-2024-42406,0,0,27ec0815435bbda0c2431d4630bea0ca6b595a1297245017087d145f127b6444,2024-10-01T11:15:48.450000 CVE-2024-42407,0,0,f0d739bc84cee721cfefadcf95caf855718a30db3f3991b30a719354873792c9,2024-12-12T02:15:23.017000 CVE-2024-42408,0,0,fea0cc9e4f3c35832fcef20074d7bda9403a00e74d9e32437a4416b7b17d8e5d,2024-08-29T14:22:45.603000 @@ -267678,7 +267682,7 @@ CVE-2024-46737,0,0,3ee0b00f46177dd2e3466e1a5953938cc8fa9136f768d3d578bb135b417c3 CVE-2024-46738,0,0,d194bba9468d71cf8cb190e63cfdaff20aa02ce1a672ea5f9529f704abdc7079,2024-09-20T18:35:04.373000 CVE-2024-46739,0,0,d205af77e24ab1326a75221d3af9b7b3b23426f178d16d2d86739cbf44af5584,2024-09-20T18:34:29.957000 CVE-2024-4674,0,0,c78832d047e3b643eaebb0eafa9c8550e597c99fc5040f942eff298210cabe1a,2024-11-21T09:43:21.190000 -CVE-2024-46740,0,1,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000 +CVE-2024-46740,0,0,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000 CVE-2024-46741,0,0,09ed688b4e4a53d400e039f005d8e90ff80aabd957af947df6953f4926024947,2024-09-20T18:33:27.960000 CVE-2024-46742,0,0,e4d9f0987a00835c8bd748f38250c558eb8edfed3f4f73ca7bbb79f2a8e020c8,2024-09-20T18:32:34.303000 CVE-2024-46743,0,0,b288832ee6d9c1844cb85119e621151e5809ad63298328c3c8489107631c2c24,2024-09-20T18:32:11.827000 @@ -267857,8 +267861,8 @@ CVE-2024-46919,0,0,caee3ec5db2611d5674f255e6e4093f56001d0cd40bf7d98b7791ae4b5538 CVE-2024-4692,0,0,23393761d23a527f075ec0ab23d8db8e227006f309d26221ac72121be686a8a6,2024-10-21T16:10:14.873000 CVE-2024-46920,0,0,b32520b4541741819e59354b8e0dcf0eef99f4c8b248bb03a8dc5b52b8a5f76d,2025-01-13T20:15:28.613000 CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fccc6,2025-01-31T17:15:14.113000 -CVE-2024-46922,0,0,0db250dfd19dfe37da4185ebb6d290fa2abaff010b5068a2738e5acc385da6af,2025-02-14T18:15:23.333000 -CVE-2024-46923,0,0,3a59ad0039ba7c267b4e114b38669f99fe253633f0356c8066ed36eb577328c9,2025-02-14T18:15:23.530000 +CVE-2024-46922,0,1,6bdd5d60ca2de902a066d900eb3f1a02f2bc8961d2c788d1e656cf659ba11e92,2025-02-18T18:15:23.653000 +CVE-2024-46923,0,1,a9a48683084983e354bc1f2a4a7b5f585943d9f414289960054fde2cd8cee181,2025-02-18T18:15:24.083000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 @@ -268131,7 +268135,7 @@ CVE-2024-47256,0,0,03d9dcd9246ea96d9e0eff043db015bc1d1c14db43fb45d7f7cea0ff4d23b CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000 CVE-2024-47258,0,0,300c90dbd855da523ff0d398327bbde67775e3f8dbffd37edbf2f5fc3dcdbf07,2025-02-06T20:15:39.643000 CVE-2024-4726,0,0,3e61e14a791c8650d0008a4e96317f2512c59da3e1881419f89f3069e84d077b,2024-11-21T09:43:27.817000 -CVE-2024-47264,0,0,bdb2ae61f681beec487e8af25d3a11ed486b12287057019c3e76e8a436874932,2025-02-13T15:15:19.400000 +CVE-2024-47264,0,1,d54fe244881b7e5c414df0af4606542f59c360dc75511e77f72d84fc11d1faed,2025-02-18T18:15:24.630000 CVE-2024-47265,0,0,8efdd4318786503cf0f39cc0c8ad040b17c802a2f969a2910ba793ae4b4f6dc6,2025-02-13T15:15:19.600000 CVE-2024-47266,0,0,90cb14c9aceeed35d9c240ff0c2975561e1a5559a7d8f6e46559ec80407f7fd4,2025-02-13T07:15:10.383000 CVE-2024-4727,0,0,b5703c16f288dbf264e85ffadf388498a97a674e06139b3dd73d60060608ca96,2024-11-21T09:43:27.953000 @@ -268887,7 +268891,7 @@ CVE-2024-48153,0,0,8f8abb4c772e2c722ff428fe00187f9b6c882572e02c4e3368b92a462f733 CVE-2024-4816,0,0,fef5824bd2dfc2b3cc7b7819e3a058275a15a939e06187fc90b4f9ac47eddd43,2024-11-21T09:43:40.753000 CVE-2024-48168,0,0,c8182ce0d3356b936019874b976817ca2e205233549304053f6c152dd63c77c8,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,69b54e13904730a2cb8b3640e98d901bcd198715db2965178e6e36fa08e9e5ee,2024-11-21T09:43:40.890000 -CVE-2024-48170,0,0,8fb631e53089fd82c126747eaceba5ed0afb0e2912caea1fe7313c091e4af608,2025-02-10T18:15:26.243000 +CVE-2024-48170,0,1,a770827cd427a4c28ea3cdc271cbf0a75b8ccaf7b99f62778fed71b0c972d7e2,2025-02-18T18:59:46.050000 CVE-2024-48176,0,0,361e37561a50782b7c3bb1ddcf565a9526e0808df3a2cfee43b6842d60dab4ca,2024-11-06T18:17:17.287000 CVE-2024-48177,0,0,b59cc1c2e42f675a1362418899fda46dd8119ec25122c12b9138beae75e838dd,2024-10-30T17:35:11.637000 CVE-2024-48178,0,0,ee85880b14f6d7dc4a557e98498726e030c1ccf5636d6ad1b49925337896afae,2024-10-30T18:35:13.637000 @@ -269741,6 +269745,7 @@ CVE-2024-4958,0,0,8a8c67bc903e1a46ad33f1a53da00f2ab4fc5b43d3db7efb6913c74195b267 CVE-2024-49580,0,0,3616bf5be4f69eda17b61f84b4b764987072fb4d926e0d601ddb18e72d10c716,2024-12-06T14:15:20.670000 CVE-2024-49581,0,0,fc04f235634cee9bbda44c07dedbe542398bc35eb960d06f033e42ad0e6ba09e,2024-12-02T21:15:10.830000 CVE-2024-49588,0,0,c0da3a5f349cd3c67a8d63a4235e951da64ca910546e63aa78047573574ef33d,2024-11-21T20:15:42.707000 +CVE-2024-49589,1,1,8810ffffff482e43f243b7803fc3c33a956ba97e595fa0b622e7f4b43a08ca9f,2025-02-18T18:15:25.300000 CVE-2024-4959,0,0,0b1acb96710cbb6b752fcc1086e21a77c5901c1eec006db8a6dce25dccf4805b,2024-11-21T09:43:56.943000 CVE-2024-49592,0,0,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000 CVE-2024-49593,0,0,20effb99bee61641edd5d332c453463760e6d2b9681276cd06a2523441d82150,2024-11-18T19:35:04.960000 @@ -269863,9 +269868,9 @@ CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944 CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000 CVE-2024-49704,0,0,011946741b0918ef57c6cb1900342b7378aadc477a57c2845fd73363988334a5,2024-12-10T14:30:44.573000 CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000 -CVE-2024-4972,0,0,b69d91344e41c4f2a660891995563a25561e7bbb9d6c34c0719d004a3e9665a6,2024-11-21T09:43:58.863000 +CVE-2024-4972,0,1,d0d348d53a1031a7361f1b1e7dc5c006500735f4d3b4b4200f8b3098d3f06e6c,2025-02-18T18:38:56.967000 CVE-2024-49724,0,0,637db4c25d376d3a19176854d6160eb38bf1f0ef1a09f7ddf8eb8fc3d6832b42,2025-01-22T18:15:19.813000 -CVE-2024-4973,0,0,b32b47435c7859fa556e15b843ccd74930f612e66861e62acec45b15f4650de6,2024-11-21T09:43:59.010000 +CVE-2024-4973,0,1,2ff9346b9497b1d015890b0ded824d25c48a7f2d276b91e569f20125ca7f04b3,2025-02-18T18:41:10.670000 CVE-2024-49732,0,0,eaa81fd8137bac828d101bdd530f7768760d875c02577de9f14f1a9fe4855dcd,2025-01-22T18:15:19.960000 CVE-2024-49733,0,0,f12eeb4f15bc9bf4d1aaa92a71a5f99b7e6aa378d95604f3e55971ea1ab22ea4,2025-01-22T18:15:20.100000 CVE-2024-49734,0,0,36a9153682a6cb411a63baccea4cf9acdd7c90027f9196887b4109cf5a0d1c34,2025-01-22T17:15:12.253000 @@ -269873,14 +269878,14 @@ CVE-2024-49735,0,0,d4d6038ee7adfbb8925ca5b3f33aab509d0fa4098005ce7e48d03b419e4e3 CVE-2024-49736,0,0,27824dd9d2ea2e1d6b6c0698e076e4921aa534d7478a119fbd62cd04551fc526,2025-01-22T15:15:13.007000 CVE-2024-49737,0,0,471846391ec1276ebecf5b9a1f7a6bcd968da433a39a8b7e36647c6217d6187d,2025-01-22T15:15:13.150000 CVE-2024-49738,0,0,d313b71a89808187a6f044b9b2d8417504970cb0a631e642bef9da559eab0a9a,2025-01-22T15:15:13.280000 -CVE-2024-4974,0,0,e1f8d8b7975885dcc5d2de2e977286c41f55043917d4b19c76575b6d6b8cd203,2024-11-21T09:43:59.157000 +CVE-2024-4974,0,1,1c9241c15f132a6146b259e486a6be9bca5212edcb07732971fb4f1abcd94184,2025-02-18T18:41:36.180000 CVE-2024-49742,0,0,6a74f5edab050210b51e228389fc2d915bf71adac5d8b52f4d66829ed59a9e42,2025-02-06T15:15:13.597000 