From d91cdfcbc5d2bc892bd7de03151698356866aa63 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 23 Feb 2025 03:03:59 +0000 Subject: [PATCH] Auto-Update: 2025-02-23T03:00:29.845877+00:00 --- CVE-2016/CVE-2016-16xx/CVE-2016-1646.json | 2 +- CVE-2017/CVE-2017-68xx/CVE-2017-6862.json | 2 +- CVE-2018/CVE-2018-174xx/CVE-2018-17480.json | 2 +- CVE-2019/CVE-2019-16xx/CVE-2019-1652.json | 2 +- CVE-2020/CVE-2020-128xx/CVE-2020-12812.json | 2 +- CVE-2021/CVE-2021-225xx/CVE-2021-22502.json | 2 +- CVE-2021/CVE-2021-225xx/CVE-2021-22506.json | 2 +- CVE-2021/CVE-2021-379xx/CVE-2021-37973.json | 2 +- CVE-2021/CVE-2021-41xx/CVE-2021-4102.json | 2 +- CVE-2021/CVE-2021-450xx/CVE-2021-45046.json | 2 +- CVE-2021/CVE-2021-466xx/CVE-2021-46686.json | 4 + CVE-2022/CVE-2022-13xx/CVE-2022-1364.json | 2 +- CVE-2022/CVE-2022-229xx/CVE-2022-22947.json | 2 +- CVE-2022/CVE-2022-260xx/CVE-2022-26083.json | 4 + CVE-2022/CVE-2022-286xx/CVE-2022-28693.json | 4 + CVE-2022/CVE-2022-30xx/CVE-2022-3075.json | 2 +- CVE-2022/CVE-2022-316xx/CVE-2022-31666.json | 2 +- CVE-2022/CVE-2022-37xx/CVE-2022-3723.json | 2 +- CVE-2022/CVE-2022-413xx/CVE-2022-41328.json | 2 +- CVE-2022/CVE-2022-424xx/CVE-2022-42475.json | 2 +- CVE-2023/CVE-2023-335xx/CVE-2023-33528.json | 2 +- CVE-2023/CVE-2023-344xx/CVE-2023-34401.json | 4 + CVE-2023/CVE-2023-344xx/CVE-2023-34403.json | 4 + CVE-2023/CVE-2023-344xx/CVE-2023-34404.json | 4 + CVE-2023/CVE-2023-344xx/CVE-2023-34406.json | 4 + CVE-2023/CVE-2023-368xx/CVE-2023-36844.json | 2 +- CVE-2023/CVE-2023-400xx/CVE-2023-40044.json | 2 +- CVE-2023/CVE-2023-42xx/CVE-2023-4211.json | 2 +- CVE-2023/CVE-2023-471xx/CVE-2023-47160.json | 4 + CVE-2023/CVE-2023-512xx/CVE-2023-51297.json | 4 + CVE-2023/CVE-2023-512xx/CVE-2023-51298.json | 2 +- CVE-2023/CVE-2023-513xx/CVE-2023-51302.json | 2 +- CVE-2023/CVE-2023-513xx/CVE-2023-51306.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51309.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51310.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51311.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51312.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51315.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51318.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51319.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51325.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51330.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51332.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51334.json | 4 + CVE-2023/CVE-2023-513xx/CVE-2023-51335.json | 4 + CVE-2023/CVE-2023-55xx/CVE-2023-5505.json | 2 +- CVE-2023/CVE-2023-68xx/CVE-2023-6806.json | 2 +- CVE-2023/CVE-2023-70xx/CVE-2023-7024.json | 2 +- CVE-2024/CVE-2024-104xx/CVE-2024-10404.json | 4 + CVE-2024/CVE-2024-104xx/CVE-2024-10405.json | 4 + CVE-2024/CVE-2024-105xx/CVE-2024-10581.json | 4 + CVE-2024/CVE-2024-113xx/CVE-2024-11335.json | 4 + CVE-2024/CVE-2024-115xx/CVE-2024-11582.json | 4 + CVE-2024/CVE-2024-117xx/CVE-2024-11753.json | 4 + CVE-2024/CVE-2024-117xx/CVE-2024-11778.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12054.json | 4 + CVE-2024/CVE-2024-120xx/CVE-2024-12069.json | 4 + CVE-2024/CVE-2024-122xx/CVE-2024-12231.json | 2 +- CVE-2024/CVE-2024-122xx/CVE-2024-12232.json | 2 +- CVE-2024/CVE-2024-122xx/CVE-2024-12284.json | 4 + CVE-2024/CVE-2024-123xx/CVE-2024-12339.json | 4 + CVE-2024/CVE-2024-123xx/CVE-2024-12356.json | 2 +- CVE-2024/CVE-2024-125xx/CVE-2024-12522.json | 4 + CVE-2024/CVE-2024-125xx/CVE-2024-12525.json | 4 + CVE-2024/CVE-2024-125xx/CVE-2024-12562.json | 4 + CVE-2024/CVE-2024-126xx/CVE-2024-12651.json | 4 + CVE-2024/CVE-2024-127xx/CVE-2024-12790.json | 2 +- CVE-2024/CVE-2024-128xx/CVE-2024-12813.json | 4 + CVE-2024/CVE-2024-129xx/CVE-2024-12938.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12940.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12942.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12959.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12960.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12981.json | 2 +- CVE-2024/CVE-2024-129xx/CVE-2024-12998.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13004.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13005.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13006.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13007.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13008.json | 2 +- CVE-2024/CVE-2024-130xx/CVE-2024-13024.json | 2 +- CVE-2024/CVE-2024-131xx/CVE-2024-13152.json | 4 + CVE-2024/CVE-2024-131xx/CVE-2024-13155.json | 4 + CVE-2024/CVE-2024-132xx/CVE-2024-13231.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13336.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13339.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13363.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13364.json | 4 + CVE-2024/CVE-2024-133xx/CVE-2024-13390.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13405.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13439.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13443.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13445.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13462.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13464.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13468.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13476.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13478.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13479.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13481.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13483.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13485.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13488.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13489.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13491.json | 4 + CVE-2024/CVE-2024-134xx/CVE-2024-13493.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13500.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13501.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13508.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13513.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13520.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13522.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13525.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13533.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13534.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13535.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13538.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13540.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13555.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13563.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13565.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13573.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13576.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13589.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13591.json | 4 + CVE-2024/CVE-2024-135xx/CVE-2024-13592.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13641.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13657.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13660.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13663.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13674.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13676.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13679.json | 4 + CVE-2024/CVE-2024-136xx/CVE-2024-13689.json | 6 +- CVE-2024/CVE-2024-136xx/CVE-2024-13692.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13711.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13712.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13719.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13735.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13736.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13740.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13741.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13743.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13748.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13752.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13753.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13789.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13791.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13792.json | 4 + CVE-2024/CVE-2024-137xx/CVE-2024-13799.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13802.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13834.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13849.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13854.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13855.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13879.json | 4 + CVE-2024/CVE-2024-138xx/CVE-2024-13888.json | 4 + CVE-2024/CVE-2024-15xx/CVE-2024-1501.json | 2 +- CVE-2024/CVE-2024-216xx/CVE-2024-21609.json | 2 +- CVE-2024/CVE-2024-216xx/CVE-2024-21610.json | 2 +- CVE-2024/CVE-2024-222xx/CVE-2024-22244.json | 2 +- CVE-2024/CVE-2024-222xx/CVE-2024-22252.json | 2 +- CVE-2024/CVE-2024-222xx/CVE-2024-22261.json | 2 +- CVE-2024/CVE-2024-222xx/CVE-2024-22273.json | 2 +- CVE-2024/CVE-2024-22xx/CVE-2024-2240.json | 4 + CVE-2024/CVE-2024-23xx/CVE-2024-2333.json | 2 +- CVE-2024/CVE-2024-23xx/CVE-2024-2351.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2424.json | 2 +- CVE-2024/CVE-2024-250xx/CVE-2024-25066.json | 4 + CVE-2024/CVE-2024-255xx/CVE-2024-25574.json | 2 +- CVE-2024/CVE-2024-284xx/CVE-2024-28456.json | 2 +- CVE-2024/CVE-2024-287xx/CVE-2024-28776.json | 4 + CVE-2024/CVE-2024-287xx/CVE-2024-28777.json | 4 + CVE-2024/CVE-2024-287xx/CVE-2024-28780.json | 4 + CVE-2024/CVE-2024-29xx/CVE-2024-2999.json | 2 +- CVE-2024/CVE-2024-303xx/CVE-2024-30378.json | 2 +- CVE-2024/CVE-2024-303xx/CVE-2024-30391.json | 2 +- CVE-2024/CVE-2024-304xx/CVE-2024-30405.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3002.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3003.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3004.json | 2 +- CVE-2024/CVE-2024-30xx/CVE-2024-3039.json | 2 +- CVE-2024/CVE-2024-32xx/CVE-2024-3220.json | 4 + CVE-2024/CVE-2024-32xx/CVE-2024-3226.json | 2 +- CVE-2024/CVE-2024-33xx/CVE-2024-3369.json | 2 +- CVE-2024/CVE-2024-34xx/CVE-2024-3493.json | 2 +- CVE-2024/CVE-2024-352xx/CVE-2024-35225.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37359.json | 4 + CVE-2024/CVE-2024-373xx/CVE-2024-37360.json | 4 + CVE-2024/CVE-2024-373xx/CVE-2024-37362.json | 4 + CVE-2024/CVE-2024-373xx/CVE-2024-37363.json | 4 + CVE-2024/CVE-2024-373xx/CVE-2024-37365.json | 2 +- CVE-2024/CVE-2024-376xx/CVE-2024-37600.json | 4 + CVE-2024/CVE-2024-376xx/CVE-2024-37602.json | 4 + CVE-2024/CVE-2024-383xx/CVE-2024-38317.json | 4 +- CVE-2024/CVE-2024-383xx/CVE-2024-38318.json | 4 +- CVE-2024/CVE-2024-388xx/CVE-2024-38810.json | 2 +- CVE-2024/CVE-2024-393xx/CVE-2024-39327.json | 6 +- CVE-2024/CVE-2024-393xx/CVE-2024-39328.json | 4 + CVE-2024/CVE-2024-395xx/CVE-2024-39518.json | 2 +- CVE-2024/CVE-2024-395xx/CVE-2024-39539.json | 2 +- CVE-2024/CVE-2024-395xx/CVE-2024-39540.json | 2 +- CVE-2024/CVE-2024-395xx/CVE-2024-39550.json | 2 +- CVE-2024/CVE-2024-395xx/CVE-2024-39561.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40700.json | 4 +- CVE-2024/CVE-2024-40xx/CVE-2024-4028.json | 6 +- CVE-2024/CVE-2024-40xx/CVE-2024-4069.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4070.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4074.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4075.json | 2 +- CVE-2024/CVE-2024-42xx/CVE-2024-4282.json | 4 + CVE-2024/CVE-2024-431xx/CVE-2024-43187.json | 4 +- CVE-2024/CVE-2024-431xx/CVE-2024-43196.json | 4 + CVE-2024/CVE-2024-440xx/CVE-2024-44044.json | 4 + CVE-2024/CVE-2024-450xx/CVE-2024-45081.json | 4 + CVE-2024/CVE-2024-450xx/CVE-2024-45084.json | 4 + CVE-2024/CVE-2024-453xx/CVE-2024-45320.json | 4 + CVE-2024/CVE-2024-456xx/CVE-2024-45657.json | 4 +- CVE-2024/CVE-2024-456xx/CVE-2024-45658.json | 4 +- CVE-2024/CVE-2024-457xx/CVE-2024-45774.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45775.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45776.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45777.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45781.json | 4 + CVE-2024/CVE-2024-457xx/CVE-2024-45783.json | 4 + CVE-2024/CVE-2024-469xx/CVE-2024-46933.json | 4 + CVE-2024/CVE-2024-479xx/CVE-2024-47935.json | 4 + CVE-2024/CVE-2024-493xx/CVE-2024-49337.json | 4 + CVE-2024/CVE-2024-493xx/CVE-2024-49344.json | 4 + CVE-2024/CVE-2024-493xx/CVE-2024-49348.json | 4 +- CVE-2024/CVE-2024-493xx/CVE-2024-49352.json | 4 +- CVE-2024/CVE-2024-493xx/CVE-2024-49355.json | 4 + CVE-2024/CVE-2024-495xx/CVE-2024-49589.json | 4 + CVE-2024/CVE-2024-497xx/CVE-2024-49779.json | 4 + CVE-2024/CVE-2024-497xx/CVE-2024-49780.json | 4 + CVE-2024/CVE-2024-497xx/CVE-2024-49781.json | 4 + CVE-2024/CVE-2024-497xx/CVE-2024-49782.json | 4 + CVE-2024/CVE-2024-497xx/CVE-2024-49791.json | 2 +- CVE-2024/CVE-2024-497xx/CVE-2024-49792.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49793.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49794.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49795.json | 2 +- CVE-2024/CVE-2024-497xx/CVE-2024-49796.json | 2 +- CVE-2024/CVE-2024-497xx/CVE-2024-49797.json | 4 +- CVE-2024/CVE-2024-497xx/CVE-2024-49798.json | 4 +- CVE-2024/CVE-2024-498xx/CVE-2024-49814.json | 4 +- CVE-2024/CVE-2024-49xx/CVE-2024-4923.json | 2 +- CVE-2024/CVE-2024-50xx/CVE-2024-5048.json | 2 +- CVE-2024/CVE-2024-50xx/CVE-2024-5049.json | 2 +- CVE-2024/CVE-2024-514xx/CVE-2024-51450.json | 4 +- CVE-2024/CVE-2024-515xx/CVE-2024-51505.json | 6 +- CVE-2024/CVE-2024-515xx/CVE-2024-51547.json | 2 +- CVE-2024/CVE-2024-523xx/CVE-2024-52364.json | 4 +- CVE-2024/CVE-2024-523xx/CVE-2024-52365.json | 4 +- CVE-2024/CVE-2024-525xx/CVE-2024-52500.json | 4 + CVE-2024/CVE-2024-525xx/CVE-2024-52541.json | 4 + CVE-2024/CVE-2024-525xx/CVE-2024-52577.json | 4 + CVE-2024/CVE-2024-528xx/CVE-2024-52892.json | 4 +- CVE-2024/CVE-2024-528xx/CVE-2024-52895.json | 4 + CVE-2024/CVE-2024-529xx/CVE-2024-52902.json | 4 + CVE-2024/CVE-2024-52xx/CVE-2024-5288.json | 2 +- CVE-2024/CVE-2024-533xx/CVE-2024-53309.json | 4 + CVE-2024/CVE-2024-533xx/CVE-2024-53310.json | 4 + CVE-2024/CVE-2024-533xx/CVE-2024-53311.json | 4 + CVE-2024/CVE-2024-539xx/CVE-2024-53974.json | 4 + CVE-2024/CVE-2024-541xx/CVE-2024-54171.json | 4 +- CVE-2024/CVE-2024-541xx/CVE-2024-54176.json | 4 +- CVE-2024/CVE-2024-549xx/CVE-2024-54951.json | 4 + CVE-2024/CVE-2024-549xx/CVE-2024-54960.json | 4 + CVE-2024/CVE-2024-549xx/CVE-2024-54961.json | 4 + CVE-2024/CVE-2024-54xx/CVE-2024-5461.json | 4 + CVE-2024/CVE-2024-54xx/CVE-2024-5462.json | 4 + CVE-2024/CVE-2024-554xx/CVE-2024-55457.json | 4 + CVE-2024/CVE-2024-559xx/CVE-2024-55904.json | 4 + CVE-2024/CVE-2024-560xx/CVE-2024-56000.json | 4 + CVE-2024/CVE-2024-561xx/CVE-2024-56171.json | 4 + CVE-2024/CVE-2024-564xx/CVE-2024-56463.json | 4 + CVE-2024/CVE-2024-564xx/CVE-2024-56467.json | 4 +- CVE-2024/CVE-2024-564xx/CVE-2024-56470.json | 4 +- CVE-2024/CVE-2024-564xx/CVE-2024-56471.json | 4 +- CVE-2024/CVE-2024-564xx/CVE-2024-56472.json | 4 +- CVE-2024/CVE-2024-564xx/CVE-2024-56473.json | 4 +- CVE-2024/CVE-2024-564xx/CVE-2024-56477.json | 4 + CVE-2024/CVE-2024-569xx/CVE-2024-56908.json | 4 + CVE-2024/CVE-2024-569xx/CVE-2024-56973.json | 4 + CVE-2024/CVE-2024-56xx/CVE-2024-5659.json | 2 +- CVE-2024/CVE-2024-570xx/CVE-2024-57056.json | 4 + CVE-2024/CVE-2024-571xx/CVE-2024-57162.json | 2 +- CVE-2024/CVE-2024-572xx/CVE-2024-57254.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57255.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57256.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57257.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57258.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57259.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57261.json | 4 + CVE-2024/CVE-2024-572xx/CVE-2024-57262.json | 4 + CVE-2024/CVE-2024-576xx/CVE-2024-57668.json | 2 +- CVE-2024/CVE-2024-577xx/CVE-2024-57782.json | 4 + CVE-2024/CVE-2024-577xx/CVE-2024-57790.json | 4 + CVE-2024/CVE-2024-579xx/CVE-2024-57963.json | 4 + CVE-2024/CVE-2024-579xx/CVE-2024-57964.json | 4 + CVE-2024/CVE-2024-579xx/CVE-2024-57969.json | 4 + CVE-2024/CVE-2024-579xx/CVE-2024-57971.json | 4 + CVE-2024/CVE-2024-57xx/CVE-2024-5705.json | 4 + CVE-2024/CVE-2024-57xx/CVE-2024-5706.json | 4 + CVE-2024/CVE-2024-64xx/CVE-2024-6432.json | 4 + CVE-2024/CVE-2024-66xx/CVE-2024-6653.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6696.json | 4 + CVE-2024/CVE-2024-66xx/CVE-2024-6697.json | 4 + CVE-2024/CVE-2024-70xx/CVE-2024-7052.json | 4 + CVE-2024/CVE-2024-71xx/CVE-2024-7141.json | 4 + CVE-2024/CVE-2024-78xx/CVE-2024-7810.json | 2 +- CVE-2024/CVE-2024-79xx/CVE-2024-7986.json | 2 +- CVE-2024/CVE-2024-86xx/CVE-2024-8626.json | 2 +- CVE-2024/CVE-2024-88xx/CVE-2024-8893.json | 4 + CVE-2024/CVE-2024-96xx/CVE-2024-9601.json | 4 + CVE-2025/CVE-2025-00xx/CVE-2025-0001.json | 4 + CVE-2025/CVE-2025-01xx/CVE-2025-0109.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0112.json | 4 + CVE-2025/CVE-2025-01xx/CVE-2025-0158.json | 4 +- CVE-2025/CVE-2025-01xx/CVE-2025-0161.json | 4 + CVE-2025/CVE-2025-01xx/CVE-2025-0168.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0174.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0175.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0178.json | 4 + CVE-2025/CVE-2025-01xx/CVE-2025-0195.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0196.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0197.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0198.json | 2 +- CVE-2025/CVE-2025-01xx/CVE-2025-0199.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0200.json | 2 +- CVE-2025/CVE-2025-02xx/CVE-2025-0201.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0301.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0335.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0336.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0339.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0340.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0346.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0347.json | 2 +- CVE-2025/CVE-2025-03xx/CVE-2025-0352.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0422.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0423.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0424.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0425.json | 4 + CVE-2025/CVE-2025-04xx/CVE-2025-0484.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0485.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0486.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0487.json | 2 +- CVE-2025/CVE-2025-04xx/CVE-2025-0491.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0503.json | 4 + CVE-2025/CVE-2025-05xx/CVE-2025-0527.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0529.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0530.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0531.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0536.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0541.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0562.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0563.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0564.json | 2 +- CVE-2025/CVE-2025-05xx/CVE-2025-0591.json | 4 + CVE-2025/CVE-2025-05xx/CVE-2025-0592.json | 4 + CVE-2025/CVE-2025-05xx/CVE-2025-0593.json | 4 + CVE-2025/CVE-2025-06xx/CVE-2025-0622.json | 4 + CVE-2025/CVE-2025-06xx/CVE-2025-0624.json | 4 + CVE-2025/CVE-2025-06xx/CVE-2025-0633.json | 4 + CVE-2025/CVE-2025-06xx/CVE-2025-0677.json | 4 + CVE-2025/CVE-2025-07xx/CVE-2025-0721.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0722.json | 2 +- CVE-2025/CVE-2025-07xx/CVE-2025-0799.json | 4 +- CVE-2025/CVE-2025-08xx/CVE-2025-0821.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0822.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0842.json | 2 +- CVE-2025/CVE-2025-08xx/CVE-2025-0865.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0866.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0867.json | 6 +- CVE-2025/CVE-2025-08xx/CVE-2025-0868.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0880.json | 2 +- CVE-2025/CVE-2025-08xx/CVE-2025-0882.json | 2 +- CVE-2025/CVE-2025-08xx/CVE-2025-0893.json | 4 + CVE-2025/CVE-2025-08xx/CVE-2025-0897.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0916.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0924.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0935.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0967.json | 2 +- CVE-2025/CVE-2025-09xx/CVE-2025-0968.json | 4 + CVE-2025/CVE-2025-09xx/CVE-2025-0999.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1001.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1005.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1006.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1007.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1024.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1035.json | 6 +- CVE-2025/CVE-2025-10xx/CVE-2025-1039.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1043.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1053.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1064.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1065.