CVE-2024-49744,0,0,d9149b626b0551bdda033e6c3e5fd7e77a236d3e100e0971825e6b3f10894dc0,2025-01-22T15:15:13.557000 CVE-2024-49745,0,0,3f919f7aa199c54c2341d3074c8c5b46e0ba6fcf2550fbd12aba17e82162ffb2,2025-01-22T15:15:13.707000 CVE-2024-49747,0,0,acb3452eca834436ea1a62003adaf88e40e233842d86f28389761b776989bc13,2025-01-22T15:15:13.840000 CVE-2024-49748,0,0,c403f929b3a3b1bc4a6890a72c6e134c8d820307a8bde3466befbd92b6ee20a6,2025-01-22T15:15:13.980000 CVE-2024-49749,0,0,84864c9edb5d596202ddd37a4339885684fd8bd32ff322d7abfc57ec8adc3f5e,2025-01-22T15:15:14.110000 -CVE-2024-4975,0,0,49c1119b57824f1000c19d23ffaa04c3033873bf24120b59267c9e33a6809a5c,2024-11-21T09:43:59.293000 +CVE-2024-4975,0,1,8fb1a0e09f53471dec80d5e0fac3edc53f2dc0e3b48ad259fe472a4bb7e53db2,2025-02-18T18:42:21.327000 CVE-2024-49750,0,0,b8c0592657dc23f5dade6581318fd4431bb1aa3486d0f4172a6b42fac1aa50c3,2024-11-06T14:58:19.993000 CVE-2024-49751,0,0,b6ddfe86ed223562a30da85143aed986d928de448e01372a87230a49d1f635ac,2024-10-25T12:56:36.827000 CVE-2024-49753,0,0,3f663b961aeb9320e44ea5cd43eae20a14133b4b1c320ad771b5faf187c0b73b,2024-10-28T13:58:09.230000 @@ -270204,7 +270209,7 @@ CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2 CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000 CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000 CVE-2024-5009,0,0,2a7f1a61c4ffe3ca1ccb9712403aacf784aadd4f5cfd32895abd79408baca925,2024-11-21T09:46:46.377000 -CVE-2024-50090,0,1,b5d118883ae2a075a773a8abb27764bfe656c1915eaf2e89a5c58d42a2a84f45,2025-02-18T16:15:17.740000 +CVE-2024-50090,0,0,b5d118883ae2a075a773a8abb27764bfe656c1915eaf2e89a5c58d42a2a84f45,2025-02-18T16:15:17.740000 CVE-2024-50091,0,0,1cb67bb828a90348a73a47095c7317641327edd2ebb55312c01ecfbc931cad87,2024-11-12T21:44:39.210000 CVE-2024-50092,0,0,8323f00a1fe325c784efe7c468f127281c29668dbe20794e7154d6c8e52c9fc7,2024-11-13T00:40:23.183000 CVE-2024-50093,0,0,6179b05561fba7cfa8e5286e363f283cb3de5666a14724b7b49f82dfcf76c0ed,2024-11-08T16:49:33.143000 @@ -270413,7 +270418,7 @@ CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c49d,2024-11-21T09:46:48.530000 CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000 CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000 -CVE-2024-50282,0,1,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000 +CVE-2024-50282,0,0,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000 CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000 CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 @@ -270734,6 +270739,8 @@ CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e6 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000 +CVE-2024-50608,1,1,98f50059369502f936fb7c7405f168ceb50ca6968ac413ec2036a6665071c8d4,2025-02-18T18:15:25.667000 +CVE-2024-50609,1,1,312ba9272595c84a72c08ed42ec395b0fe46a5a2bc6d217390327c85aeac2b5c,2025-02-18T18:15:25.833000 CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000 CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000 @@ -270967,8 +270974,8 @@ CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b72 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 CVE-2024-5112,0,0,6fa0879d8573b55bb699ffd9db2627c7afd75bd2e7d239fd0cceb3b05bf24bd3,2024-11-21T09:46:59.737000 -CVE-2024-51122,0,0,6c9b22b8911d323c91a32d64ca8efa7d1a8d2870f15af95874f0b3741ba03b8e,2025-02-14T17:15:15.717000 -CVE-2024-51123,0,0,c975e22d2104518d5b485ea2ad5dd2a84432d1324edcf323508cb95e028b96b5,2025-02-14T17:15:15.880000 +CVE-2024-51122,0,1,e48b49df24cc40908925508a662daa9cceb5a7375ed6d2f4afd5671ff2faad93,2025-02-18T18:15:25.977000 +CVE-2024-51123,0,1,2bb1738bbb248351932a54a02f9b972fc09822f7e39c985e25fce10334bbbef8,2025-02-18T18:15:26.130000 CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000 CVE-2024-5113,0,0,5f0d1848862cdf1df7ede964c3b4216fbb57f9b94204859b6a8da2ada96fab98,2024-11-21T09:46:59.870000 CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000 @@ -271092,7 +271099,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 -CVE-2024-51440,0,0,791aca99f0e4fa3be44b578d371a5bd0856e20a6890653e6d757068785da4020,2025-02-14T17:15:16.040000 +CVE-2024-51440,0,1,203986c75a80a34d889d62b668b90a6f364317185f011a078d8cdc459d4daeba,2025-02-18T18:15:26.283000 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,026f2f79f883da59dbffb9dacf2ddcce01313f0fb97ba3b8dc804a5b33e0dd57,2025-02-10T13:57:18.723000 @@ -271140,6 +271147,7 @@ CVE-2024-51501,0,0,fd07d849fcf005114e49b704958146e2649ec425c6f8ba03cb89ad7a21759 CVE-2024-51502,0,0,01d887214d04155f79d0c06f386d7d2cac323fcc6a65c68b1c14739db41bba3c,2024-11-21T17:15:22.737000 CVE-2024-51503,0,0,e1b49616d4a00e7d7d3cfa9d7aea7e4c02706f35f12a6b64bc3311e1675452c3,2024-11-19T21:56:45.533000 CVE-2024-51504,0,0,a627aebc8984112665cce121693ae08102fe7e16b5ed7919df3a69779ab68805,2024-11-21T09:45:38.483000 +CVE-2024-51505,1,1,92494ea580318bb0d32f5795711be115f9029430b8789ca63a312cea3e456607,2025-02-18T18:15:26.420000 CVE-2024-51506,0,0,a7315fdb20bfc8ae32683e052f8bddf6ea6b461d07571867f37ba8dd3c5f1001,2024-10-29T19:35:28.723000 CVE-2024-51507,0,0,91d00d755cfbcc307baea5e6c1e9729d1d51abe9613c87956cdbb28a5c122c55,2024-10-29T19:35:29.513000 CVE-2024-51508,0,0,183ebcba7ff30eff9a3b4e3f5e80c97c7bd892a95a5e291c33e22412b0defe8a,2024-10-29T19:35:30.513000 @@ -272277,7 +272285,7 @@ CVE-2024-53058,0,0,a8028d3d287474ecf90a26d70790957c2683a9b9f2fe3dc113a472bf0e206 CVE-2024-53059,0,0,8de9209182f62b1c8cde1232ceb4dd684e6406c51ee4bf910cb88c16872e7f77,2024-12-03T20:57:20.747000 CVE-2024-5306,0,0,6337c3272526323f63fae57a5b84d48fae4f8a9830fd7394fefa4365a042d105,2024-11-21T09:47:23.970000 CVE-2024-53060,0,0,74149c196c1f12bc509412b9719ff439b70d14439885b53f5abe3e06b85b5596,2024-12-03T20:49:04.903000 -CVE-2024-53061,0,1,3f3710a4f90ffd2cdcd03ef4626770b2408a5fbec497576b6679fa5d5efde367,2025-02-18T16:15:18.113000 +CVE-2024-53061,0,0,3f3710a4f90ffd2cdcd03ef4626770b2408a5fbec497576b6679fa5d5efde367,2025-02-18T16:15:18.113000 CVE-2024-53062,0,0,e2e51fc1a396224017bf00dfccc16b8ddb176bd1ee88f9b39b170be10d48afa8,2024-11-22T17:47:43.337000 CVE-2024-53063,0,0,b251f5112338fa265fd20d9a681270ad6498dd980da29c09c9f66a7a029f3aa6,2024-11-25T21:08:23.697000 CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5bac54,2024-11-25T21:05:52.863000 @@ -272419,7 +272427,7 @@ CVE-2024-53188,0,0,87bab49dbc3d18e6d91d22cbed039a405ce14263e56845387115216180a2f CVE-2024-53189,0,0,7db5b520eec87b3d5cf3a4268bb96f973425e7266589752714a0bff057fca02c,2024-12-27T14:15:26.400000 CVE-2024-53190,0,0,153fa3f9259ec5968429531d7a41d372c24290865137d294e4746b162c77afe4,2024-12-27T14:15:26.530000 CVE-2024-53191,0,0,ab633ea293d90a9c139efda5afaef33c6071f53aa9f4d2b47925752d6bb90931,2025-01-31T16:00:01.843000 -CVE-2024-53192,0,1,7f07a134a8b5b31f722552e3f9310d84dc06bc43a45fe02a415c4b339ce4b412,2025-02-18T16:15:18.313000 +CVE-2024-53192,0,0,7f07a134a8b5b31f722552e3f9310d84dc06bc43a45fe02a415c4b339ce4b412,2025-02-18T16:15:18.313000 CVE-2024-53193,0,0,b333bf0a1ebcc5426b07d57cfd07b6541896ac5e32b864e7f63c26ca6841dd6d,2024-12-27T14:15:26.897000 