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1071.json | 4 + CVE-2025/CVE-2025-10xx/CVE-2025-1075.json | 4 + CVE-2025/CVE-2025-11xx/CVE-2025-1118.json | 4 + CVE-2025/CVE-2025-11xx/CVE-2025-1132.json | 4 + CVE-2025/CVE-2025-11xx/CVE-2025-1133.json | 4 + CVE-2025/CVE-2025-11xx/CVE-2025-1134.json | 4 + CVE-2025/CVE-2025-11xx/CVE-2025-1135.json | 4 + CVE-2025/CVE-2025-11xx/CVE-2025-1160.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1169.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1170.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1171.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1172.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1173.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1174.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1183.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1188.json | 2 +- CVE-2025/CVE-2025-11xx/CVE-2025-1197.json | 2 +- CVE-2025/CVE-2025-12xx/CVE-2025-1222.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1223.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1239.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1265.json | 4 + CVE-2025/CVE-2025-12xx/CVE-2025-1269.json | 6 +- CVE-2025/CVE-2025-12xx/CVE-2025-1293.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1302.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1328.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1332.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1335.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1336.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1337.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1338.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1339.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1340.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1341.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1352.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1353.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1354.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1355.json | 6 +- CVE-2025/CVE-2025-13xx/CVE-2025-1356.json | 6 +- CVE-2025/CVE-2025-13xx/CVE-2025-1357.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1359.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1360.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1364.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1365.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1366.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1372.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1373.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1374.json | 6 +- CVE-2025/CVE-2025-13xx/CVE-2025-1376.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1377.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1378.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1387.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1388.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1389.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1390.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1391.json | 4 + CVE-2025/CVE-2025-13xx/CVE-2025-1392.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1414.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1426.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1441.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1447.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1448.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1464.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1465.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1483.json | 4 + CVE-2025/CVE-2025-14xx/CVE-2025-1492.json | 4 + CVE-2025/CVE-2025-200xx/CVE-2025-20059.json | 4 + CVE-2025/CVE-2025-200xx/CVE-2025-20075.json | 4 + CVE-2025/CVE-2025-201xx/CVE-2025-20153.json | 4 + CVE-2025/CVE-2025-201xx/CVE-2025-20158.json | 4 + CVE-2025/CVE-2025-202xx/CVE-2025-20211.json | 4 + CVE-2025/CVE-2025-211xx/CVE-2025-21103.json | 4 + CVE-2025/CVE-2025-211xx/CVE-2025-21105.json | 4 + CVE-2025/CVE-2025-211xx/CVE-2025-21106.json | 4 + CVE-2025/CVE-2025-211xx/CVE-2025-21155.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21156.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21159.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21160.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21161.json | 2 +- CVE-2025/CVE-2025-211xx/CVE-2025-21163.json | 2 +- CVE-2025/CVE-2025-213xx/CVE-2025-21325.json | 2 +- CVE-2025/CVE-2025-213xx/CVE-2025-21355.json | 4 + CVE-2025/CVE-2025-216xx/CVE-2025-21608.json | 4 + CVE-2025/CVE-2025-217xx/CVE-2025-21702.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22207.json | 6 +- CVE-2025/CVE-2025-222xx/CVE-2025-22284.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22286.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22289.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22290.json | 4 + CVE-2025/CVE-2025-222xx/CVE-2025-22291.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22622.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22630.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22639.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22645.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22650.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22654.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22656.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22657.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22663.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22676.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22680.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22689.json | 4 + CVE-2025/CVE-2025-226xx/CVE-2025-22698.json | 4 + CVE-2025/CVE-2025-227xx/CVE-2025-22702.json | 4 + CVE-2025/CVE-2025-227xx/CVE-2025-22705.json | 4 + CVE-2025/CVE-2025-228xx/CVE-2025-22888.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22960.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22961.json | 4 + CVE-2025/CVE-2025-229xx/CVE-2025-22962.json | 4 + CVE-2025/CVE-2025-230xx/CVE-2025-23020.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23406.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23428.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23431.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23474.json | 4 + CVE-2025/CVE-2025-234xx/CVE-2025-23492.json | 4 + CVE-2025/CVE-2025-235xx/CVE-2025-23523.json | 4 + CVE-2025/CVE-2025-235xx/CVE-2025-23525.json | 4 + CVE-2025/CVE-2025-235xx/CVE-2025-23534.json | 4 + CVE-2025/CVE-2025-235xx/CVE-2025-23568.json | 4 + CVE-2025/CVE-2025-235xx/CVE-2025-23571.json | 4 + CVE-2025/CVE-2025-235xx/CVE-2025-23598.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23646.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23647.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23648.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23650.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23651.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23652.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23653.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23655.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23657.json | 4 + CVE-2025/CVE-2025-236xx/CVE-2025-23658.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23742.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23748.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23750.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23751.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23766.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23771.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23786.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23787.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23788.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23789.json | 4 + CVE-2025/CVE-2025-237xx/CVE-2025-23790.json | 4 + CVE-2025/CVE-2025-238xx/CVE-2025-23840.json | 4 + CVE-2025/CVE-2025-238xx/CVE-2025-23845.json | 4 + CVE-2025/CVE-2025-238xx/CVE-2025-23851.json | 4 + CVE-2025/CVE-2025-238xx/CVE-2025-23853.json | 4 + CVE-2025/CVE-2025-238xx/CVE-2025-23857.json | 4 + CVE-2025/CVE-2025-239xx/CVE-2025-23905.json | 4 + CVE-2025/CVE-2025-239xx/CVE-2025-23975.json | 4 + CVE-2025/CVE-2025-244xx/CVE-2025-24406.json | 2 +- CVE-2025/CVE-2025-245xx/CVE-2025-24554.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24558.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24564.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24565.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24566.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24567.json | 4 + CVE-2025/CVE-2025-245xx/CVE-2025-24592.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24607.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24614.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24615.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24616.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24617.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24641.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24688.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24692.json | 4 + CVE-2025/CVE-2025-246xx/CVE-2025-24699.json | 4 + CVE-2025/CVE-2025-247xx/CVE-2025-24700.json | 4 + CVE-2025/CVE-2025-248xx/CVE-2025-24806.json | 4 + CVE-2025/CVE-2025-248xx/CVE-2025-24841.json | 4 + CVE-2025/CVE-2025-248xx/CVE-2025-24893.json | 4 + CVE-2025/CVE-2025-248xx/CVE-2025-24894.json | 4 + CVE-2025/CVE-2025-248xx/CVE-2025-24895.json | 4 + CVE-2025/CVE-2025-249xx/CVE-2025-24928.json | 4 + CVE-2025/CVE-2025-249xx/CVE-2025-24946.json | 4 + CVE-2025/CVE-2025-249xx/CVE-2025-24947.json | 4 + CVE-2025/CVE-2025-249xx/CVE-2025-24965.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25054.json | 4 + CVE-2025/CVE-2025-250xx/CVE-2025-25055.json | 4 + CVE-2025/CVE-2025-251xx/CVE-2025-25196.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25204.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25206.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25221.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25222.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25223.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25224.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25284.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25285.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25288.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25289.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25290.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25295.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25296.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25297.json | 4 + CVE-2025/CVE-2025-252xx/CVE-2025-25299.json | 4 + CVE-2025/CVE-2025-253xx/CVE-2025-25300.json | 4 + CVE-2025/CVE-2025-253xx/CVE-2025-25304.json | 4 + CVE-2025/CVE-2025-253xx/CVE-2025-25305.json | 4 + CVE-2025/CVE-2025-253xx/CVE-2025-25388.json | 4 + CVE-2025/CVE-2025-256xx/CVE-2025-25679.json | 4 + CVE-2025/CVE-2025-257xx/CVE-2025-25740.json | 4 + CVE-2025/CVE-2025-257xx/CVE-2025-25745.json | 4 + CVE-2025/CVE-2025-258xx/CVE-2025-25899.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25968.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25973.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25988.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25991.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25992.json | 4 + CVE-2025/CVE-2025-259xx/CVE-2025-25993.json | 4 + CVE-2025/CVE-2025-261xx/CVE-2025-26156.json | 4 + CVE-2025/CVE-2025-261xx/CVE-2025-26157.json | 4 + CVE-2025/CVE-2025-261xx/CVE-2025-26158.json | 4 + CVE-2025/CVE-2025-263xx/CVE-2025-26306.json | 4 + CVE-2025/CVE-2025-263xx/CVE-2025-26308.json | 4 + CVE-2025/CVE-2025-263xx/CVE-2025-26311.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26506.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26507.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26508.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26519.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26522.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26523.json | 4 + CVE-2025/CVE-2025-265xx/CVE-2025-26524.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26603.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26604.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26605.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26606.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26607.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26608.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26609.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26610.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26611.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26612.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26613.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26614.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26615.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26616.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26617.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26618.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26620.json | 6 +- CVE-2025/CVE-2025-266xx/CVE-2025-26623.json | 4 + CVE-2025/CVE-2025-266xx/CVE-2025-26624.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26700.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26754.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26755.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26758.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26759.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26761.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26765.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26766.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26767.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26768.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26769.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26770.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26771.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26772.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26773.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26775.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26778.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26779.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26788.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26789.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26791.json | 4 + CVE-2025/CVE-2025-267xx/CVE-2025-26793.json | 4 + CVE-2025/CVE-2025-268xx/CVE-2025-26819.json | 4 + CVE-2025/CVE-2025-268xx/CVE-2025-26856.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27013.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27016.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27089.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27090.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27091.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27092.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27096.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27097.json | 4 + CVE-2025/CVE-2025-270xx/CVE-2025-27098.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27100.json | 4 + CVE-2025/CVE-2025-271xx/CVE-2025-27113.json | 4 + CVE-2025/CVE-2025-272xx/CVE-2025-27218.json | 4 + README.md | 35 +- _state.csv | 1348 +++++++++---------- 674 files changed, 2903 insertions(+), 896 deletions(-) diff --git a/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json b/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json index 9c8e355cc7f..f20c36f9098 100644 --- a/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json +++ b/CVE-2016/CVE-2016-16xx/CVE-2016-1646.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2016-03-29T10:59:00.160", "lastModified": "2025-01-29T18:15:26.670", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json b/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json index d95116a696a..330a3973a7b 100644 --- a/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json +++ b/CVE-2017/CVE-2017-68xx/CVE-2017-6862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "a2826606-91e7-4eb6-899e-8484bd4575d5", "published": "2017-05-26T20:29:00.177", "lastModified": "2025-02-07T14:15:43.297", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json index 4074f8dfa18..a65ff652cb6 100644 --- a/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json +++ b/CVE-2018/CVE-2018-174xx/CVE-2018-17480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2018-12-11T16:29:00.623", "lastModified": "2025-01-29T18:15:30.320", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json b/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json index 91148ba21eb..f0ea1c39a65 100644 --- a/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json +++ b/CVE-2019/CVE-2019-16xx/CVE-2019-1652.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2019-01-24T15:29:00.953", "lastModified": "2024-11-21T04:37:01.077", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json b/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json index 97d8afa4b59..773a07611d4 100644 --- a/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json +++ b/CVE-2020/CVE-2020-128xx/CVE-2020-12812.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2020-07-24T23:15:12.003", "lastModified": "2025-02-04T20:15:36.260", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json index 5cd2578d463..a6ba77f7c1c 100644 --- a/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22502.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2021-02-08T22:15:12.527", "lastModified": "2025-02-06T21:15:16.477", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22506.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22506.json index e5fc143b249..cb5bd3ef606 100644 --- a/CVE-2021/CVE-2021-225xx/CVE-2021-22506.json +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2021-03-26T14:15:11.967", "lastModified": "2025-02-06T21:15:16.713", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json index c7c7f11f36f..96bc72d16af 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-10-08T22:15:08.287", "lastModified": "2025-02-03T14:15:32.667", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4102.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4102.json index 3d6856de107..6ff254ce14d 100644 --- a/CVE-2021/CVE-2021-41xx/CVE-2021-4102.json +++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4102.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-02-11T23:15:08.273", "lastModified": "2025-01-29T17:15:15.653", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json index 501bf6905b9..a16a09f46e5 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2021-12-14T19:15:07.733", "lastModified": "2025-02-04T20:15:45.010", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-466xx/CVE-2021-46686.json b/CVE-2021/CVE-2021-466xx/CVE-2021-46686.json index efe34cde106..fc856416a50 100644 --- a/CVE-2021/CVE-2021-466xx/CVE-2021-46686.json +++ b/CVE-2021/CVE-2021-466xx/CVE-2021-46686.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in acmailer CGI ver.4.0.3 and earlier and acmailer DB ver.1.1.5 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker." + }, + { + "lang": "es", + "value": "Existe una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un problema de comando OS ('inyecci\u00f3n de comandos de os') en ACMailer CGI ver.4.0.3 y antes y Acmailer DB Ver.1.1.5 y anterior. Si se explota esta vulnerabilidad, un atacante puede ejecutar un comando arbitrario del sistema operativo." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-13xx/CVE-2022-1364.json b/CVE-2022/CVE-2022-13xx/CVE-2022-1364.json index 563f6ca947b..6cac77e6e8f 100644 --- a/CVE-2022/CVE-2022-13xx/CVE-2022-1364.json +++ b/CVE-2022/CVE-2022-13xx/CVE-2022-1364.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-07-26T22:15:09.147", "lastModified": "2025-01-29T17:15:15.880", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22947.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22947.json index 61c4da4d227..24689375e91 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22947.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2022-03-03T22:15:08.673", "lastModified": "2025-01-29T18:15:43.473", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-260xx/CVE-2022-26083.json b/CVE-2022/CVE-2022-260xx/CVE-2022-26083.json index 71a2735bd4f..496900591f8 100644 --- a/CVE-2022/CVE-2022-260xx/CVE-2022-26083.json +++ b/CVE-2022/CVE-2022-260xx/CVE-2022-26083.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La generaci\u00f3n de un vector de inicializaci\u00f3n d\u00e9bil en una librer\u00eda de software de criptograf\u00eda Intel(R) IPP anterior a la versi\u00f3n 2021.5 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28693.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28693.json index 6f877133683..6e88377e4ba 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28693.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28693.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La predicci\u00f3n del objetivo de la rama de retorno del canal alternativo no protegido en algunos procesadores Intel\u00ae puede permitir que un usuario autorizado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json index 1ee650e78dc..f9faa32ff21 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:13.463", "lastModified": "2025-02-03T14:15:33.320", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json index e3867dc187b..f675da34d6f 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31666.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-11-14T12:15:16.083", "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json index 1d8b4a87287..33b518cd209 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-01T23:15:19.710", "lastModified": "2025-02-03T14:15:33.637", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json index 7eee9458448..2a83015e9cc 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41328.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2023-03-07T17:15:12.093", "lastModified": "2024-11-21T07:23:03.750", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json index bc83ff57234..f21dd708833 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42475.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@fortinet.com", "published": "2023-01-02T09:15:09.490", "lastModified": "2024-11-21T07:25:02.680", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json index 04b2caad1cb..c2bb978e333 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33528.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.070", "lastModified": "2024-11-21T08:05:40.480", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json index 4f95b600026..3c31a3b8139 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside profile folder there is a file, which is encoded with proprietary UD2 codec. Due to missed size checks in the enapsulate file, attacker can achieve Out-of-Bound Read in heap memory." + }, + { + "lang": "es", + "value": "La unidad principal NTG6 de Mercedes-Benz contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Dentro de la carpeta de perfil hay un archivo codificado con el c\u00f3dec propietario UD2. Debido a que no se realizan comprobaciones de tama\u00f1o en el archivo encapsulado, el atacante puede lograr una lectura fuera de los l\u00edmites en la memoria del mont\u00f3n." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json index ce0d7270fca..a83b46d48a4 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34403.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof \u201cUserData\u201d with desirable file path and access it though backup on USB." + }, + { + "lang": "es", + "value": "La unidad principal NTG6 de Mercedes-Benz tiene pines Ethernet en la placa base para conectar el m\u00f3dulo CSB. Un atacante puede conectarse a estos pines y obtener acceso a la red interna. Se puede adquirir una condici\u00f3n de ejecuci\u00f3n y el atacante puede falsificar \u201cUserData\u201d con la ruta de archivo deseada y acceder a ella a trav\u00e9s de una copia de seguridad en USB." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json index 93907861b54..d34f6bc7a3a 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34404.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to these pins and get access to internal network. As a result, by accessing a specific port an attacker can send call request to all registered services in router and achieve command injection vulnerability." + }, + { + "lang": "es", + "value": "La unidad principal NTG6 de Mercedes-Benz tiene pines Ethernet en la placa base para conectar el m\u00f3dulo CSB. Un atacante puede conectarse a estos pines y obtener acceso a la red interna. Como resultado, al acceder a un puerto espec\u00edfico, un atacante puede enviar una solicitud de llamada a todos los servicios registrados en el enrutador y lograr una vulnerabilidad de inyecci\u00f3n de comandos." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json index 963ff64bddd..008de762265 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34406.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered on Mercedes Benz NTG 6. A possible integer overflow exists in the user data import/export function of NTG (New Telematics Generation) 6 head units. To perform this attack, local access to USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Mercedes Benz NTG 6. Existe un posible desbordamiento de n\u00fameros enteros en la funci\u00f3n de importaci\u00f3n/exportaci\u00f3n de datos de usuario de las unidades principales NTG (Nueva Generaci\u00f3n Telem\u00e1tica) 6. Para realizar este ataque, se necesita acceso local a la interfaz USB del autom\u00f3vil. Con los datos preparados, un atacante puede provocar que el servicio de datos de usuario falle. La instancia de servicio fallida se reiniciar\u00e1 autom\u00e1ticamente." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json index 8d1d092e466..0d54bb3e1ae 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36844.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.267", "lastModified": "2025-02-13T17:16:43.377", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json index 0cc56f8866b..b75f5374300 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@progress.com", "published": "2023-09-27T15:18:57.307", "lastModified": "2025-02-13T17:17:00.470", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json index 23d85cb88b3..c21f83ce97f 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json @@ -3,7 +3,7 @@ "sourceIdentifier": "arm-security@arm.com", "published": "2023-10-01T18:15:09.927", "lastModified": "2025-02-04T15:15:17.480", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47160.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47160.json index a15a40d01a6..7aac23571cd 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47160.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47160.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\n\n\nis vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 son vulnerables a un ataque de inyecci\u00f3n de entidad externa XML (XXE) al procesar datos XML. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para exponer informaci\u00f3n confidencial o consumir recursos de memoria." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json index f1e0009254f..b65f0ddb910 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51297.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json index bbe824b4799..f0433403c34 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "PHPJabbers Event Booking Calendar v4.0 es afectado por una la vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en Opciones del sistema que se utiliza para construir el archivo CSV." + "value": "PHPJabbers Event Booking Calendar v4.0 es afectado por una vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json index 0b96ad9ed90..8a4d9bfe93f 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json @@ -12,7 +12,7 @@ }, { "lang": "es", - "value": "PHPJabbers Hotel Booking System v4.0 es afectado por una la vulnerabilidad de inyecci\u00f3n de CSV, lo que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV." + "value": "PHPJabbers Hotel Booking System v4.0 es afectado por una vulnerabilidad de inyecci\u00f3n de CSV, lo que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json index 9c06c859214..5c3f3ce3526 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, title\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Event Ticketing System v1.0 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"nombre, t\u00edtulo\"." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json index 38a22ca60dd..a9cd39df317 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n 'Email Settings' de PHPJabbers Car Park Booking System v3.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json index c0d90f98425..d4e6efe6b4d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en las funciones 'Forgot Password', 'Email Settings' de PHPJabbers Car Park Booking System v3.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json index 037912b2068..0e89175afb8 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + }, + { + "lang": "es", + "value": "PHPJabbers Car Park Booking System v3.0 es afectado por una vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json index 4e174315119..a56610a2774 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Reservations menu, Schedule section date parameter." + }, + { + "lang": "es", + "value": "PHPJabbers Restaurant Booking System v3.0 es vulnerable a Cross-Site Scripting (XSS) Reflejado en el men\u00fa Reservas, secci\u00f3n Programaci\u00f3n, par\u00e1metro de fecha." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json index 01d26026706..af1b000e330 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Restaurant Booking System v3.0 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name\"." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json index fb3edcbcfa0..fe2d8be7743 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." + }, + { + "lang": "es", + "value": " PHPJabbers Bus Reservation System v1.1 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"t\u00edtulo, nombre\"." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json index b1ee1649eaf..507bb7e9e10 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + }, + { + "lang": "es", + "value": "PHPJabbers Bus Reservation System v1.1 es afectado por una vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json index 4ed0451717d..595ef45aba6 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Shared Asset Booking System v1.0 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"t\u00edtulo, nombre\"." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json index b2a306bddc0..50de0960832 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu \"date\" parameter." + }, + { + "lang": "es", + "value": "PHPJabbers Cinema Booking System v1.0 es vulnerable a Cross-Site Scripting (XSS) Reflejado en el par\u00e1metro \"fecha\" del men\u00fa Ahora en exhibici\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json index e294468d72e..12586105ba2 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Meeting Room Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n 'Forgot Password' de PHPJabbers Meeting Room Booking System v1.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json index 9c37eaea4c6..a4ebcf56a2d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51334.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cinema Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n 'Forgot Password' de PHPJabbers Cinema Booking System v1.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json index 6e6dbe64190..d4fb1ce979d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51335.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Cinema Booking System v1.0 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"t\u00edtulo, nombre\"." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5505.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5505.json index e448d108c5d..d0d0ccab6ab 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5505.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5505.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-08-17T09:15:07.160", "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json index 8db526cda25..ad86f2185ee 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:42:45.657", "lastModified": "2024-11-21T08:44:35.743", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json index ce8f9634c35..6c51113a064 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-12-21T23:15:11.213", "lastModified": "2025-02-03T14:15:37.920", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10404.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10404.json index ab8e1b1e1a9..c3a75fd1f9f 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10404.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10404.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CalInvocationHandler in Brocade \nSANnav before 2.3.1b logs sensitive information in clear text. The \nvulnerability could allow an authenticated, local attacker to view \nBrocade Fabric OS switch sensitive information in clear text. An \nattacker with administrative privileges could retrieve sensitive \ninformation including passwords; SNMP responses that contain AuthSecret \nand PrivSecret after collecting a \u201csupportsave\u201d or getting access to an \nalready collected \u201csupportsave\u201d. NOTE: this issue exists because of an incomplete fix for CVE-2024-29952" + }, + { + "lang": "es", + "value": "CalInvocationHandler en Brocade SANnav anterior a la versi\u00f3n 2.3.1b registra informaci\u00f3n confidencial en texto plano. La vulnerabilidad podr\u00eda permitir que un atacante local autenticado vea informaci\u00f3n confidencial del conmutador Brocade Fabric OS en texto plano. Un atacante con privilegios administrativos podr\u00eda recuperar informaci\u00f3n confidencial, incluidas contrase\u00f1as, respuestas SNMP que contengan AuthSecret y PrivSecret despu\u00e9s de recopilar un \u201csupportsave\u201d o de obtener acceso a un \u201csupportsave\u201d ya recopilado. NOTA: este problema existe debido a una correcci\u00f3n incompleta de CVE-2024-29952" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10405.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10405.json index 17656df0482..aeb7a0d0259 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10405.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10405.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Brocade SANnav before SANnav 2.3.1b \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful\n exploit, an attacker can read Brocade SANnav data stream that includes \nmonitored Brocade Fabric OS switches performance data, port status, \nzoning information, WWNs, IP Addresses, but no customer data, no \npersonal data and no secrets or passwords, as it travels across the \nnetwork." + }, + { + "lang": "es", + "value": "Brocade SANnav anterior a SANnav 2.3.1b permite cifrados TLS d\u00e9biles en los puertos 443 y 18082. En caso de una explotaci\u00f3n exitosa, un atacante puede leer el flujo de datos de Brocade SANnav que incluye datos de rendimiento de conmutadores Brocade Fabric OS monitoreados, estado del puerto, informaci\u00f3n de zonificaci\u00f3n, WWN, direcciones IP, pero no datos de clientes, ni datos personales ni secretos o contrase\u00f1as, mientras viaja a trav\u00e9s de la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10581.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10581.json index 299f3a21953..6a7a814a3c1 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10581.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10581.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The DirectoryPress Frontend plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.9. This is due to missing or incorrect nonce validation on the dpfl_listingStatusChange() function. This makes it possible for unauthenticated attackers to update listing statuses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento DirectoryPress Frontend para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.7.9 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n dpfl_listingStatusChange(). Esto hace posible que atacantes no autenticados actualicen los estados de las listas a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11335.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11335.json index 88fe0aa18a5..7c317a7680d 100644 --- a/CVE-2024/CVE-2024-113xx/CVE-2024-11335.json +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11335.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The UltraEmbed \u2013 Advanced Iframe Plugin For WordPress with Gutenberg Block Included plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframe' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento UltraEmbed \u2013 Advanced Iframe Plugin For WordPress with Gutenberg Block Included para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'iframe' del complemento en todas las versiones hasta la 1.0.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11582.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11582.json index 2dccef667c9..48e7b496245 100644 --- a/CVE-2024/CVE-2024-115xx/CVE-2024-11582.json +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11582.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Subscribe2 \u2013 Form, Email Subscribers & Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ip parameter in all versions up to, and including, 10.43 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Subscribe2 \u2013 Form, Email Subscribers & Newsletters para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro IP en todas las versiones hasta 10.43 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible que los atacantes no autenticados inyecten una web arbitraria scripts en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11753.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11753.json index 9bb8344361b..6a537c7d42f 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11753.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11753.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The UMich OIDC Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'umich_oidc_button' shortcode in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento UMich OIDC Login para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'umich_oidc_button' del complemento en todas las versiones hasta 1.2.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11778.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11778.json index 7531dcee113..5bec9dd8993 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11778.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11778.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The CanadaHelps Embedded Donation Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embedcdn' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento CanadaHelps Embedded Donation Form para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'INMCREDCDN' del complemento en todas las versiones hasta 1.0.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json index d46f10228c1..fb788b46959 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "ZF Roll Stability Support Plus (RSSPlus) \nis vulnerable to an authentication bypass vulnerability targeting \ndeterministic RSSPlus SecurityAccess service seeds, which may allow an \nattacker to remotely (proximal/adjacent with RF equipment or via pivot \nfrom J2497 telematics devices) call diagnostic functions intended for \nworkshop or repair scenarios. This can impact system availability, \npotentially degrading performance or erasing software, however the \nvehicle remains in a safe vehicle state." + }, + { + "lang": "es", + "value": "ZF Roll Stability Support Plus (RSSPlus) es vulnerable a una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n que afecta a las semillas de servicio deterministas RSSPlus SecurityAccess, lo que puede permitir que un atacante llame de forma remota (proximal/adyacente con equipo de RF o a trav\u00e9s de pivote desde dispositivos telem\u00e1ticos J2497) a funciones de diagn\u00f3stico destinadas a escenarios de taller o reparaci\u00f3n. Esto puede afectar la disponibilidad del sistema, degradando potencialmente el rendimiento o borrando el software, sin embargo, el veh\u00edculo permanece en un estado seguro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12069.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12069.json index 6325882058e..5652385d316 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12069.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12069.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Lexicata plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link." + }, + { + "lang": "es", + "value": "El complemento Lexicata para WordPress es vulnerable a Cross-Site Scripting Reflejado debido al uso de add_query_arg sin escapar de la URL apropiado en todas las versiones hasta 1.0.16 incluida. Esto hace posible que los atacantes no autenticados inyecten una web arbitraria scripts que ejecutan si pueden enga\u00f1ar con \u00e9xito a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace especialmente manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12231.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12231.json index a53e667c978..91227987254 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12231.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12231.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-05T16:15:24.933", "lastModified": "2024-12-05T16:15:24.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12232.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12232.json index b7bff14affe..63c27c81e44 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12232.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12232.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-05T16:15:25.090", "lastModified": "2024-12-05T16:15:25.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12284.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12284.json index 1cfa3bbb10d..d5547da480c 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12284.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12284.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authenticated privilege escalation in\u00a0NetScaler Console and NetScaler Agent allows." + }, + { + "lang": "es", + "value": "La escalada de privilegios autenticado en NetScaler Console and NetScaler Agent permiten." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12339.