CVE-2024-53194,0,0,9b3c6499c47db7a3faff7ac9925971ccc55eb1886170e79f1466f6516399f844,2025-02-11T16:15:41.640000 CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2daafa,2024-12-27T14:15:27.137000 @@ -272661,7 +272669,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,0,1,ea9d5a987657b3006054c783a63425772026bf58d4e6daa2a4625dbb969a9b56,2025-02-18T15:15:16.290000 +CVE-2024-53704,0,1,0bed0784f004efadd08bd5175fd53b7a5e1c93e39038ac414c7a4da7ae792daf,2025-02-18T17:15:18.870000 CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000 CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 @@ -273484,7 +273492,7 @@ CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18 CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 -CVE-2024-54916,0,0,e835ac2857689021bda0b5abb003714b1275993f6d062fa760d1f53e9f8e4ef8,2025-02-12T16:15:42.160000 +CVE-2024-54916,0,1,5d74cf5d7b441491d0dc9f2dfa79ebb2247618416e120b9804fa9c61da088c18,2025-02-18T18:15:26.657000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 @@ -273629,6 +273637,7 @@ CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec168230 CVE-2024-55456,0,0,f7b046f2321be9392e91d2324d3a59483034c0cfdc1c2f449258cb1512b7fbc5,2025-02-04T16:15:38.200000 CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 +CVE-2024-55460,1,1,3746f2ebcf75c943bb5054e01471ae06a04a5c0757081cbc5b73400e7adfa093,2025-02-18T17:15:19.013000 CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000 @@ -273966,7 +273975,7 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 -CVE-2024-56180,0,1,3a1561e3486ac1bb040fb6a34e878854d4f9896bca194a84398b4784453d60f5,2025-02-18T15:15:16.500000 +CVE-2024-56180,0,0,3a1561e3486ac1bb040fb6a34e878854d4f9896bca194a84398b4784453d60f5,2025-02-18T15:15:16.500000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 @@ -274240,7 +274249,7 @@ CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030 CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000 CVE-2024-56555,0,0,27d859f187620a0e53806d8ddb970b864190f9d6d5d8bd618c07bfbaa01a7d68,2024-12-27T15:15:14.297000 CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000 -CVE-2024-56557,0,1,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000 +CVE-2024-56557,0,0,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000 CVE-2024-56558,0,0,dae4ef50d75c61c1b5a5060f05a03785acd6b71bd1850448ee41b577d959c9ce,2025-02-11T16:15:43.450000 CVE-2024-56559,0,0,353853da3e898d4bba88a08653e9a07b493a01962873d91259b7435d27f07afe,2024-12-27T15:15:14.760000 CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000 @@ -274334,7 +274343,7 @@ CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcf CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000 CVE-2024-56640,0,0,10f0b2a3aaf12df52ffd0999892bf36d19f534ecac7e8924491df7836872b181,2025-02-11T16:15:46.470000 CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000 -CVE-2024-56642,0,1,8abe8530351fb237277e113d6f46693243b7bf833dd01f5d3daea39a3120bb14,2025-02-18T16:15:18.770000 +CVE-2024-56642,0,0,8abe8530351fb237277e113d6f46693243b7bf833dd01f5d3daea39a3120bb14,2025-02-18T16:15:18.770000 CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000 CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000 CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000 @@ -274512,6 +274521,8 @@ CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000 CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 +CVE-2024-56882,1,1,d1019706010c2eaf23762843389a39ba14ab42ed70f2288822a5ad2aab8f9553,2025-02-18T18:15:26.830000 +CVE-2024-56883,1,1,6c8a2859c5b5b91112d27f5549314ca9f9fe53d9a52ad7bb051cf3ac9629815e,2025-02-18T18:15:27.287000 CVE-2024-56889,0,0,9fbc9aa317ff4af614f166aac56ac8e5170223605ace3a1bd1e7aa8e5957fa09,2025-02-07T16:15:37.680000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56898,0,0,707f540df9bad40fd6a0dffff09717bab11cd135fff5e7588c850ba08978f0f0,2025-02-04T16:15:38.523000 @@ -274530,7 +274541,7 @@ CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff CVE-2024-56938,0,0,458cb21752e464244cd938c0904393a9bc59f4b112b798d05bcbf7146d8f6258,2025-02-14T20:15:33.927000 CVE-2024-56939,0,0,3aaf8d1c81ff10733ea4dc30fb57b13e83d36de1fb847c3911bd8e3224342bb8,2025-02-14T20:15:34.140000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 -CVE-2024-56940,0,0,44a1d8c1d716ff369e2a45c01874d84654c74e94571972176e6d770bdb40eed3,2025-02-14T17:15:16.590000 +CVE-2024-56940,0,1,b7ab75abe53a9e2d9d92963a73a70e626faac2e220196d40b7fbffb55eea7b93,2025-02-18T18:15:27.463000 CVE-2024-56946,0,0,af9e881d063c5daf5a15e5df8041bc60d2da62760d3b549c99ac43411158444d,2025-02-03T20:15:33.743000 CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 @@ -274593,10 +274604,10 @@ CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6de CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 -CVE-2024-57045,1,1,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000 -CVE-2024-57046,1,1,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000 -CVE-2024-57049,1,1,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000 -CVE-2024-57050,1,1,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000 +CVE-2024-57045,0,0,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000 +CVE-2024-57046,0,0,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000 +CVE-2024-57049,0,0,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000 +CVE-2024-57050,0,0,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000 CVE-2024-57064,0,0,d535f1189c2fd178785b9587824905a95a99a3e73d0701453c0d1b761967f131,2025-02-06T16:15:39.347000 @@ -274782,11 +274793,11 @@ CVE-2024-57595,0,0,5ac192d4452b1b04f540486f14602420111ddc5ce9ebf1466c634ddcfa94e CVE-2024-57598,0,0,f942cb84c2609b2961d7b373816f9239192ede7b991ad3bd5a46392c1f31f307,2025-02-06T16:15:41 CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655e8e,2025-02-06T21:15:21.760000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 -CVE-2024-57601,0,0,225d456013d678778684db06cb161f7f5c515f35ff78e3b517f00f5aea3bb837,2025-02-14T17:15:16.787000 +CVE-2024-57601,0,1,53bfe5248e0c55062379b5772a0e365478a7cc4522b7eb09c12bbfc53a9014ac,2025-02-18T18:15:27.663000 CVE-2024-57602,0,0,30a807cf755b082304a2db55922b034781821e0a335455c3ab2e69496b686678,2025-02-12T22:15:40.867000 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 -CVE-2024-57604,0,0,812052693403195ae32632155ab1a6e433d42d109209f6d9c0707dbaee159068,2025-02-14T17:15:17.003000 -CVE-2024-57605,0,0,3602350f2d72f258fdf223214f07e17bb8aee6c913748b67a0da0958b6965164,2025-02-14T17:15:17.230000 +CVE-2024-57604,0,1,543c5b4910b41c72e908210bd3581236fe15916a3051d75b0cb98013a23bf9f9,2025-02-18T18:15:27.827000 +CVE-2024-57605,0,1,7963b6f1477133cb94cbd1a3b1ada130c7fa95a02e2999810ff3a185f251a2ce,2025-02-18T18:15:27.983000 CVE-2024-57606,0,0,e47ef892be105a3c660cb028f0906466f58d43467e431eca3220e3249f568439,2025-02-08T03:15:12.010000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -274879,7 +274890,7 @@ CVE-2024-57721,0,0,2848dad2c2b609041733157af3749bc2705ed04a630325793e55f87a8c15a