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12339.json index b66bd89662c..5e9917fd6a9 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12339.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12339.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Digihood HTML Sitemap plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018channel' parameter in all versions up to, and including, 3.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Digihood HTML Sitemap para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro \u2018canal 'en todas las versiones hasta 3.1.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible que los atacantes no autenticados inyecten una web arbitraria scripts en p\u00e1ginas que ejecutan si pueden enga\u00f1ar con \u00e9xito a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json index 745a56c4c4f..57f0f18f5c2 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json @@ -3,7 +3,7 @@ "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-12-17T05:15:06.413", "lastModified": "2025-02-17T21:15:10.327", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12522.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12522.json index 61773ddf05b..52cc41381d3 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12522.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12522.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Yay! Forms | Embed Custom Forms, Surveys, and Quizzes Easily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yayforms' shortcode in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Yay! Forms | Embed Custom Forms, Surveys, and Quizzes Easily de WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del brevemente de 'YAYFORMS' del complemento en todas las versiones hasta 1.2.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12525.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12525.json index 2010382b793..8998a117f08 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12525.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12525.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Easy MLS Listings Import plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'homeasap-featured-listings' shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Easy MLS Listings Import para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto de 'listas de hom\u00e9asepasa de homease' en todas las versiones hasta 2.0.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos suministrados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12562.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12562.json index 9d5eecabe0e..87da9e60b0b 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12562.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12562.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The s2Member Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento s2Member Pro para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 241216 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del par\u00e1metro vulnerable 's2member_pro_remote_op'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP presente en el software vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12651.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12651.json index 62da10e6b6b..0b0ba0b7b07 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12651.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12651.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposed Dangerous Method or Function vulnerability in PTT Inc. HGS Mobile App allows Manipulating User-Controlled Variables.This issue affects HGS Mobile App: before 6.5.0." + }, + { + "lang": "es", + "value": "Se expuso una vulnerabilidad de m\u00e9todo o funci\u00f3n peligrosa en la aplicaci\u00f3n m\u00f3vil HGS de PTT Inc. que permite manipular variables controladas por el usuario. Este problema afecta a la aplicaci\u00f3n m\u00f3vil HGS: anterior a 6.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json index 82ffc583b61..f1fc2c5f6b1 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-19T17:15:08.650", "lastModified": "2024-12-19T17:15:08.650", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12813.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12813.json index 0b89119997e..3e1a41cb0a1 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12813.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12813.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Open Hours \u2013 Easy Opening Hours plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'open-hours-current-status' shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Open Hours \u2013 Easy Opening Hours para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'Hours-Current-Status-Status' del complemento en todas las versiones hasta 1.0.9 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos suministrados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12938.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12938.json index b616e58bf7d..986dc1f2ab0 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12938.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12938.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T06:15:05.987", "lastModified": "2024-12-26T06:15:05.987", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12940.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12940.json index 07ea1137c9d..db12046b4ff 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12940.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12940.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T07:15:11.637", "lastModified": "2024-12-26T07:15:11.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12942.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12942.json index effd471956c..3e63b1fa58e 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12942.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12942.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T08:15:05.540", "lastModified": "2024-12-26T08:15:05.540", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json index 39f9aaeaa40..e671875e7c1 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T16:15:27.643", "lastModified": "2024-12-26T16:15:27.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12960.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12960.json index 54b68131042..5f1f99fbbe1 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12960.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12960.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T18:15:21.027", "lastModified": "2024-12-26T18:15:21.027", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12981.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12981.json index 0e80b59ce8d..c96f1b436f4 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12981.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12981.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T06:15:23.463", "lastModified": "2024-12-27T06:15:23.463", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12998.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12998.json index 23e62c4ba52..05fef3fdcfe 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12998.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12998.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-28T22:15:16.893", "lastModified": "2024-12-28T22:15:16.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json index 7431cca1881..55602b2e78c 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13004.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T07:15:05.643", "lastModified": "2024-12-29T07:15:05.643", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13005.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13005.json index c90b0e82d83..7a4682ee2a4 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13005.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13005.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T08:15:05.143", "lastModified": "2024-12-29T08:15:05.143", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json index 7a2b3b86fa1..ae2219e83ab 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13006.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T08:15:06.840", "lastModified": "2024-12-29T08:15:06.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13007.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13007.json index 92b5a09d34c..9e4569c4c20 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13007.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13007.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T09:15:05.580", "lastModified": "2024-12-29T09:15:05.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13008.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13008.json index d8195f2fc16..4c137aaea49 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13008.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13008.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T10:15:05.853", "lastModified": "2024-12-29T10:15:05.853", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13024.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13024.json index 2de00f9e3d0..62e5054e8be 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13024.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13024.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T21:15:06.220", "lastModified": "2024-12-29T21:15:06.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13152.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13152.json index 8c3b1388876..f1a36536ae4 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13152.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13152.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in BSS Software Mobuy Online Machinery Monitoring Panel allows SQL Injection.This issue affects Mobuy Online Machinery Monitoring Panel: before 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de la clave principal SQL controlada por el usuario en BSS Software Mobuy Online Machinery Monitoring Panel permite la inyecci\u00f3n SQL. Este problema afecta a Mobuy Online Machinery Monitoring Panel: antes de 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13155.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13155.json index 3fb9320ecb1..e9cebe37d3b 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13155.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13155.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Transparent Split Hero widget in all versions up to, and including, 1.5.140 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: Since the widget code isn't part of the code base, to apply the patch, the affected widget: Transparent Split Hero must be deleted and reinstalled manually." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del widget de h\u00e9roe dividido transparente del complemento en todas las versiones hasta 1.5.140 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Nota: Dado que el c\u00f3digo del widget no es parte de la base del c\u00f3digo, para aplicar el parche, el widget afectado: el h\u00e9roe dividido transparente debe eliminarse y reinstalar manualmente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json index 0b9883aa05b..396fd62390f 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13231.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WordPress Portfolio Builder \u2013 Portfolio Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_video' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to add arbitrary videos to any portfolio gallery." + }, + { + "lang": "es", + "value": "El complemento Portfolio Builder \u2013 Portfolio Gallery de WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'add_video' en todas las versiones hasta la 1.1.7 incluida. Esto permite que atacantes no autenticados agreguen videos arbitrarios a cualquier galer\u00eda de portafolios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json index 0263f4f1796..77cecd8483b 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13336.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Disable Auto Updates para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.4 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la p\u00e1gina \"disable-auto-updates\". Esto hace posible que atacantes no autenticados deshabiliten todas las actualizaciones autom\u00e1ticas a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13339.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13339.json index 26dbdd613d1..0e992336101 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13339.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13339.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The DeBounce Email Validator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.6. This is due to missing or incorrect nonce validation on the 'debounce_email_validator' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento DeBounce Email Validator para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 5.6.6 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la p\u00e1gina 'debounce_email_validator'. Esto permite que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13363.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13363.json index 853e3b8a6d7..29df9ef27af 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13363.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13363.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Raptive Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'poc' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Raptive Ads para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'POC' en todas las versiones hasta 3.6.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n si logran enga\u00f1ar con \u00e9xito a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13364.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13364.json index e5696ff38fe..99d14c6d71c 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13364.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13364.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files." + }, + { + "lang": "es", + "value": "El complemento Raptive Ads para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en las funciones site_ads_files_reset() y cls_file_reset() en todas las versiones hasta la 3.6.3 incluida. Esto hace posible que atacantes no autenticados restablezcan los archivos ad y cls." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13390.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13390.json index bba6e661680..2596aa4bd9d 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13390.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13390.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ADFO \u2013 Custom data in admin dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'adfo_list' shortcode in all versions up to, and including, 1.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento ADFO \u2013 Custom data in admin dashboard para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'ADFO_LIST' del complemento en todas las versiones hasta 1.9.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13405.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13405.json index 4b0054fa4e1..3ddf15d3474 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13405.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13405.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Apptivo Business Site CRM plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation on the 'awp_ip_deny' page. This makes it possible for unauthenticated attackers to block IP addresses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Apptivo Business Site CRM para WordPress es vulnerable a Cross-Site Request Forgery n todas las versiones hasta 5.3 incluida. Esto se debe a la validaci\u00f3n de Nonce faltante o incorrecta en la p\u00e1gina 'AWP_IP_DENY'. Esto hace posible que los atacantes no autenticados bloqueen las direcciones IP a trav\u00e9s de una solicitud falsificada otorgada que pueden enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13439.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13439.json index 5a7fb2feb7a..fd2ab19abc9 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13439.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13439.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Team \u2013 Team Members Showcase Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 4.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento Team \u2013 Team Members Showcase para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n response() en todas las versiones hasta la 4.4.9 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13443.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13443.json index caac9d3dc0b..2d06d9fb8f2 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13443.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13443.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Easypromos Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Easypromos shortcode in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Easypromos Plugin para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto EasyPromos del complemento en todas las versiones hasta 1.3.8 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13445.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13445.json index 14684b974c7..ccef97f5257 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13445.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13445.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Elementor Website Builder \u2013 More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the border, margin and gap parameters in all versions up to, and including, 3.27.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Website Builder \u2013 More Than Just a Page Builder para WordPress, es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los par\u00e1metros de borde, margen y brecha en todas las versiones hasta 3.27.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13462.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13462.json index 88d5b513b22..b7375e1131b 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13462.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13462.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Wiki Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wiki' shortcode in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Wiki ToolTip para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'wiki' del complemento en todas las versiones hasta 2.0.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13464.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13464.json index e393f7eb359..e48950d0d01 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13464.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13464.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Library Bookshelves plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bookshelf' shortcode in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Library Bookshelves para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'Bookshelf' del complemento en todas las versiones hasta 5.9 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13468.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13468.json index ae176e9b066..4c00375b9ce 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13468.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13468.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Trash Duplicate and 301 Redirect plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'duplicates-action-top' action in all versions up to, and including, 1.9. This makes it possible for unauthenticated attackers to delete arbitrary posts/pages." + }, + { + "lang": "es", + "value": "El complemento Trash Duplicate and 301 Redirect para WordPress son vulnerables a la p\u00e9rdida de datos no autorizada debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n de 'duplicados-acci\u00f3n-top' en todas las versiones hasta 1.9 incluida. Esto hace posible que los atacantes no autenticados eliminen publicaciones/p\u00e1ginas arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13476.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13476.json index 5d9ecb65675..8525b15f5b3 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13476.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13476.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 GlobalTranz Edition plugin for WordPress is vulnerable to SQL Injection via the 'engtz_wd_save_dropship' AJAX endpoint in all versions up to, and including, 2.3.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 GlobalTranz Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del ednpoint AJAX 'engtz_wd_save_dropship' en todas las versiones hasta la 2.3.11 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13478.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13478.json index 34bc4fce25f..69d52953491 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13478.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13478.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 TForce Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 TForce Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'dropship_edit_id' y 'edit_id' en todas las versiones hasta la 3.6.4 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13479.