CVE-2024-57722,0,0,cc12b04f9055359b9f59d1fb9351a1dc5f896d626ba1ab2353434d622e66c018,2025-01-23T15:15:12.610000 CVE-2024-57723,0,0,8dfe124ae30760a599d5a92653aea7bf25ab7fabdd29029a0d6962e3146e832c,2025-01-23T15:15:12.820000 CVE-2024-57724,0,0,80b6486449089b1abee894f99cbdee8ef8e8a7c83dc4631c3181139e769eeda6,2025-01-23T15:15:13.020000 -CVE-2024-57725,0,1,27c6ae24c439cdb14d5e3d88f037e70f1d1e4712d4ba24364db40248ce2a4e12,2025-02-18T15:15:17.067000 +CVE-2024-57725,0,0,27c6ae24c439cdb14d5e3d88f037e70f1d1e4712d4ba24364db40248ce2a4e12,2025-02-18T15:15:17.067000 CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000 CVE-2024-57727,0,0,e4677a15ae16ec0ebae3eb2021b05fa3f0029b408f389dd592fbd8ecc2109cf2,2025-02-14T02:00:02.377000 CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000 @@ -274907,7 +274918,7 @@ CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485 CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000 CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000 CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece260,2025-02-14T21:15:16.197000 -CVE-2024-57778,0,1,1a22178fc29abe6dc59d7566fc4abe03a351aa30931d5173f5e6ba8cd7ab0933,2025-02-18T15:15:17.207000 +CVE-2024-57778,0,0,1a22178fc29abe6dc59d7566fc4abe03a351aa30931d5173f5e6ba8cd7ab0933,2025-02-18T15:15:17.207000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-57782,0,0,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 @@ -275051,7 +275062,7 @@ CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000 -CVE-2024-57970,0,1,7c0875f2d20f0c5e1f382717358d28b61ebe8a0a2bfb0f2c818ee7d95f28a926,2025-02-18T15:15:17.343000 +CVE-2024-57970,0,1,f1d0dec9bb100b8fe9d61ebb8638b3be011d2a215ab10879b323d77b83371cb3,2025-02-18T17:15:19.130000 CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 @@ -276675,7 +276686,7 @@ CVE-2024-7587,0,0,905f1e2769f930482ddb7f6e8ea78290401663df4ac22d8bf86420647d5839 CVE-2024-7588,0,0,1358b20a23caea616b44e7d1fe9b2d36965a9414c7baff3fbe2639297f0ac95b,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,4a4abde1139ff2d724dfc63d85f01201c50a76c0c99327051fb78ce9046dd2da,2024-11-21T09:51:46.310000 CVE-2024-7590,0,0,1533bedd8671f69add27338b97b679c389b63d7adf3d74a6b1d24d9f2d72c2c0,2024-08-13T12:58:25.437000 -CVE-2024-7591,0,1,041f4eda84f2c8a6fc5bb4d14a322e4df44b8c9f4b7f6dff3915a52ba4bbd6ad,2025-02-18T16:15:19.110000 +CVE-2024-7591,0,0,041f4eda84f2c8a6fc5bb4d14a322e4df44b8c9f4b7f6dff3915a52ba4bbd6ad,2025-02-18T16:15:19.110000 CVE-2024-7592,0,0,f506a3341b4fbba83ac6e211c07afc6e4724cb2928db9d2406bc99c446bd1c95,2025-02-05T21:13:47.837000 CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000 CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000 @@ -276862,7 +276873,7 @@ CVE-2024-7801,0,0,de1c174e4d255134bca63a0c587454638d0b42c255fffd4a5f0594c369c20f CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 CVE-2024-7807,0,0,2f79e8d22e5d6ed09b318ab38ea343291c76b7890ace2830ff2b3c8694390017,2025-01-09T18:15:29.543000 CVE-2024-7808,0,0,7ac11306e30eff8e50a7b86f7aac8fe9c520c3fd210bead54deae1abf746387a,2024-08-19T18:07:44.270000 -CVE-2024-7809,0,0,954ad4e20519f99939aae234167e2e1a513a575114d1fd0d8c005f141a3c37b6,2024-08-19T18:11:18.537000 +CVE-2024-7809,0,1,9d8be3b7031af396722078e7b9e5a2ebeea936683bacbce13a1c4fdfedc55880,2025-02-18T17:36:46.073000 CVE-2024-7810,0,0,048c5f698b16572eb13dbdde0a6f3f441c9e5f84a2c20bd6d58d137b28d8cf16,2024-08-19T18:12:14.090000 CVE-2024-7811,0,0,12531cf26a35dae7741e8deaba0b16e536637c9c3f93919c3a2cef209680e0d7,2024-08-19T18:15:40.487000 CVE-2024-7812,0,0,1924e0763fc5bb43c521d60fef0a38629d7b1f875bae4e4b103ede96f056b2e2,2024-08-19T18:16:21.283000 @@ -276893,10 +276904,10 @@ CVE-2024-7838,0,0,1fbd60f09714ccd0ebeddabc478b2840543f5e43cb8ec684d2d2b191b17b3a CVE-2024-7839,0,0,837244a4a2c59c49274c3b27864b68128e6a9c3344d4cd098cef59407bd5f378,2024-08-19T21:18:14.097000 CVE-2024-7840,0,0,d35ca76144bd19435a47b3fedccf5874ff3f315159a3ff1390b9d875a9e91a8d,2024-10-15T14:52:57.110000 CVE-2024-7841,0,0,a58ceb9ed66c30a87ead2d11b7aa945a89c1b95a742ade20e4030a4bb91e10a8,2024-08-21T14:12:12.943000 -CVE-2024-7842,0,0,d0104f62f0d316e836543cfd845f302bdc3b7820622bddd84acd54a97bf6c054,2024-08-21T14:13:38.923000 -CVE-2024-7843,0,0,af6ee9a0b9d1d5fe37e9bdc344ba54235b58115ca8f6bb11de46cb302403f444,2024-08-21T14:13:11.157000 -CVE-2024-7844,0,0,41aec878bb55810ec2a7d206a4a07b946c5de33a15d0614d726f9b3ae591b68e,2024-08-21T14:12:43.497000 -CVE-2024-7845,0,0,69187378d14f718afb39c0907c789854a448eb0191941a54ee211a993d96b985,2024-09-26T15:10:57.870000 +CVE-2024-7842,0,1,b0bf4e1621e730bcd6806bb079da5fb8bc5b5cacb7726eb35632f4e159098835,2025-02-18T17:37:49.770000 +CVE-2024-7843,0,1,c30f5eedb02c7fa7977f6290f277310b77188653d77c72a9278efe3c2a730eaf,2025-02-18T17:39:02.267000 +CVE-2024-7844,0,1,b945abf3f695d461d9d1e18291669e2e59da059cb452e35c344d73623d59a14a,2025-02-18T17:38:06.470000 +CVE-2024-7845,0,1,2c5ec3fae94aefd2c07867c0cb39ab92c24398d818acf5730d5b48338b450dca,2025-02-18T17:39:16.643000 CVE-2024-7846,0,0,062a05e5354504d1b13e728dfbb3e7afb83dbde8d2b97324a68592e59d17407e,2024-09-26T13:32:55.343000 CVE-2024-7847,0,0,c398ba4d63dd7bf75d67ca3c3f77f101f5e25778c1876c82c51d530c88ccea4a,2024-10-15T12:57:46.880000 CVE-2024-7848,0,0,819cc9d3571898007217ad3ba822e72cd64069cb6d868c7ed2b48867e2bf0afd,2024-09-26T22:12:13.457000 @@ -276980,7 +276991,7 @@ CVE-2024-7927,0,0,1c8d97bdc5a4f59404c8717641b0de37b27ce8629ffab60f65adbc1044503e CVE-2024-7928,0,0,e819c80a2dd27cef72d71987e0a394ed561ead4b8b153e214a91d29c33550cc4,2024-09-13T21:33:27.260000 CVE-2024-7929,0,0,c08f8e122824a87a7aabd4cf9298a61e2dc65b0a9b74b4573cebb44777b5c010,2024-08-21T14:10:01.937000 CVE-2024-7930,0,0,0bdf39b734b7d03d2d6a74d470ef1c4fad295665981a893950d3e47ae0c4e2b4,2024-08-21T14:09:28.830000 -CVE-2024-7931,0,0,3de3de3db844d7e0418397634dd60d1166f646de92ffae626ed262e07373a7ee,2024-08-21T14:08:54.820000 +CVE-2024-7931,0,1,efe854d84df7c20a9e276c8507cd8d41362038cca3c4fdec9a34426d9f365a3f,2025-02-18T17:38:19.927000 CVE-2024-7932,0,0,a3b8f0365bcfd61f4c89f049a9289f2bdc352e0bee6c99b71c405dc0475af057,2024-09-13T07:15:06.800000 CVE-2024-7933,0,0,849c2f17b2bffd34fcd5e5ce36dc8b5de9d095ed4f3106cf1606a97b192886c0,2024-08-23T19:53:54.260000 CVE-2024-7934,0,0,814f266df139390323f49496f39c6d970b0116822e07ade9862146a68fe3d1f6,2024-08-23T19:54:37.790000 @@ -276998,7 +277009,7 @@ CVE-2024-7945,0,0,18d41a9b4e39280f216309683b04289847a646f68eb3c0394bca05b8e69911 CVE-2024-7946,0,0,b952e8e6d6ff4badf43a9b5abca8acd6bd196ff66df2f2e918b35f654e8f0e3e,2024-08-21T13:55:24.780000 CVE-2024-7947,0,0,b27fdc4d03c3837d4040b8fd618bcf9157d463f3eb0429c4824126cd30fbee7f,2024-08-21T13:53:38.750000 CVE-2024-7948,0,0,98ca7c5f14a5ca71e63507e53a36c63df20ab50556fb76e7aa3e71253a64fc0d,2024-11-22T15:08:44.600000 -CVE-2024-7949,0,0,938be252eafa677444e7af3f40dd799998c50546ec7ab89a4654cc4aa286695a,2024-08-21T19:15:13.600000 +CVE-2024-7949,0,1,03e0df7ea70835850ab39effca18d1b84f7bbc0cad0cd9f25c0c30c54bc27023,2025-02-18T17:36:38.023000 CVE-2024-7950,0,0,e01e375fe14de9b9f44c81dc9051f88850110a22aa072224aaf13295db521b6a,2024-10-04T16:12:09.520000 