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13479.json index 21eacf08357..21d723d7571 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13479.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13479.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 SEFL Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 SEFL Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'dropship_edit_id' y 'edit_id' en todas las versiones hasta la 3.2.4 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json index 2e18e704fa0..9ee415bc571 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 R+L Carriers Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 R+L Carriers Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 3.3.4 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13483.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13483.json index 18747f5fa0e..03b97202bee 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13483.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 SAIA Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 2.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 SAIA Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 2.2.10 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13485.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13485.json index b7d784a85ae..01b3f63646d 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13485.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13485.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 ABF Freight Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 ABF Freight Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 3.3.7 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json index 8c0f11b580a..a13a3929f23 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13488.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 Estes Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 Estes Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'dropship_edit_id' y 'edit_id' en todas las versiones hasta la 3.3.7 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13489.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13489.json index 65e97ad0ec6..980d508028f 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13489.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13489.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 Old Dominion Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 Old Dominion Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 4.2.10 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13491.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13491.json index 1b71d8eaa42..c1350bf1e03 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13491.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13491.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Small Package Quotes \u2013 For Customers of FedEx plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Small Package Quotes \u2013 For Customers of FedEx para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 4.3.1 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json index 2fa8da2a883..a06c18d28b2 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13493.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Sensly Online Presence WordPress plugin through 0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Sensly Online Presence para WordPress hasta la versi\u00f3n 0.6 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados como el administrador realicen ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13500.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13500.json index 815d64e24c0..66a5cc32016 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13500.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13500.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018orderby\u2019 parameter in all versions up to, and including, 2.6.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and Gantt diagrams for WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'orderby' en todas las versiones hasta la 2.6.17 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13501.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13501.json index 173ef97d18b..fd31a30b195 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13501.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13501.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP-FormAssembly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'formassembly' shortcode in all versions up to, and including, 2.0.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP-formatsembly para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'FormAsmbly' del complemento en todas las versiones hasta 2.0.11 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13508.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13508.json index da7363e8a10..88680f5f576 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13508.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13508.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Booking Package plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the locale parameter in all versions up to, and including, 1.6.72 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Booking Package para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro localizado en todas las versiones hasta 1.6.72 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible que los atacantes no autenticados inyecten una web arbitraria scripts en p\u00e1ginas que ejecutan si pueden enga\u00f1ar con \u00e9xito a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13513.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13513.json index f303c669520..5645ebf34c6 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13513.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13513.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Oliver POS \u2013 A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including the plugin's clientToken, which in turn can be used to change user account information including emails and account type. This allows attackers to then change account passwords resulting in a complete site takeover. Version 2.4.2.3 disabled logging but left sites with existing log files vulnerable." + }, + { + "lang": "es", + "value": "El complemento Oliver POS \u2013 A WooCommerce Point of Sale (POS) para WordPress, es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.4.2.3 incluida, a trav\u00e9s de la funci\u00f3n de registro. Esto permite que atacantes no autenticados extraigan datos confidenciales, incluido el clientToken del complemento, que a su vez se puede utilizar para cambiar la informaci\u00f3n de la cuenta del usuario, incluidos los correos electr\u00f3nicos y el tipo de cuenta. Esto permite a los atacantes cambiar las contrase\u00f1as de las cuentas, lo que da como resultado una toma de control completa del sitio. La versi\u00f3n 2.4.2.3 deshabilit\u00f3 el registro, pero dej\u00f3 vulnerables a los sitios con archivos de registro existentes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13520.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13520.json index ea7cb825fd4..40113e0bf9a 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13520.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13520.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'update_voucher_price', 'update_voucher_date', 'update_voucher_note' functions in all versions up to, and including, 4.4.6. This makes it possible for unauthenticated attackers to update the value, expiration date, and user note for any gift voucher." + }, + { + "lang": "es", + "value": "El complemento Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos o a la p\u00e9rdida de datos debido a la falta de una comprobaci\u00f3n de capacidad en las funciones 'update_voucher_price', 'update_voucher_date' y 'update_voucher_note' en todas las versiones hasta la 4.4.6 incluida. Esto permite que atacantes no autenticados actualicen el valor, la fecha de vencimiento y la nota de usuario de cualquier vale de regalo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13522.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13522.json index 1b88df83180..e179080b068 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13522.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13522.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The magayo Lottery Results plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.12. This is due to missing or incorrect nonce validation on the 'magayo-lottery-results' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento magayo Lottery Results para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta 2.0.12 incluida. Esto se debe a la validaci\u00f3n de Nonce faltante o incorrecta en la p\u00e1gina 'Magayo-Lottery-Results'. Esto hace posible que los atacantes no autenticados actualicen la configuraci\u00f3n e inyecten una web maliciosa scripts a trav\u00e9s de una solicitud forjada otorgada que pueden enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13525.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13525.json index eee64794704..d583c4acde2 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13525.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13525.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4 via Shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including emails as well as hashed passwords of any user." + }, + { + "lang": "es", + "value": "El complemento Customer Email Verification for WooCommerce para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.9.4 incluida a trav\u00e9s de un c\u00f3digo corto. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, extraigan datos confidenciales, incluidos correos electr\u00f3nicos y contrase\u00f1as cifradas de cualquier usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13533.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13533.json index 7ee8a3fad04..ed99a1028f5 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13533.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13533.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Small Package Quotes \u2013 USPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 1.3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Small Package Quotes \u2013 USPS Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'edit_id' en todas las versiones hasta la 1.3.5 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13534.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13534.json index c994c8d0467..d0b05c65ab5 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13534.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13534.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Small Package Quotes \u2013 Worldwide Express Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 5.2.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Small Package Quotes \u2013 Worldwide Express Edition para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 5.2.18 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13535.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13535.json index 6fc8a2a7483..0fb7bea437d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13535.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13535.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Actionwear products sync plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.3.0. This is due the composer-setup.php file being publicly accessible with 'display_errors' set to true. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento Actionwear products sync para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta 2.3.0 incluida. Esto se debe al archivo compositor-setup.php accesible p\u00fablicamente con 'display_errors' establecido en true. Esto hace posible que los atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar a otros ataques. La informaci\u00f3n que se muestra no es \u00fatil por s\u00ed sola, y requiere que otra vulnerabilidad est\u00e9 presente por da\u00f1os a un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13538.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13538.json index 8c919391d3a..9aad4630390 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13538.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13538.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The BigBuy Dropshipping Connector for WooCommerce plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.9.19. This is due the /vendor/cocur/slugify/bin/generate-default.php file being directly accessible and triggering an error. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento BigBuy Dropshipping Connector WooCommerce para WordPress es vulnerable a la divulgaci\u00f3n completa de la ruta en todas las versiones hasta 1.9.19 incluida. Esto se debe a /vendor/cocur/slugify/bin/generate-default.php El archivo es directamente accesible y activando un error. Esto hace posible que los atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar a otros ataques. La informaci\u00f3n que se muestra no es \u00fatil por s\u00ed sola, y requiere que otra vulnerabilidad est\u00e9 presente por da\u00f1os a un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13540.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13540.json index 4a9c5caf478..cb2f9000864 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13540.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13540.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WooODT Lite \u2013 Delivery & pickup date time location for WooCommerce plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.5.1. This is due the /inc/bycwooodt_get_all_orders.php file being publicly accessible and generating a publicly visible error message. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + }, + { + "lang": "es", + "value": "El complemento WooODT Lite \u2013 Delivery & pickup date time location WooCommerce para WordPress es vulnerable a la divulgaci\u00f3n de ruta completa en todas las versiones hasta 2.5.1 incluida. Esto se debe a /inc/bycwooodt_get_all_orders.php El archivo es accesible p\u00fablicamente y generando un mensaje de error p\u00fablicamente visible. Esto hace posible que los atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n web, que puede usarse para ayudar a otros ataques. La informaci\u00f3n que se muestra no es \u00fatil por s\u00ed sola, y requiere que otra vulnerabilidad est\u00e9 presente por da\u00f1os a un sitio web afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13555.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13555.json index ee92f531667..50a3fe2fc7d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13555.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13555.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The 1 Click WordPress Migration Plugin \u2013 100% FREE for a limited time plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on the cancel_actions() function. This makes it possible for unauthenticated attackers to cancel a triggered backup via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento 1 Click WordPress Migration Plugin \u2013 100% FREE for a limited time para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta 2.1 incluida. Esto se debe a la validaci\u00f3n de Nonce faltante o incorrecta en la funci\u00f3n Tancel_actions (). Esto hace posible que los atacantes no autenticados cancelen una copia de seguridad activada a trav\u00e9s de una solicitud falsificada otorgada que pueden enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13563.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13563.json index 3778d94e84c..5397a990a4b 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13563.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13563.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Front End Users plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's forgot-password shortcode in all versions up to, and including, 3.2.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Front End Users para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado de contrase\u00f1a olvidada del complemento en todas las versiones hasta la 3.2.30 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13565.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13565.json index b397ff9d7ba..5b1b3aefb4b 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13565.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13565.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Simple Map No Api plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018width\u2019 parameter in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Simple Map No API para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro \"Ancho\" en todas las versiones hasta 1.9 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json index c7b4ed85bb0..9f99c46ae48 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13573.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Zigaform \u2013 Form Builder Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zgfm_rfvar' shortcode in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento ZigaForm - Form Builder Lite para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'zgfm_rfvar' del complemento en todas las versiones hasta 7.4.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos suministrados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json index 65d73dce49a..175e227bf17 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13576.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Gumlet Video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gumlet' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gumlet Video para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'gumlet' del complemento en todas las versiones hasta 1.0.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13589.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13589.json index 64a5d27e5b6..4903d7ae9b3 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13589.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13589.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The YouTube Playlists with Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yt_grid' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento YouTube Playlists with Schema para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'YT_GRID' del complemento en todas las versiones hasta 2.6.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13591.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13591.json index 2a5dfd3ee71..6d6156df002 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13591.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13591.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Team Builder For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'team-builder-vc' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Team Builder For WPBakery Page Builder (Formerly Visual Composer) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'Team-Builder-VC' del complemento en todas las versiones 1.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13592.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13592.json index 71fa7cbfb2c..23fb09e6d2f 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13592.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13592.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Team Builder For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0 via the 'team-builder-vc' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Team Builder For WPBakery Page Builder (Formerly Visual Composer para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta 1.0 incluida, a trav\u00e9s del shortcode 'Team-Builder-VC'. Esto hace posible que los atacantes autenticados, con acceso a nivel de contribuyente y superior, incluyan y ejecute archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para evitar los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n del c\u00f3digo en los casos en que las im\u00e1genes y otros tipos de archivos \"seguros\" se pueden cargar e incluir." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13641.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13641.json index b731e08d3d6..2af7e135e9f 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13641.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13641.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Return Refund and Exchange For WooCommerce \u2013 Return Management System, RMA Exchange, Wallet And Cancel Order Features plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.5 via the 'attachment' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/attachment directory which can contain file attachments for order refunds." + }, + { + "lang": "es", + "value": "El complemento Return Refund and Exchange For WooCommerce \u2013 Return Management System, RMA Exchange, Wallet And Cancel Order Features para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.4.5 incluida a trav\u00e9s del directorio 'attachment'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/attachment que puede contener archivos adjuntos para reembolsos de pedidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13657.