CVE-2024-7954,0,0,93a82d9eb91dffe6882cc9693eaf8a0cd41cb42ca7e49fa92bbf3372a2f48b33,2024-08-23T18:46:31.730000 CVE-2024-7955,0,0,e78817146110282abf51858aa0946a32350d1797c36925b674d18ae9d272e172,2024-09-10T15:35:13.013000 @@ -278718,7 +278729,7 @@ CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5 CVE-2025-0001,0,0,5760e2d1c8a423ec1fce437052bab776887b78a7792a13401fa67b8fbdd14b3d,2025-02-17T10:15:08.550000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 -CVE-2025-0054,0,0,22a967176aaf42249dc9b67293cdaa2b5c3cbf9a9dce95abf2b5e51fe83ab402,2025-02-11T06:15:19.863000 +CVE-2025-0054,0,1,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000 CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000 CVE-2025-0056,0,0,be034bcd972f419ff8782984466cba082295f005cb1c5e6f9c99f15962645479,2025-01-14T01:15:15.730000 CVE-2025-0057,0,0,1ac61283bb0c2cbc4087604b5df17a16843aa1606269b81805952e9e259afc2a,2025-01-14T01:15:15.883000 @@ -278727,7 +278738,7 @@ CVE-2025-0059,0,0,6416879787f54d6a44b6599a708532154a0b00797493957584bb4d5ef53916 CVE-2025-0060,0,0,1cd7402c377fe0eb71c687af689b0d9a4160c668897128edffbfc7ea6f4b4145,2025-01-14T01:15:16.350000 CVE-2025-0061,0,0,1b8599d27b3c8b95785284a43802c929098c42ac59855f759f4dd597f002bfd5,2025-01-14T01:15:16.500000 CVE-2025-0063,0,0,e52e2556ff38cc25592bde9486fa1da35995f2773770ff25a347e7df36a48b0b,2025-01-14T01:15:16.633000 -CVE-2025-0064,0,0,edc6327f37e69b3f8c23bfa1053adffcc4692f14209e502e377c2d1617204178,2025-02-11T15:15:19.070000 +CVE-2025-0064,0,1,e7f5bd1ecd70eeee1a65854e054746f34eb8dfec8e0a20e48bb6b270dfafe980,2025-02-18T18:15:28.470000 CVE-2025-0065,0,0,70f469a84981289145ddab7e496e3ce6a2882a8618ec61a008685ed9d3ced71c,2025-01-28T11:15:07.413000 CVE-2025-0066,0,0,41773dd06eda78c1806c873ae42cd1b5433608a0fe1510b7dc5de4c2fa1f4080,2025-01-14T01:15:16.783000 CVE-2025-0067,0,0,595fadc08a33537ee967fb524f132a140bd7562627c52fe87a8f7e09b94969e8,2025-01-14T01:15:16.950000 @@ -278964,7 +278975,7 @@ CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed2 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 CVE-2025-0503,0,0,1c28203001e43c279e03305b394a02204f5941f974df8145add898a6abc17980,2025-02-14T18:15:23.870000 -CVE-2025-0506,0,0,d8bf3b78c733c50b3df0cd3f3a0a496f3fa631b02113fa5dfd90f4e97b958815,2025-02-12T15:15:15.613000 +CVE-2025-0506,0,1,ba986da4eedc5b7116688c6e242efdc143017424666b261a5d72ef024c0a20aa,2025-02-18T18:15:28.670000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 CVE-2025-0509,0,0,913ed89216296740c4c407c24a56b36bddc347f56451a23b8f05b7d47d26ebb6,2025-02-17T12:15:27.370000 CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000 @@ -278976,8 +278987,8 @@ CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 CVE-2025-0521,0,0,d141672158f3dd6b43e8362cbb49b94292957b9dc12c9c2a20a4b4cb911bea60,2025-02-18T11:15:12.740000 CVE-2025-0522,0,0,c8a0deca91ab7a70ac2596d161948276f43ea6a4ed62efff36cb1682db433422,2025-02-06T15:15:17.127000 -CVE-2025-0525,0,0,babf1a33188acdd067666dc0ba0175c8755fd69045eceebc9e557709ce71228e,2025-02-11T15:15:19.370000 -CVE-2025-0526,0,0,53dec4a6dd32d10587365e0ad07600d979649e21e792ed7853f6469f9e22a090,2025-02-11T15:15:19.520000 +CVE-2025-0525,0,1,c288f27e7cbfee2400ae138222cd0f0778e1304ba3ca58c91a31add13accca58,2025-02-18T18:15:28.850000 +CVE-2025-0526,0,1,72c048b07f37484ff5411cf9170da2e1d74699bcf31208d52953a5f6b4d6ef19,2025-02-18T18:15:28.993000 CVE-2025-0527,0,0,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000 CVE-2025-0528,0,0,e3f7a40f975e109bf5214cfef482edb88f65284729988309787cc2f9ee957859,2025-01-17T15:15:12.430000 CVE-2025-0529,0,0,b7599e714e3df556905823f6cbc3ee4b0615bbfc883d87e213cfa26e9ecdbabb,2025-01-17T15:15:12.670000 @@ -279183,7 +279194,7 @@ CVE-2025-0924,0,0,aee87ee741a81d5e3594f3d82c18001c32a0f8c18175f96bf3ced22a7e7ace CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 -CVE-2025-0934,0,0,cb11041269a8589b970c0f89604fb5209d62ec1164e7a0c44283787310af58bf,2025-01-31T20:15:32.893000 +CVE-2025-0934,0,1,d8e0246ff2efc1b37a4d2ecfb87caa8fb3d271a34e502eac17b8e8e5be8b0f3e,2025-02-18T18:49:12.210000 CVE-2025-0935,0,0,4892b6ddf9de8c08a2def271507f8b9a6082ba4602bb2223678f98953998cf06,2025-02-15T09:15:10.583000 CVE-2025-0937,0,0,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e91465,2025-02-12T19:15:09.687000 CVE-2025-0938,0,0,48d7b602c8da430d9ec862aa287f133d1b7490f6d69b5ae38b3ee95dfcfec97c,2025-02-04T21:15:27.543000 @@ -279208,10 +279219,10 @@ CVE-2025-0981,0,0,391f0270940545eeab79a2413ce96d042a150190fc332923a976cf357e2409 CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000 -CVE-2025-0995,0,0,65f06ca130a3abe03847c386ea55408245854e6c067108d80344baed35cdcb26,2025-02-15T02:15:09.127000 -CVE-2025-0996,0,0,5b0a07b0d90d57d9bc561e351f489210344c394553b0fcf774d0705d327a77bb,2025-02-15T02:15:09.260000 -CVE-2025-0997,0,0,92f4300ab0b1dd2584703389348f08dd2990545781c3bc321ca3e65f0f04b84e,2025-02-15T02:15:09.377000 -CVE-2025-0998,0,0,575b3041b63ab2292e4b6d5546af25bd1e53bc58d5c0e25607366e3e0534074d,2025-02-15T02:15:09.483000 +CVE-2025-0995,0,1,cdfc421290eb9c0aaf2d86d330d7548de811167731e07835b47729c6edcf7253,2025-02-18T17:15:19.383000 +CVE-2025-0996,0,1,96e6c91bf4ad6f13de2d7e7d33ae6669310fa693571332f25d6d49457d8ebc3a,2025-02-18T18:15:29.130000 +CVE-2025-0997,0,1,9a6c4b35ba1bd9bfdebd68ad687359b2a111440316e9e605ae9be400472a1e40,2025-02-18T18:15:29.347000 +CVE-2025-0998,0,1,260aa2ee4883a3fee476ba7c1a4fd8609a0274d690b6f034f84af7eb5edade81,2025-02-18T18:15:29.550000 CVE-2025-1002,0,0,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f595,2025-02-10T21:15:21.830000 CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000 CVE-2025-1004,0,0,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000 @@ -279275,9 +279286,9 @@ CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 CVE-2025-1127,0,0,964bb8e082be5f4c3ffe02b7d66d3573c4a806865108fd7e7f64bea0f60eef31,2025-02-13T19:15:14.153000 -CVE-2025-1143,0,0,1d7b441bbdfdd91679a61928377ffa3cf4aef29dcb7e2164736cdfa974c3af71,2025-02-11T06:15:20.100000 +CVE-2025-1143,0,1,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a73,2025-02-18T18:15:29.750000 CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000 -CVE-2025-1145,0,0,702251c5c63add87dbb46d5a591b20595aeaf2811a2cf7744564b88f69498bc3,2025-02-11T06:15:20.510000 +CVE-2025-1145,0,1,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000 CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000 CVE-2025-1147,0,0,cd9e20ef3a1b45941682300e8f3499e39e83ddecaefe96ac0b5e9f1a60ce94a8,2025-02-10T14:15:29.643000 CVE-2025-1148,0,0,0ede2590a76c3dcb7ca8715c635203c5957bbaeec1072dc0fb5812c309157412,2025-02-10T14:15:29.927000 @@ -279292,19 +279303,19 @@ CVE-2025-1156,0,0,63f659c664780669befb323dbfaf50336d4de536f23cedf7903aa737a21aa0 CVE-2025-1157,0,0,a206788cb4fbbf65e1bb0cec173b38841b013b053694d19ca76247067cf723b2,2025-02-10T21:15:22.300000 CVE-2025-1158,0,0,62773d64730482cf69afc1e9bff0a11243764d0c298b1a874d7ef2a6b32319fa,2025-02-10T22:15:37.080000 