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13657.json index 7c1127f6e63..f42ab8c1294 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13657.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13657.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Store Locator Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'storelocatorwidget' shortcode in all versions up to, and including, 20200131 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Store Locator Widget para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'storElocatorWidget' del complemento en todas las versiones hasta 20200131 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13660.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13660.json index 66c70d4a876..eb6f229b6c8 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13660.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13660.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Responsive Flickr Slideshow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fshow' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Responsive Flickr Slideshow para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'fshow' del complemento en todas las versiones hasta 2.6.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13663.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13663.json index 28606459e21..fdabffba127 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13663.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13663.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Coaching Staffs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mstw-cs-table' shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Coaching Staffs para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'MSTW-CS-Table' del complemento en todas las versiones hasta 1.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar scripts web en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13674.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13674.json index 17d1e8bc595..8389848ee67 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13674.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13674.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Cosmic Blocks (40+) Content Editor Blocks Collection plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cwp_social_share' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Cosmic Blocks (40+) Content Editor Blocks Collection para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'cwp_social_share' del complemento en todas las versiones hasta la 1.3.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13676.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13676.json index 59a18ab9bde..4036b48e1ad 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13676.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Categorized Gallery Plugin plugin for WordPress is vulnerable to SQL Injection via the 'field' attribute of the 'image_gallery' shortcode in all versions up to, and including, 2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Categorized Gallery Plugin para WordPress es vulnerable a la inyecci\u00f3n de SQL a trav\u00e9s del atributo 'campo' del c\u00f3digo corto 'Image_gallery' en todas las versiones hasta 2.0 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json index ce4dc3a043c..f9af3c03fea 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13679.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Widget BUY.BOX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'buybox-widget' shortcode in all versions up to, and including, 3.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Widget BUY.BOX para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'buybox-widget' del complemento en todas las versiones hasta la 3.1.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json index b2bca293148..e8c866eb090 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@wordfence.com", "published": "2025-02-18T15:15:15.547", "lastModified": "2025-02-18T15:15:15.547", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Uncode Core plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.9.1.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento Uncode Core para WordPress es vulnerable a la ejecuci\u00f3n arbitraria de los c\u00f3digos cortos en todas las versiones hasta 2.9.1.6 incluida. Esto se debe al software que permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, ejecute c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13692.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13692.json index cf6c7628279..d643de4b65d 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13692.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13692.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Return Refund and Exchange For WooCommerce \u2013 Return Management System, RMA Exchange, Wallet And Cancel Order Features plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.4.5 via several functions due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to overwrite linked refund image attachments, overwrite refund request message, overwrite order messages, and read order messages of other users." + }, + { + "lang": "es", + "value": "El complemento Return Refund and Exchange For WooCommerce \u2013 Return Management System, RMA Exchange, Wallet And Cancel Order Features para WordPress es vulnerable a Insecure Direct Object Reference en todas las versiones hasta la 4.4.5 incluida a trav\u00e9s de varias funciones debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto hace posible que atacantes no autenticados sobrescriban los archivos adjuntos de im\u00e1genes de reembolso vinculados, sobrescriban el mensaje de solicitud de reembolso, sobrescriban los mensajes de pedido y lean los mensajes de pedido de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json index e15fe0b3889..5413c2379c9 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13711.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Pollin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'question' parameter in all versions up to, and including, 1.01.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Pollin para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'pregunta' en todas las versiones hasta la 1.01.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json index 2d57ba2f6ec..46c337564a6 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13712.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Pollin plugin for WordPress is vulnerable to SQL Injection via the 'question' parameter in all versions up to, and including, 1.01.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Pollin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'pregunta' en todas las versiones hasta la 1.01.1 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json index 8e24b7f7160..21ad3a83583 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13719.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The PeproDev Ultimate Invoice plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.8 via the invoicing viewer due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view invoices for completed orders which can contain PII of users." + }, + { + "lang": "es", + "value": "El complemento PeproDev Ultimate Invoice para WordPress es vulnerable a la referencia de objetos directos inseguros en todas las versiones hasta 2.0.8 incluida, a trav\u00e9s del visor de facturaci\u00f3n debido a la validaci\u00f3n faltante en una clave controlada por el usuario. Esto hace posible que los atacantes no autenticados vean las facturas para pedidos completos que pueden contener PII de usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13735.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13735.json index d1592b431c1..0e6d99fd276 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13735.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13735.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The HurryTimer \u2013 An Scarcity and Urgency Countdown Timer for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.11.2 due to insufficient input sanitization and output escaping of a campaign name. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento HurryTimer \u2013 An Scarcity and Urgency Countdown Timer for WordPress & WooCommerce para WordPress es vulnerable a Cross Site Scripting almacenado en todas las versiones hasta la 2.11.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida de un nombre de campa\u00f1a. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json index 7a4aba19841..d6038a52435 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13736.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Pure Chat \u2013 Live Chat & More! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018purechatWidgetName\u2019 parameter in all versions up to, and including, 2.31 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Pure Chat \u2013 Live Chat & More! para WordPress es vulnerable a Cross-Site Scripting almacenados a trav\u00e9s del par\u00e1metro \u2018purechatWidgetName\u2019 en todas las versiones hasta la 2.31 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13740.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13740.json index 1788b31766d..e847291c23a 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13740.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.9.4.2 via the pm_messenger_show_messages function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read private conversations of other users." + }, + { + "lang": "es", + "value": "El complemento ProfileGrid \u2013 User Profiles, Groups and Communities para WordPress es vulnerable a la referencia de objetos directos inseguros en todas las versiones hasta 5.9.4.2 incluida, a trav\u00e9s de la funci\u00f3n PM_Messenger_Show_Messages debido a la validaci\u00f3n faltante en una clave controlada por el usuario. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, lean conversaciones privadas de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13741.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13741.json index 29bc7b08f82..34d81b42237 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13741.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13741.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to Limited Server-Side Request Forgery in all versions up to, and including, 5.9.4.2 via the pm_upload_image function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to download and view images, as well as validating if a non-image file exists, both on local or remote hosts." + }, + { + "lang": "es", + "value": "El complemento ProfileGrid \u2013 User Profiles, Groups and Communities para WordPress es vulnerable a Limited Server-Side Request Forgery en todas las versiones hasta 5.9.2.2 incluida, a trav\u00e9s de la funci\u00f3n PM_UPPLOAD_IMAGE. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptores y arriba, hagan solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para descargar y ver im\u00e1genes, as\u00ed como tambi\u00e9n validar si existe un archivo que no es de imagen, tanto en hosts locales como remotos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13743.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13743.json index 3dc99630e3e..b665dc5ddda 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13743.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13743.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Wonder Video Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wonderplugin_video shortcode in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Wonder Video Embed para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto WonderPlugin_Video del complemento en todas las versiones hasta 2.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13748.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13748.json index 399f59dad06..fc509ca3718 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13748.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13748.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Ultimate Classified Listings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Title parameter in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Ultimate Classified Listings para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro T\u00edtulo en todas las versiones hasta la 1.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones donde se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13752.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13752.json index d2dbc31016d..763518cbcaf 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13752.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13752.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check in the '/pm/v2/settings/notice' endpoint all versions up to, and including, 2.6.17. This makes it possible for authenticated attackers, with Subscriber-level access and above, to cause a persistent denial of service condition." + }, + { + "lang": "es", + "value": "El complemento WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and Gantt diagrams for WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en el endpoint '/pm/v2/settings/notice' en todas las versiones hasta la 2.6.17 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, provoquen una condici\u00f3n de denegaci\u00f3n de servicio persistente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13753.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13753.json index 64ad2f36852..9dff1515a40 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13753.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13753.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Ultimate Classified Listings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the update_profile function. This makes it possible for unauthenticated attackers to modify victim's email via a forged request, which might lead to account takeover, granted they can trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Ultimate Classified Listings para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.4 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n update_profile. Esto hace posible que atacantes no autenticados modifiquen el correo electr\u00f3nico de la v\u00edctima a trav\u00e9s de una solicitud falsificada, lo que podr\u00eda llevar a la apropiaci\u00f3n de la cuenta, siempre que puedan enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13789.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13789.json index d016223fb8b..d36324a8765 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13789.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13789.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ravpage plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.31 via deserialization of untrusted input from the 'paramsv2' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El complemento ravpage para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 2.31 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del par\u00e1metro 'paramsv2'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13791.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13791.json index 958fa15aee0..3f78a3f5a88 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13791.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13791.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Bit Assist para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 1.5.2 incluida a trav\u00e9s de la funci\u00f3n downloadResponseFile(). Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13792.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13792.json index 4cf2c138138..d6e6657f882 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13792.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13792.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WooCommerce Food - Restaurant Menu & Food ordering plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Food - Restaurant Menu & Food ordering para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta la 3.3.2 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json index 3f3aecdb599..e0d87331cf5 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13799.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The User Private Files \u2013 File Upload & Download Manager with Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018new-fldr-name\u2019 parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento User Private Files \u2013 File Upload & Download Manager with Secure File Sharing para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'New-FLDR-Name' en todas las versiones hasta 2.1. 3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible a los atacantes autenticados, con acceso a nivel de suscriptor y arriba, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13802.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13802.json index 954cfd019df..526bc7664c0 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13802.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13802.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Bandsintown Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bandsintown_events' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Bandsintown Events para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'bandsintown_events' del complemento en todas las versiones hasta la 1.3.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13834.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13834.json index b3cff745de3..f68bfe90bab 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13834.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13834.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Responsive Plus \u2013 Starter Templates, Advanced Features and Customizer Settings for Responsive Theme plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.4 via the 'remote_request' function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Responsive Plus \u2013 Starter Templates, Advanced Features and Customizer Settings for Responsive Theme para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 3.1.4 incluida a trav\u00e9s de la funci\u00f3n 'remote_request'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13849.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13849.json index 3ddc46bc530..bd745d86a82 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13849.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13849.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Cookie Notice Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Cookie Notice Bar para WordPress es vulnerable a Cross-Site Scripting Almacenado en todas las versiones hasta la 1.3.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json index 8f9b1695a89..1e1ea5291f5 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13854.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Education Addon for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.1 via the naedu_elementor_template shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract information from posts that are not public, including drafts, password protected, and restricted posts. This applies to posts created with Elementor only." + }, + { + "lang": "es", + "value": "El complemento Education Addon for Elementor para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta la 1.3.1 incluida a trav\u00e9s del c\u00f3digo corto naedu_elementor_template debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan informaci\u00f3n de publicaciones que no son p\u00fablicas, incluidos borradores, publicaciones protegidas con contrase\u00f1a y publicaciones restringidas. Esto se aplica solo a publicaciones creadas con Elementor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13855.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13855.json index 68553117c90..c95f9451c2e 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13855.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13855.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Prime Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.1 via the pae_global_block shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract information from posts that are not public, including drafts, private, password protected, and restricted posts. This applies to posts created with Elementor only." + }, + { + "lang": "es", + "value": "El complemento Prime Addons for Elementor para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta la 2.0.1 incluida a trav\u00e9s del c\u00f3digo abreviado pae_global_block debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan informaci\u00f3n de publicaciones que no son p\u00fablicas, incluidos borradores, publicaciones privadas, protegidas con contrase\u00f1a y restringidas. Esto se aplica solo a publicaciones creadas con Elementor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13879.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13879.json index 4521e5318cc..3b43e2a6817 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13879.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13879.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Stream plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.2 due to insufficient validation on the webhook feature. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Stream para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 4.0.2 incluida debido a una validaci\u00f3n insuficiente en la funci\u00f3n de webhook. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y que se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13888.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13888.json index 710ffabcb08..006f4f1849e 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13888.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WPMobile.App plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 11.56. This is due to insufficient validation on the redirect URL supplied via the 'redirect' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action." + }, + { + "lang": "es", + "value": "El complemento WPMobile.App para WordPress es vulnerable para abrir la redirecci\u00f3n en todas las versiones hasta 11.56 incluida. Esto se debe a una validaci\u00f3n insuficiente en la URL de redirecci\u00f3n suministrada a trav\u00e9s del par\u00e1metro 'redirigir'. Esto hace posible que los atacantes no autenticados redirigan a los usuarios a sitios potencialmente maliciosos si pueden enga\u00f1arlos con \u00e9xito para que realicen una acci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json index f562521710b..6dc05302624 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1501.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-02-21T04:15:07.800", "lastModified": "2024-11-21T08:50:42.983", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json index 085bc347897..4ad58c5e759 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21609.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:23.770", "lastModified": "2024-11-21T08:54:42.753", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json index 28171e009ec..5d766d74912 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21610.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:23.950", "lastModified": "2024-11-21T08:54:42.883", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22244.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22244.json index 59ea151e4d2..0f48d466eef 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22244.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22244.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-06-10T23:15:49.590", "lastModified": "2024-11-21T08:55:52.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22252.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22252.json index 9a2a79ad1a3..db088136817 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22252.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22252.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-03-05T18:15:47.713", "lastModified": "2024-11-21T08:55:53.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22261.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22261.json index 559355eedb9..bb829a3e6c8 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22261.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-06-11T00:15:13.790", "lastModified": "2024-11-21T08:55:54.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json index 62b15580dab..47a0f50fb79 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22273.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-05-21T18:15:08.993", "lastModified": "2024-11-21T08:55:56.397", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2240.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2240.json index fafbcd2350b..2b5f8dce742 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2240.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2240.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Docker daemon in Brocade SANnav before SANnav 2.3.1b runs without auditing. The vulnerability could allow a remote authenticated attacker to execute various attacks." + }, + { + "lang": "es", + "value": "El daemon Docker en Brocade SANnav anterior a SANnav 2.3.1b se ejecuta sin auditor\u00eda. La vulnerabilidad podr\u00eda permitir que un atacante remoto autenticado ejecute varios ataques." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2333.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2333.json index 8e2261a4a99..501b4d5aa10 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2333.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-09T16:15:42.790", "lastModified": "2024-11-21T09:09:31.550", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2351.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2351.json index 925f3ca87a3..fefeefe4597 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2351.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2351.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-09T23:15:49.590", "lastModified": "2024-11-21T09:09:34.440", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2424.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2424.json index 3abbdf18891..b8ba71d128f 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2424.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2424.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-04-15T22:15:08.657", "lastModified": "2024-11-21T09:09:43.510", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25066.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25066.json index 3076dde9b71..23808271cfa 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25066.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25066.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "RSA Authentication Manager before 8.7 SP2 Patch 1 allows XML External Entity (XXE) attacks via a license file, resulting in attacker-controlled files being stored on the product's server. Data exfiltration cannot occur." + }, + { + "lang": "es", + "value": "RSA Authentication Manager anterior a la versi\u00f3n 8.7 SP2 Patch 1 permite ataques de entidad externa XML (XXE) a trav\u00e9s de un archivo de licencia, lo que hace que los archivos controlados por el atacante se almacenen en el servidor del producto. No se puede producir la exfiltraci\u00f3n de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25574.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25574.json index b9252e42610..2fcb154d53d 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25574.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25574.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-04-01T16:15:07.823", "lastModified": "2024-11-21T09:01:00.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json index 4b1466fd26e..5f211c1bc93 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.340", "lastModified": "2024-11-21T09:06:23.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json index 553cce6047b..95c69bc0166 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28776.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 son vulnerables a ataques de cross-site scripting. Esta vulnerabilidad permite a los usuarios incorporar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json index 19107dfb7b6..0b46d61eb81 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28777.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\nis vulnerable to unrestricted deserialization. This vulnerability allows users to execute arbitrary code, escalate privileges, or cause denial of service attacks by exploiting the unrestricted deserialization of types in the application." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 son vulnerables a la deserializaci\u00f3n sin restricciones. Esta vulnerabilidad permite a los usuarios ejecutar c\u00f3digo arbitrario, escalar privilegios o provocar ataques de denegaci\u00f3n de servicio aprovechando la deserializaci\u00f3n sin restricciones de tipos en la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json index 4fb90839b5a..8264a7ec0c3 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28780.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 Rich Client\u00a0\n\n\n\n\n\nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 Rich Client utilizan algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json index f4fbefbae48..308e4e4c15b 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2999.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T21:15:49.407", "lastModified": "2024-11-21T09:11:01.453", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json index f7f568d9c0f..2c9af6b0a07 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30378.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-16T20:15:09.680", "lastModified": "2024-11-21T09:11:48.497", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json index e13e283c5cb..3c4a055d581 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30391.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:38.773", "lastModified": "2024-11-21T09:11:49.877", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json index 19d50c1e6be..1e5e8ddb91c 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30405.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:25.133", "lastModified": "2024-11-21T09:11:51.157", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json index 20136afc1bf..c9517439d3c 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3002.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:11.300", "lastModified": "2024-11-21T09:28:39.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json index 18bf677fca6..019627eda1a 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3003.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T22:15:11.880", "lastModified": "2024-11-21T09:28:39.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json index f18eb4fd107..8b52ba3dd66 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3004.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T23:15:46.637", "lastModified": "2024-11-21T09:28:39.437", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json index da253e65bbb..032461bc62a 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3039.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-28T15:15:48.473", "lastModified": "2024-11-21T09:28:44.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json index b9e9c5121a2..f5bb34aa61e 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3220.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.\n\nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).\n\nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations." + }, + { + "lang": "es", + "value": "Hay un defecto en el m\u00f3dulo de la librer\u00eda est\u00e1ndar CPython \u201cmimetypes\u201d donde en Windows la lista predeterminada de ubicaciones de archivos conocidas son editables, lo que significa que otros usuarios pueden crear archivos no v\u00e1lidos para provocar que se genere MemoryError al iniciar el entorno de ejecuci\u00f3n de Python o que las extensiones de archivo se interpreten como el tipo de archivo incorrecto. Este defecto es causado por las ubicaciones predeterminadas de las plataformas Linux y macOS (como \u201c/etc/mime.types\u201d) que tambi\u00e9n se usan en Windows, donde son ubicaciones editables por el usuario (\u201cC:\\etc\\mime.types\u201d). Para solucionar este problema, un usuario puede llamar a mimetypes.init() con una lista vac\u00eda (\u201c[]\u201d) en las plataformas Windows para evitar usar la lista predeterminada de ubicaciones de archivos conocidas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3226.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3226.json index 60a87d17a3a..aaa04e754a1 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3226.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3226.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T02:15:08.647", "lastModified": "2024-11-21T09:29:11.320", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3369.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3369.json index e0dfd019f30..45963dd7638 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3369.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3369.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-06T11:15:09.043", "lastModified": "2024-11-21T09:29:28.630", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json index dfd9e7ad904..7eb28f2cc1f 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3493.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-04-15T22:15:09.073", "lastModified": "2024-11-21T09:29:43.297", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35225.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35225.json index eb0565d9a82..cd839573ef9 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35225.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35225.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-11T22:15:09.520", "lastModified": "2024-11-21T09:19:58.493", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37359.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37359.json index 2a46c065c0f..7828b52c774 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37359.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37359.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918) \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not validate the Host header of incoming HTTP/HTTPS requests.\n\n\n\n\u00a0\n\n\n\nBy providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests." + }, + { + "lang": "es", + "value": "El servidor web recibe una URL o una solicitud similar de un componente ascendente y recupera el contenido de esta URL, pero no garantiza lo suficiente que la solicitud se env\u00ede al destino esperado. (CWE-918) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, no validan el encabezado Host de las solicitudes HTTP/HTTPS entrantes. Al proporcionar URL a puertos o hosts inesperados, los atacantes pueden hacer que parezca que el servidor est\u00e1 enviando la solicitud, posiblemente omitiendo los controles de acceso como los firewalls que impiden que los atacantes accedan a las URL directamente. El servidor se puede utilizar como proxy para realizar escaneos de puertos de hosts en redes internas, utilizar otras URL como las que pueden acceder a documentos en el sistema (utilizando file://) o utilizar otros protocolos como gopher:// o tftp://, que pueden proporcionar un mayor control sobre el contenido de las solicitudes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37360.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37360.json index 763cea7378e..9e2c587278d 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37360.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37360.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') \n\n\n\n\u00a0\n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79)\n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.0 and 9.3.0.9, including 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface.\n\n\n\n\u00a0\n\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site." + }, + { + "lang": "es", + "value": "Hitachi Vantara Pentaho Business Analytics Server - Neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') El software no neutraliza o neutraliza incorrectamente la entrada controlable por el usuario antes de colocarla en la salida que se utiliza como una p\u00e1gina web que se ofrece a otros usuarios. (CWE-79) Hitachi Vantara Pentaho Business Analytics Server anterior a las versiones 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, permite que una URL maliciosa inyecte contenido en la interfaz del complemento Analyzer. Una vez que se inyecta el script malicioso, el atacante puede realizar una variedad de actividades maliciosas. El atacante podr\u00eda transferir informaci\u00f3n privada, como cookies que pueden incluir informaci\u00f3n de sesi\u00f3n, desde la m\u00e1quina de la v\u00edctima al atacante. El atacante podr\u00eda enviar solicitudes maliciosas a un sitio web en nombre de la v\u00edctima, lo que podr\u00eda ser especialmente peligroso para el sitio si la v\u00edctima tiene privilegios de administrador para administrar ese sitio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37362.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37362.json index 08e7f96d3b5..0f871c321da 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37362.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37362.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522) \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, discloses database passwords when saving connections to RedShift.\n\n\n\n\u00a0\n\n\n\nProducts must not disclose sensitive information without cause. Disclosure of sensitive information can lead to further exploitation." + }, + { + "lang": "es", + "value": "El producto transmite o almacena credenciales de autenticaci\u00f3n, pero utiliza un m\u00e9todo inseguro que es susceptible de interceptaci\u00f3n y/o recuperaci\u00f3n no autorizada. (CWE-522) Las versiones de Hitachi Vantara Pentaho Data Integration & Analytics anteriores a 10.2.0.0 y 9.3.0.8, incluida la 8.3.x, revelan contrase\u00f1as de bases de datos al guardar conexiones en RedShift. Los productos no deben revelar informaci\u00f3n confidencial sin motivo. La divulgaci\u00f3n de informaci\u00f3n confidencial puede dar lugar a una mayor explotaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37363.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37363.json index 226bd9b8f75..ef2c3bd0295 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37363.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37363.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)\n\n\n\n\n\n\n\u00a0Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, do not correctly perform an authorization check in the data source management service.\n\n\n\n\n\n\n\n\nWhen access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service." + }, + { + "lang": "es", + "value": "El producto no realiza una comprobaci\u00f3n de autorizaci\u00f3n cuando un actor intenta acceder a un recurso o realizar una acci\u00f3n. (CWE-862) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.8, incluida la 8.3.x, no realizan correctamente una comprobaci\u00f3n de autorizaci\u00f3n en el servicio de administraci\u00f3n de origen de datos. Cuando las comprobaciones de control de acceso se aplican incorrectamente, los usuarios pueden acceder a datos o realizar acciones que no deber\u00edan tener permitido realizar. Esto puede provocar una amplia gama de problemas, incluidas exposiciones de informaci\u00f3n y denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json index 8f9a860b76c..fd989cb4088 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-11-12T15:15:08.923", "lastModified": "2024-11-12T15:48:59.103", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json index 18e69f1dfb0..9580c77c1fe 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37600.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible stack buffer overflow in the Service Broker service affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the Service Broker service. With prepared HTTP requests, an attacker can cause the Service-Broker service to fail." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en Mercedes Benz NTG (New Telematics Generation) 6 hasta 2021. Un posible desbordamiento del b\u00fafer de pila en el servicio Service Broker afecta a las unidades principales NTG 6. Para realizar este ataque, se necesita acceso f\u00edsico a los pines Ethernet de la placa base de la unidad principal. Con una direcci\u00f3n IP est\u00e1tica, un atacante puede conectarse a trav\u00e9s de la red interna al servicio Service Broker. Con solicitudes HTTP preparadas, un atacante puede provocar que el servicio Service Broker falle." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json index 49e998f68b7..0834dcf191b 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37602.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible NULL pointer dereference in the Apple Car Play function affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the AirTunes / AirPlay service. With prepared HTTP requests, an attacker can cause the Car Play service to fail." + }, + { + "lang": "es", + "value": "Se ha descubierto un problema en Mercedes Benz NTG (New Telematics Generation) 6 hasta 2021. Una posible desreferencia de puntero NULL en la funci\u00f3n Apple Car Play afecta a las unidades principales NTG 6. Para realizar este ataque, se necesita acceso f\u00edsico a los pines Ethernet de la placa base de la unidad principal. Con una direcci\u00f3n IP est\u00e1tica, un atacante puede conectarse a trav\u00e9s de la red interna al servicio AirTunes/AirPlay. Con solicitudes HTTP preparadas, un atacante puede hacer que el servicio Car Play falle." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json index 25226c56a68..f526932f0ea 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38317.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json index f560335fbb0..bd09634cfee 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38318.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json index a93221ab1ab..15735c45fd1 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2024-08-20T04:15:07.993", "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json index 2ee0f43c1b2..d52d0b88c1f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39327.