CVE-2025-1159,0,0,19a0036bd88070e1e95d8ee26c655747cb8510ac9a9b4838822239ae43731b9d,2025-02-11T16:15:49.820000 -CVE-2025-1160,0,0,81300ab746d688ef30c38c139dc45cf7b27f9d2459b2a483663422f08d79149e,2025-02-11T15:15:19.790000 -CVE-2025-1162,0,0,6fc6d17a544a211e5238fc3e98c99b23aea8c1ef3a4735c45eef263490a825ef,2025-02-11T15:15:20.047000 +CVE-2025-1160,0,1,813fc2ae77df0f9a7b591611ea1dc0d4addb1d75b4bd6effc1175b65af7f6e6c,2025-02-18T18:15:30.120000 +CVE-2025-1162,0,1,05f2fe2633f20c8b4e4c9478dcb932c19e8a944f98f76412e7687c038b939d05,2025-02-18T18:15:30.347000 CVE-2025-1163,0,0,0bfc52e8c2d65c1c7189d51828a8bfbb7aa129666e27c922aa7ae87c824a1049,2025-02-11T16:15:49.973000 CVE-2025-1164,0,0,547ef17bbcc7e2e002cdaf360903d023f2da7f36e6b67ddd9cb8b2f85ea02033,2025-02-11T16:15:50.100000 -CVE-2025-1165,0,0,f0aa9c1988b800a9e62729a1594a28872c082e2e2fecbdc830e28263a6a0e0d6,2025-02-11T06:15:20.700000 -CVE-2025-1166,0,0,317888de8b721bc501117cfe4c033c072f9549f2eaee452ae14bbfa0b2f71f85,2025-02-11T06:15:20.937000 -CVE-2025-1167,0,0,e7daea1dd2d4f65ca2c394a7c9a52f37df354f3dd13adeb93e168d726ece3d64,2025-02-11T06:15:21.153000 -CVE-2025-1168,0,0,ddf17b2f04e933c8345200e2a24720c3d683ab487bd6dc6a79c48f8419664077,2025-02-11T06:15:21.367000 -CVE-2025-1169,0,0,149a68c904b59c7ef4c244404ac9c3033faa0090151641d8c4f94dd2d395bdd5,2025-02-11T06:15:21.570000 -CVE-2025-1170,0,0,a47e1a0650e646091ec3057014ee2800de51b75fd317e5d66dc8b5b55c9a07c8,2025-02-11T06:15:21.800000 -CVE-2025-1171,0,0,2833ebbbde3be384d9a3e0adae043c787dbe930e752e0c1a2df8ebcf4ed77523,2025-02-11T06:15:22.010000 -CVE-2025-1172,0,0,4b8526a3f31eb0e151b1c4b5718c2c9e8f36a3f311ddeeb53f26476bf34faae4,2025-02-11T06:15:22.230000 -CVE-2025-1173,0,0,250afdac8344bd2fb519306f8cb736da9f89042acd64975e11de152d0dc8b435,2025-02-11T05:15:13.530000 +CVE-2025-1165,0,1,1886bedfeb77a30110b603391f466b1db5cd60c4975e01459203f5a7ce592282,2025-02-18T18:15:30.530000 +CVE-2025-1166,0,1,b573d7756490a49505f4af46492cdcaaa7bc38f4ea886c902f0eaea7029fe998,2025-02-18T18:15:30.743000 +CVE-2025-1167,0,1,cc711cc8cd4aa0c150c36c7b220b69f5b43646086fb2fe84a7021c8aba7a93ed,2025-02-18T18:15:30.940000 +CVE-2025-1168,0,1,a7cd0398ba73b0d35d93dc779587da27ff53b481f56c03909c8a65e17b663c50,2025-02-18T18:15:31.127000 +CVE-2025-1169,0,1,0a59a82bf783f5b8e27c6775343df945f8312e3cfa7292fffd225ac919cbf561,2025-02-18T18:15:31.317000 +CVE-2025-1170,0,1,bb3b79d15607fbd7c966744a12f28338a0af8bc33bee173fc482da6a176bf05a,2025-02-18T18:15:31.513000 +CVE-2025-1171,0,1,3e94253923e8ff44d213cab4b64f9a86d8cbfa94f3fb426c2700ab51a6b2434d,2025-02-18T18:15:31.700000 +CVE-2025-1172,0,1,cf08703b66582ec9de3e473fcab67a2dbafe69d53a075dc9b8254b1bcc7063ab,2025-02-18T18:15:31.893000 +CVE-2025-1173,0,1,3256d2a06a1e205d73caa7c7b35a941bd06320937c6ee57d5e3a1dfb4b5dac94,2025-02-18T18:15:32.097000 CVE-2025-1174,0,0,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000 CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000 CVE-2025-1176,0,0,3ce63005f2d6955454d119dc789ba0c338f09f10e1ca69523a11a4e76ebec2d2,2025-02-11T06:15:22.433000 @@ -279314,25 +279325,25 @@ CVE-2025-1179,0,0,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112 CVE-2025-1180,0,0,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000 CVE-2025-1181,0,0,ca3c1011601b0fae06b99a2c26a8cd106fa387c5be46410c165b6082b079962d,2025-02-11T15:15:20.393000 CVE-2025-1182,0,0,8e271e74e78bb304bae883d9033bfab3d4bd2205d8549a0b17477d8e591b3926,2025-02-11T15:15:20.523000 -CVE-2025-1183,0,0,4f76f1aad34d8f448f8d28132c4592112d8e7338246e678563c85000b0066cb8,2025-02-12T15:15:16.520000 -CVE-2025-1184,0,0,d0f4a01d3468a862af9e88ce8e6bad84fd70b755e39203a74df013c2065cdb0d,2025-02-12T15:15:16.723000 -CVE-2025-1185,0,0,3c5feb3c94641e4255687d0fd87b00fecaabc367d6cb130f8441b42d4da9db80,2025-02-12T15:15:16.917000 -CVE-2025-1186,0,0,4b90530119561286dc68d769efa10800b869d56d765cb8b3f319f9ef6308351f,2025-02-12T15:15:17.140000 +CVE-2025-1183,0,1,2e368e0a0c3d5bd4d908f21074d3c7aea18e9a09f1e180746a9622d0fe53bad6,2025-02-18T18:15:32.287000 +CVE-2025-1184,0,1,90a76caadfd7aca36e8f9000c3958f8b35637fc9892e529865f6817cee8b4473,2025-02-18T18:15:32.483000 +CVE-2025-1185,0,1,cc25ee2f77a3103fcd68a3f1611fd1f716189b46d9cae5c522939b670d5fe60e,2025-02-18T18:15:32.680000 +CVE-2025-1186,0,1,8086a12ea65738a60ab99220576d2e18e33f078a2bf72100e8b879a5e3eef2f8,2025-02-18T18:15:32.870000 CVE-2025-1187,0,0,24cc041d67c097311e1ec560145519db78d79e2087641eb51be332607e30534d,2025-02-12T09:15:08.613000 -CVE-2025-1188,0,0,198d013d96f709dbef8f83516eed068d72a144493472f3d2961015d039cb325f,2025-02-12T15:15:17.407000 +CVE-2025-1188,0,1,705852bbbd5f869ccd9a3fec289796fb3a53a8119c986f44aa0b13a8e84aa3bc,2025-02-18T18:15:33.103000 CVE-2025-1189,0,0,9d048b706e0c633092d2636c584e408a87b9bacdb8dd7e3545dee61fb5f96c9c,2025-02-12T10:15:14.540000 -CVE-2025-1190,0,0,20930ff322a51b9b3d3ffa9071d6fd0e84461c7006f2bffb1ff463b64f53dc36,2025-02-12T10:15:14.740000 -CVE-2025-1191,0,0,a9443451c80e7e8f60c9625659585c30e981d1cf45549b4cb91185c07237bb4f,2025-02-12T11:15:08.480000 -CVE-2025-1192,0,0,d1f7e39b32f8c53dde42a30e4b900bd146d3192392e3efbb1e9aa57fb4c397d2,2025-02-12T11:15:10.727000 +CVE-2025-1190,0,1,bdc8e5317e46e46a9ca4a9bb55f67f9139555824a181f8bdaf33c4b7f757c764,2025-02-18T18:47:00.127000 +CVE-2025-1191,0,1,1c6bbb235a5b5708d13f9a9dc19f35d51e2568dd188a3fd7f6e46662095fe78f,2025-02-18T17:51:51.260000 +CVE-2025-1192,0,1,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc37a,2025-02-18T17:52:35.107000 CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,8173ee044f7a44d277ecd5bcf18ea26c61474b7fa54bcdb4ba1d679169d475f8,2025-02-12T12:15:29.397000 CVE-2025-1196,0,0,a341521c6ec36a359ca3a6997d6fc06dbecfef1b545e90026b0a9f15d85e65d3,2025-02-16T15:15:08.200000 -CVE-2025-1197,0,0,a51ead443f214c0f6ef96f804505332b87f10dc50ce1367c994773610f655dcd,2025-02-12T15:15:17.670000 +CVE-2025-1197,0,1,3ec7e3ce10870b4cb1fe9aa96075e785feab0d5efeec7b33e0431be8a88a48c6,2025-02-18T18:15:33.303000 CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 -CVE-2025-1199,0,0,0b2d000c300f1d87e0ba30963c3bee998d11347294a6daefb6410adbf670161a,2025-02-12T13:15:09.537000 +CVE-2025-1199,0,1,53991dbea06a5b0800e8d25e504a12a841d823a239457fc0e48265a3904ab288,2025-02-18T18:06:10.360000 CVE-2025-1200,0,0,96b433ad7e26edb6f2f9acbb0eb46fcf07f61e221c5bf356eca3408db2bb3def,2025-02-12T14:15:32.090000 -CVE-2025-1201,0,0,a5065e27b37926d38fdfed5b240cbc7757f67e4ae3c1833a26362532b946f2b4,2025-02-12T14:15:32.297000 -CVE-2025-1202,0,0,5267a36acca62c6f3f1f2bf36ac105f93bb86abed5aafd377b82fbcaf82fdc5e,2025-02-12T15:15:17.920000 +CVE-2025-1201,0,1,bf3e8ac22ebf988432aa71d4e5462b0f09f58c2593da323d6fb54b6e8c253853,2025-02-18T18:01:07.620000 +CVE-2025-1202,0,1,52dbd111bdba6642349217f5a5e9aa58580640d5efecd8d9ccd8521dcc74d783,2025-02-18T18:02:04.383000 CVE-2025-1206,0,0,37cd2d6546fdf449b1a62f8210a336962e7bf0596932f3b0d053a8aadabaa84e,2025-02-12T15:15:18.093000 CVE-2025-1207,0,0,518ea976e835e5d2e9daf8b69c95e3e72206f7bb3a8162c7be7b93925d62ba41,2025-02-12T16:15:44.393000 CVE-2025-1208,0,0,944ef3909d00298a5468923e8ae65e2d99c50759f8df888a5fac58ccad7ae971,2025-02-12T16:15:44.613000 @@ -279361,7 +279372,7 @@ CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000 -CVE-2025-1298,0,1,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000 +CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000 CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 @@ -279377,7 +279388,7 @@ CVE-2025-1354,0,0,3d7667bfcb2c0b251ddb0a6e2cd2d09c76acedbca3edf8c1b754b383822407 CVE-2025-1355,0,0,2b32faeae86cf10a841d554d3f1028e038f2f84a86d16604e50e5f2d459277b4,2025-02-16T17:15:07.973000 CVE-2025-1356,0,0,ad47206c360f81c88d742a140cb46365165054af6533ecf378500f5e98562fa1,2025-02-16T18:15:07.383000 CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857bd,2025-02-16T19:15:09.500000 -CVE-2025-1358,0,1,9cc206366a5cf3c6fd36dca7ea305ebd259d86e92a5cfd3942bb4b274e8c43ad,2025-02-18T15:15:18.157000 +CVE-2025-1358,0,1,4d6b176561a122e28555e921478a072441121d17ebc8ac0b01ef4350bb45d13a,2025-02-18T17:15:19.737000 CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000 CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000 CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000 @@ -279735,7 +279746,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000 -CVE-2025-21401,0,1,df0f74dcda8fafe80cdce4c22148075892d97eed204201d20b25f487dd51c8fe,2025-02-18T15:15:18.357000 +CVE-2025-21401,0,1,c369ea5d0feec0c99f2fdfec8e88113ca906db854818fda7f0ead2f4431fad52,2025-02-18T17:15:20.057000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000 @@ -279934,8 +279945,8 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1 CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000 CVE-2025-21700,0,0,1988e353bf970928db094f4eb8b02a104971f35d83e20789d12d6036e63fda23,2025-02-13T14:16:18.803000 CVE-2025-21701,0,0,0d5db2c9937957c1e18c4f0255b6e33827b9d7a4319fd313888b10a928dcd781,2025-02-13T15:15:20.867000 -CVE-2025-21702,1,1,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000 -CVE-2025-21703,1,1,50ca96765329a32311c86e462da796359e5192ba961e83c86eb5e2a5200841a8,2025-02-18T16:15:20.310000 +CVE-2025-21702,0,0,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000 +CVE-2025-21703,0,0,50ca96765329a32311c86e462da796359e5192ba961e83c86eb5e2a5200841a8,2025-02-18T16:15:20.310000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000 @@ -279961,7 +279972,7 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8 CVE-2025-22204,0,0,15823536a3679737b5ef36e2f772e366706e0f48ba530e66ed64a7380917346d,2025-02-04T18:15:35.247000 CVE-2025-22205,0,0,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000 CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b266,2025-02-06T11:15:10.797000 -CVE-2025-22207,1,1,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000 +CVE-2025-22207,0,0,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000 CVE-2025-22208,0,0,55682c702be57115138b9836a7ae27c0c6ea10f7b8b4845e2269e3fb48a78e9f,2025-02-15T09:15:11.043000 CVE-2025-22209,0,0,f0ef35082d3ac11b8f37aa95511370b4c1ef70485b50313f4e611683562ad393,2025-02-15T09:15:11.237000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 @@ -280075,7 +280086,7 @@ CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 CVE-2025-22467,0,0,79f72ccd5b3a974b689712a969e184ac73efee9466b0950e634b839d4d74346a,2025-02-11T16:15:50.840000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 -CVE-2025-22480,0,0,d352d649cac413952f1f4eb9638eb28296f997471467d40df4990802ee33aafe,2025-02-13T16:16:48.777000 +CVE-2025-22480,0,1,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 @@ -280441,7 +280452,7 @@ CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4 CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 -CVE-2025-23187,0,0,e54128cf2f6e17867d87517f5215114c1b362de34f57463733be67c37ae934fe,2025-02-11T15:15:21.037000 +CVE-2025-23187,0,1,c290fe7dd4f9aea98485c447bf9862acb0a55538c675ba503d3516720f3efd65,2025-02-18T18:15:33.497000 CVE-2025-23189,0,0,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e263e,2025-02-11T01:15:10.263000 CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3193,2025-02-11T01:15:10.413000 CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 @@ -281005,7 +281016,7 @@ CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 -CVE-2025-24200,0,0,588e3756d714d1d90f30dee3f03ff2b3409a47afa861c30d00639a07ad4fd729,2025-02-13T16:24:24.953000 +CVE-2025-24200,0,1,f2c577050ea44e8f6c33596bdc7fd9ff3774f8bd3d2a6ec2a68471debb209273,2025-02-18T18:15:33.667000 CVE-2025-24312,0,0,035e309179990714bfc5a224383cb635d168f3d299c79f966057bc59a555a04b,2025-02-05T18:15:34.060000 CVE-2025-24319,0,0,adedd82905f17d94cd1618fe5c2333851373ebf3ef16127d104e641044be5e8f,2025-02-05T18:15:34.557000 CVE-2025-24320,0,0,2bad44d619fa596716ab7f544e528f9635ccdb2ac03fd982c2e4cc08e1be7d7e,2025-02-05T18:15:34.960000 @@ -281339,12 +281350,12 @@ CVE-2025-24861,0,0,113c002b02cdb53ae24f8b567132904b940b96dc6020c422cd77e3b2b0aa6 CVE-2025-24865,0,0,103cbc3a75159253842395591696e600d2b3933ff35693d3d496ee2406f910bd,2025-02-13T22:15:12.613000 CVE-2025-24867,0,0,32b5b4cae9faa98375e2ec8191ee6bbac47790e6975c81218e81b4b72829e2de,2025-02-11T01:15:10.847000 CVE-2025-24868,0,0,3126f003c867405c437c9a5d233b2132fdf5dda635736a251e9443dc3f9770bc,2025-02-11T01:15:10.990000 -CVE-2025-24869,0,0,0b763b5da0f999cd707366430c75d571b97245abd870573fc7099dc9cf50e020,2025-02-11T06:15:22.913000 -CVE-2025-24870,0,0,a2db71b3bb4577b88c7f2609982e7661a916b5066ecbdfd03d2ede2fdedbffc5,2025-02-11T06:15:23.113000 -CVE-2025-24872,0,0,4efed8d389f2228ee72f20addc5e1bc7db0658747712926c4ebbd14619c57822,2025-02-11T06:15:23.310000 -CVE-2025-24874,0,0,28d3746e6ddf175532c71697c54b525c3bccb5e9a012dbf5c4833e9b341fccbc,2025-02-11T06:15:23.523000 -CVE-2025-24875,0,0,269c263fe7bb9f36182c9045e439fe76d1c283cfc2235364ae540ff6e842ae58,2025-02-11T06:15:23.720000 -CVE-2025-24876,0,0,a2f302edccf62982439c8019d0485600c779cc8c62d596c84896ce92f691d579,2025-02-11T06:15:23.923000 +CVE-2025-24869,0,1,7487e9b2ea994aa31a7eba56e36180a5b91aaa886297577734820094a1ac00ef,2025-02-18T18:15:33.810000 +CVE-2025-24870,0,1,8a1955614ad6170098b2431ea0a7eb0095b1f9fad9151a39a2352145e24bee31,2025-02-18T18:15:33.987000 +CVE-2025-24872,0,1,460fb0f0e5e82a28a5d26e696199083f7e4334d8b35fd8d559f4afda8c5269be,2025-02-18T18:15:34.153000 +CVE-2025-24874,0,1,0fa59b45ae17306f198268603c8d0746966ec16b04ff40aaadafe786062552a3,2025-02-18T18:15:34.330000 +CVE-2025-24875,0,1,960229588f88a8332ba46e89e55719ed0cb52508284f6bfc2721689570d6a985,2025-02-18T18:15:34.493000 +CVE-2025-24876,0,1,e042dede46cafbe6cd7b0528c7b274600f432bec33cd3578b5591221317813c3,2025-02-18T18:15:34.673000 CVE-2025-24882,0,0,d69ee6af8ebbf2c66afc252a0f60aa0a605fa36df9c8e25940d30b6e36104ffe,2025-01-29T18:15:47.570000 CVE-2025-24883,0,0,5af6779d4ec23837d1def10d0a5a87236bf4a151f86bdc15bf65b07a54534073,2025-01-30T16:15:31.947000 CVE-2025-24884,0,0,bade910c39f8ffb60e0f0b75bcf02649bde3ff244d61b23496f8d55a3d96123b,2025-01-29T21:15:21.667000 @@ -281479,8 +281490,8 @@ CVE-2025-25221,0,0,8974eac2e7e9ae10d10e6ecea65cfa14b1a0276679b9b181745dffe07f54e CVE-2025-25222,0,0,af5e7702e07f0bbb89b99fc2eb598a55750bfc15f359404224fca9d7c1d17eaa,2025-02-18T01:15:09.210000 CVE-2025-25223,0,0,bd6e01d096e2fbe41ad1e7a30b709f67ef8f26d80bcbc350e8d8d94c925db1e4,2025-02-18T01:15:09.347000 CVE-2025-25224,0,0,f6ea7103489d2c148008b4b5252f4b169661463d18d39376b3abf700a4c96602,2025-02-18T01:15:09.473000 -CVE-2025-25241,0,0,685093741c4cbeb4c7e856690722e80ea121ecc2a87182689308551a55f65cb8,2025-02-11T06:15:24.120000 -CVE-2025-25243,0,0,899b55762ee14dd98936d3ff86efc1dbe88fe1088da4c8c1779e82f64331f15e,2025-02-11T06:15:24.330000 +CVE-2025-25241,0,1,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 +CVE-2025-25243,0,1,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-25281,0,0,167d81b42fb33b6f42e7962fec83a5221902600725fdaf7aff6080b6098df223,2025-02-13T22:15:13.263000 @@ -281494,6 +281505,7 @@ CVE-2025-25290,0,0,078fdc5e33afe2c4a38c199064e0140ffef88c9c06a22a120a13d1a72823c CVE-2025-25295,0,0,9304b327aa84ad0a6b5813eb481063f58dfc11525062cc326fa01528a59388c3,2025-02-14T17:15:20.230000 CVE-2025-25296,0,0,608cd76d7d764b74d80c1c4bfff13ca0380bfd78ca4bfaf90902e07d73a24a9a,2025-02-14T20:15:36.103000 CVE-2025-25297,0,0,0d275b3712a3a3d33cc2cdc3c558a7d071e515bf3e49f1dc29a4a93b576fa4d9,2025-02-14T20:15:36.627000 +CVE-2025-25300,1,1,6ed71645dd879570b1ddb41c2f5bd48adb630dd2a2e540b1955e0ba4307fa71e,2025-02-18T18:15:35.330000 CVE-2025-25304,0,0,faa0dc15a1534f91421e09ef7387795b56219ff6441c76442b60578f585efb63,2025-02-14T20:15:36.903000 CVE-2025-25343,0,0,209700127e109f6eaf7535ced2a5a67f22d1ec3dd91c12407f85d8d5702206ac,2025-02-12T19:15:22.003000 CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000 @@ -281514,7 +281526,7 @@ CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673 CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 -CVE-2025-25530,0,1,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 +CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 CVE-2025-25742,0,0,44a73b49255ee9adcf82a52f384eb5c222198ebf34b2a31793c5bb7b83755521,2025-02-12T17:15:24.150000 @@ -281522,18 +281534,19 @@ CVE-2025-25743,0,0,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000 CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000 -CVE-2025-25897,0,1,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 -CVE-2025-25898,0,0,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000 +CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 +CVE-2025-25898,0,1,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000 CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000 -CVE-2025-25990,0,1,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000 +CVE-2025-25990,0,0,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000 CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000 CVE-2025-25992,0,0,3d1e4e5fceffc298e311378ec712b3436e60db9d6c9a25f2ff71f3ddce497276,2025-02-14T19:15:14.633000 CVE-2025-25993,0,0,b265230a291556165ba6f150cab5c736bd9594a64a150461cb0009dc8129dba1,2025-02-14T19:15:14.763000 -CVE-2025-25994,0,1,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000 -CVE-2025-25997,0,1,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000 +CVE-2025-25994,0,0,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000 +CVE-2025-25997,0,0,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000 +CVE-2025-26058,1,1,b1b2d0ce5dedd9d74c5c234f41f1f0bc4341794c37a2689cfd8efecd7443516f,2025-02-18T18:15:35.653000 CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000 @@ -281542,8 +281555,8 @@ CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac60 CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 CVE-2025-26342,0,0,b9c179c4c2c79543faf6bbe728c26448212bf8696a8f38636b220aeadb4224b0,2025-02-12T14:15:33.990000 CVE-2025-26343,0,0,5c838610c13b64e30a1ec06552594589c568cb448bd4bd9770f91ac706661444,2025-02-12T14:15:34.130000 -CVE-2025-26344,0,0,1f0b2282290e2b15e2bbfeebfa60922eb47a8cb9b7917ae00d2ae277e831c35a,2025-02-12T15:15:18.757000 -CVE-2025-26345,0,0,27a494977bcdf1d4c3eb5e31e75c93211c21cfdc2b3aaeca41cc8ff74f7e1add,2025-02-12T15:15:18.930000 +CVE-2025-26344,0,1,4d4ba8af185b0275c8f9cf34cc0c2af14f0b225e71747a3846e23298d15deb92,2025-02-18T18:15:35.783000 +CVE-2025-26345,0,1,f3b0ea53360d97d4c4e353c7fd6cba7751d902fff6c313feb81d6b76114606b0,2025-02-18T18:15:35.940000 CVE-2025-26346,0,0,be21a62ce61f2d55e2ee1237c267ca5c40463dafd81220bdef97f257cccd1bc4,2025-02-12T14:15:34.547000 CVE-2025-26347,0,0,da5df29b91dc5eca83f7a6c3957a394103acb4ae7a841760c94a02881ddf6af6,2025-02-12T14:15:34.687000 CVE-2025-26348,0,0,58fb90d30dca3d8a4c20eaaf3cd36fd2293f4ce01fe3997d760c693d5e908d9b,2025-02-12T14:15:34.827000 @@ -281577,10 +281590,10 @@ CVE-2025-26375,0,0,84821ae2a61f085659b0e84453533efd90e26d2715dcaed43a63af4d901a9 CVE-2025-26376,0,0,ae206e68a42a4d679f54837497ae12a86feed61ce6edfe0c3c3976f9bfd49395,2025-02-12T14:15:38.777000 CVE-2025-26377,0,0,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000 CVE-2025-26378,0,0,e51dbad96406eb456158bdbf1d717d786489f18ecfbd56f380fadc61ce2f3d12,2025-02-12T14:15:39.163000 -CVE-2025-26408,0,0,ae2a3c2bc051e55463c57bba58bbfe21d8c3480154d8ebe716d6d877fc664d41,2025-02-11T15:15:21.377000 -CVE-2025-26409,0,0,36cbb1ccd85f25d0ea04c73edb60748e2e967491c3744699e60abf2a1839850e,2025-02-11T15:15:21.537000 -CVE-2025-26410,0,0,c4910aebaed5466fe3cbd0d1e033569082b454170751f65e4158626f7cfe7248,2025-02-11T15:15:21.700000 -CVE-2025-26411,0,0,b078ed9b1e32dfaacfb84cc4302841e5e62c2772c236372d3c486d7da2ef8c93,2025-02-11T15:15:21.847000 +CVE-2025-26408,0,1,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259ee6c,2025-02-18T18:15:36.097000 +CVE-2025-26409,0,1,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000 +CVE-2025-26410,0,1,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 +CVE-2025-26411,0,1,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000 CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000 @@ -281599,7 +281612,7 @@ CVE-2025-26523,0,0,167d4e5eb341df307a978429e54308c2f66bd92279a3ab3ead55f5415ee1e CVE-2025-26524,0,0,8fdc604b39b44cd3a4dccd87cb46f4ceb90ecb89cb62e553a8809eb05758dcf7,2025-02-14T12:15:29.887000 CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 -CVE-2025-26543,0,0,743dad0dd88a57034eaa8771218764f86d7996bf14c551af568bc6282593511d,2025-02-13T15:15:21.080000 +CVE-2025-26543,0,1,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000 CVE-2025-26545,0,0,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000 CVE-2025-26547,0,0,e08dcb76a1a156827a53523cfc389ec01817f240b8063496d38b458c276a6d4a,2025-02-13T14:16:20.347000 CVE-2025-26549,0,0,a91c3170bbcc373aaf39cde5374b44949bf89c60e7eb9052278e26cc0b4c7b8c,2025-02-13T14:16:20.663000 @@ -281620,6 +281633,7 @@ CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 +CVE-2025-26620,1,1,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000 CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000 CVE-2025-26754,0,0,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000 CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000