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T17:15:18.440", "lastModified": "2025-02-18T17:15:18.440", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Access Control vulnerability in Atos Eviden IDRA before 2.6.1 could allow the possibility to obtain CA signing in an illegitimate way." + }, + { + "lang": "es", + "value": "La vulnerabilidad incorrecta de control de acceso en ATOS Eviden IDRA antes de 2.6.1 podr\u00eda permitir la posibilidad de obtener la firma de CA de manera ileg\u00edtima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json index e0bf574d6ee..43d9d2009ba 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39328.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insecure Permissions in Atos Eviden IDRA and IDCA before 2.7.0. A highly trusted role (Config Admin) could exceed their configuration privileges in a multi-partition environment and access some confidential data. Data integrity and availability is not at risk." + }, + { + "lang": "es", + "value": "Permisos inseguros en Atos Eviden IDRA e IDCA antes de 2.7.0. Un rol altamente confiable (Config Admin) podr\u00eda exceder sus privilegios de configuraci\u00f3n en un entorno de m\u00faltiples partes y acceder a algunos datos confidenciales. La integridad y la disponibilidad de datos no est\u00e1n en riesgo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json index 352cbd2c8cd..37514f369f3 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39518.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:11.363", "lastModified": "2024-11-21T09:27:54.567", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json index efebe8c3c03..29940d8fc22 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39539.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:12.633", "lastModified": "2024-11-21T09:27:57.843", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json index 160783e4dc8..b5a18b118e5 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39540.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:12.883", "lastModified": "2024-11-21T09:27:57.980", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json index a99346b6420..a026d8ef84e 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39550.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:15.900", "lastModified": "2024-11-21T09:27:59.427", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json index e1dfd47e595..daf7c6034e5 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39561.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-10T23:15:13.383", "lastModified": "2024-11-21T09:28:01.113", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json index 34dbd934e58..f907f389583 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40700.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json index 25b182f1b6f..2df82b964f1 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4028.json @@ -3,12 +3,16 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-18T18:15:25.473", "lastModified": "2025-02-18T18:15:25.473", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Keycloak. This issue may allow a privileged attacker to use a malicious payload as the permission while creating items (Resource and Permissions) from the admin console, leading to a stored cross-site scripting (XSS) attack." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en KeyCloak. Este problema puede permitir que un atacante privilegiado use un payload malicioso como permiso al crear elementos (recursos y permisos) de la consola de administraci\u00f3n, lo que lleva a un ataque Cross-Site Scripting (XSS) Almacenado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4069.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4069.json index 804caf37d23..78799b45659 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4069.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T22:15:07.257", "lastModified": "2024-11-21T09:42:07.833", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4070.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4070.json index df6c8de8f1c..21b39600a82 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4070.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4070.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T22:15:07.480", "lastModified": "2024-11-21T09:42:07.967", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4074.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4074.json index 69087a2ee1e..93f781245ac 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4074.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T23:15:49.500", "lastModified": "2024-11-21T09:42:08.553", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4075.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4075.json index fe4e11b3201..e64d80909f8 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4075.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4075.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-23T23:15:49.717", "lastModified": "2024-11-21T09:42:08.680", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4282.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4282.json index 943413b32ee..7ddc3f66c95 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4282.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4282.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Brocade SANnav OVA before SANnav 2.3.1b enables SHA1 deprecated setting for SSH for port 22." + }, + { + "lang": "es", + "value": "Brocade SANnav OVA anterior a SANnav 2.3.1b habilita la configuraci\u00f3n obsoleta SHA1 para SSH para el puerto 22." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json index 59cbc607047..388e0229d2a 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43187.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json index d11da0fe7db..5a97de6c312 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43196.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0\n\napplication could allow an authenticated user to manipulate data in the Questionnaires application allowing the user to spoof other users' responses." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n IBM OpenPages con Watson 8.3 y 9.0 podr\u00eda permitir que un usuario autenticado manipule datos en la aplicaci\u00f3n Questionnaires, lo que le permitir\u00eda falsificar las respuestas de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44044.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44044.json index 87afad97045..0e02a7c343f 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44044.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44044.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Oshine Modules allows Reflected XSS. This issue affects Oshine Modules: from n/a through n/a." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Oshine Modules permite XSS reflejado. Este problema afecta a los m\u00f3dulos de Oshine: desde n/d hasta n/d." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json index a77c4c7db0d..4fe6eab644c 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45081.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\ncould allow an authenticated user to modify restricted content due to incorrect authorization checks." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 podr\u00edan permitir que un usuario autenticado modifique contenido restringido debido a verificaciones de autorizaci\u00f3n incorrectas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json index 38f4d400ea0..c00e065c0a6 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\ncould allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents." + }, + { + "lang": "es", + "value": "IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 podr\u00edan permitir que un atacante autenticado realice la inyecci\u00f3n de f\u00f3rmulas. Un atacante podr\u00eda ejecutar comandos arbitrarios en el sistema, provocados por una validaci\u00f3n incorrecta del contenido de los archivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45320.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45320.json index 4e306d9b251..f7b2ce60569 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45320.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45320.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds write vulnerability exists in DocuPrint CP225w 01.22.01 and earlier, DocuPrint CP228w 01.22.01 and earlier, DocuPrint CM225fw 01.10.01 and earlier, and DocuPrint CM228fw 01.10.01 and earlier. If an affected MFP processes a specially crafted printer job file, a denial-of-service (DoS) condition may occur." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de escritura fuera de los l\u00edmites en DocuPrint CP225w 01.22.01 y versiones anteriores, DocuPrint CP228w 01.22.01 y versiones anteriores, DocuPrint CM225fw 01.10.01 y versiones anteriores, y DocuPrint CM228fw 01.10.01 y versiones anteriores. Si una impresora multifunci\u00f3n afectada procesa un archivo de trabajo de impresi\u00f3n especialmente manipulado, puede producirse una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json index e4cb7ed8736..4470f7f9e6c 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45657.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json index 471f5c41b7d..09eb6740a4a 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45658.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45774.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45774.json index 3961260546b..49cbd1389a5 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45774.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45774.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un defecto en Grub2. Un archivo JPEG especialmente manipulado puede hacer que el sistema JPEG de Grub2 verifique incorrectamente los l\u00edmites de sus b\u00faferes internos, lo que resulta en una escritura fuera de los l\u00edmites. La posibilidad de sobrescribir informaci\u00f3n confidencial para evitar las protecciones seguras de arranque no se descarta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45775.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45775.json index 2fd7524baea..65d3a48a3ed 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45775.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45775.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en GRUB2 donde la funci\u00f3n Grub_extCMD_DISPATCHER () llama a Grub_arg_List_Alloc () para asignar memoria para la lista de argumentos de GRUB. Sin embargo, no se verifica en caso de que la asignaci\u00f3n de memoria falle. Una vez que la asignaci\u00f3n falla, la funci\u00f3n NULL se procesar\u00e1 mediante la funci\u00f3n parse_option (), lo que lleva a la comida a bloquear o, en algunos escenarios raros, corrompe los datos IVT." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45776.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45776.json index 5ee38d0ef83..3bb37a99691 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45776.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45776.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections." + }, + { + "lang": "es", + "value": "Al leer el archivo .mo .mo en Grub_Mofile_Open (), Grub2 no puede verificar un desbordamiento entero al asignar su b\u00fafer interno. A manipulado .MO El archivo puede llevar el c\u00e1lculo del tama\u00f1o del b\u00fafer a desbordarse, lo que lleva a lecturas y escrituras fuera de los l\u00edmite. Este defecto permite a un atacante filtrar datos confidenciales o sobrescribir datos cr\u00edticos, posiblemente eludir protecciones seguras de arranque." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45777.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45777.json index e900092d0c7..ee3e6475250 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45777.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45777.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un defecto en Grub2. El c\u00e1lculo del b\u00fafer de traducci\u00f3n al leer un archivo .mo .mo en grub_gettext_getstr_from_position () puede desbordarse, lo que lleva a una escritura fuera de l\u00edmite. Un atacante puede aprovechar este problema para sobrescribir los datos del mont\u00f3n confidenciales de Grub2, lo que eventualmente conduce a la elecci\u00f3n de protecciones seguras de arranque." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json index 3ee53d5894f..85cea7fb888 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45781.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un defecto en Grub2. Al leer el nombre de un enlace simb\u00f3lico de un sistema de archivos UFS, Grub2 no puede validar la longitud de la cadena tomada como una entrada. La falta de validaci\u00f3n puede conducir a un mont\u00f3n fuera de los l\u00edmites Escribir, causando problemas de integridad de datos y eventualmente permitiendo que un atacante elude las protecciones seguras de arranque." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45783.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45783.json index d42c650dab6..85e0adcb103 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45783.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45783.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn't properly set an ERRNO value. This issue may lead to a NULL pointer access." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un defecto en Grub2. Al no montar un HFS+ GRUB, el controlador del sistema de archivos HFSPLUS no establece correctamente un valor errno. Este problema puede conducir a un acceso de puntero nulo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json index 306c8fc0150..6b703a692f7 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46933.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Atos Eviden BullSequana XH2140 BMC before C4EM-125: OMF_C4E 101.05.0014. Some BullSequana XH products were shipped without proper hardware programming, leading to a potential denial-of-service with privileged access." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Atos Eviden BullSequana XH2140 BMC anterior a C4EM-125: OMF_C4E 101.05.0014. Algunos productos BullSequana XH se enviaron sin la programaci\u00f3n de hardware adecuada, lo que provoc\u00f3 una posible denegaci\u00f3n de servicio con acceso privilegiado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47935.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47935.json index 79b1300f6f8..de5d6156f7d 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47935.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47935.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Validation of Integrity Check Value vulnerability in TXOne Networks StellarProtect (Legacy Mode), StellarEnforce, and Safe Lock allows an attacker to escalate their privileges in the victim\u2019s device. The attacker needs to hijack the DLL file in advance.\nThis issue affects StellarProtect (Legacy Mode): before 3.2; StellarEnforce: before 3.2; Safe Lock: from 3.0.0 before 3.1.1076.\n*Note: StellarProtect (Legacy Mode) is the new name for StellarEnforce, they are the same product." + }, + { + "lang": "es", + "value": "La vulnerabilidad de validaci\u00f3n incorrecta del valor de comprobaci\u00f3n de integridad en StellarProtect (modo heredado), StellarEnforce y Safe Lock de TXOne Networks permite a un atacante aumentar sus privilegios en el dispositivo de la v\u00edctima. El atacante debe secuestrar el archivo DLL con antelaci\u00f3n. Este problema afecta a StellarProtect (modo heredado): anterior a la 3.2; StellarEnforce: anterior a la 3.2; Safe Lock: desde la 3.0.0 hasta la 3.1.1076. *Nota: StellarProtect (modo heredado) es el nuevo nombre de StellarEnforce, son el mismo producto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json index 3bf80232bdd..a5278a33cc2 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49337.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages \n\n\n\n\n\nis vulnerable to HTML injection, caused by improper validation of user-supplied input of text fields used to construct workflow email notifications. A remote authenticated attacker could exploit this vulnerability using HTML tags in a text field of an object to inject malicious script into an email which would be executed in a victim's mail client within the security context of the OpenPages mail message. An attacker could use this for phishing or identity theft attacks." + }, + { + "lang": "es", + "value": "IBM OpenPages con Watson 8.3 y 9.0 IBM OpenPages es vulnerable a la inyecci\u00f3n de HTML, causada por una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario de los campos de texto utilizados para construir notificaciones de correo electr\u00f3nico de flujo de trabajo. Un atacante remoto autenticado podr\u00eda explotar esta vulnerabilidad utilizando etiquetas HTML en un campo de texto de un objeto para inyectar un script malicioso en un correo electr\u00f3nico que se ejecutar\u00eda en el cliente de correo de una v\u00edctima dentro del contexto de seguridad del mensaje de correo de OpenPages. Un atacante podr\u00eda utilizar esto para ataques de phishing o robo de identidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json index 2b923ea4c10..c0c9c4c110b 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49344.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages \n\n\n\nwith Watson Assistant chat feature enabled the application establishes a session when a user logs in and uses chat, but the chat session is still left active after logout." + }, + { + "lang": "es", + "value": "La funci\u00f3n de chat del asistente de IBM OpenPages con Watson habilita la aplicaci\u00f3n para establecer una sesi\u00f3n cuando un usuario inicia sesi\u00f3n y usa el chat, pero la sesi\u00f3n de chat permanece activa despu\u00e9s de cerrar la sesi\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json index ddda1b268b5..fe81ccfd943 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49348.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json index 90799fdac96..ff9b568b591 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49352.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json index d052daeb1c7..333d14d0983 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49355.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature." + }, + { + "lang": "es", + "value": "IBM OpenPages con Watson 8.3 y 9.0 puede escribir datos neutralizados incorrectamente a los archivos de registro del servidor cuando el rastreo est\u00e1 habilitado seg\u00fan la funci\u00f3n de System Tracing." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json index 83126fc59ba..c1fd808d62d 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49589.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Foundry Artifacts was found to be vulnerable to a Denial Of Service attack due to disk being potentially filled up based on an user supplied argument (size)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Foundry Artifacts era vulnerable a un ataque de denegaci\u00f3n de servicio debido a que el disco se llena potencialmente en funci\u00f3n de un argumento (tama\u00f1o) suministrado por el usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json index d574696b170..f906ad1f2ab 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49779.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages \n\ncould allow a remote attacker to bypass security restrictions, caused by improper validation and management of authentication cookies. By modifying the CSRF token and Session Id cookie parameters using the cookies of another user, a remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to the vulnerable application." + }, + { + "lang": "es", + "value": "IBM OpenPages con Watson 8.3 y 9.0 IBM OpenPages podr\u00eda permitir a un atacante remoto eludir las restricciones de seguridad, causadas por una validaci\u00f3n y gesti\u00f3n inadecuada de las cookies de autenticaci\u00f3n. Al modificar los par\u00e1metros de la cookie de token CSRF y Session Id utilizando las cookies de otro usuario, un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para eludir las restricciones de seguridad y obtener acceso no autorizado a la aplicaci\u00f3n vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json index 088b18b52c7..cec03d885b2 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49780.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0IBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing \"dot dot\" sequences (/../) in the file name parameter used in Import Configuration to write files to arbitrary locations outside of the specified directory and possibly overwrite arbitrary files." + }, + { + "lang": "es", + "value": "IBM OpenPages con Watson 8.3 y 9.0 IBM OpenPages podr\u00eda permitir a un atacante remoto recorrer directorios en el sistema. Un atacante con privilegios para realizar la importaci\u00f3n de configuraci\u00f3n podr\u00eda enviar una solicitud http especialmente manipulada que contenga secuencias de \"punto punto\" (/../) en el par\u00e1metro de nombre de archivo utilizado en la importaci\u00f3n de configuraci\u00f3n para escribir archivos en ubicaciones arbitrarias fuera del directorio especificado y posiblemente sobrescribir archivos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json index faa9d3d3554..a4721e4b35e 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49781.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources." + }, + { + "lang": "es", + "value": "IBM OpenPages con Watson 8.3 y 9.0 IBM OpenPages es vulnerable a un ataque de inyecci\u00f3n de entidad externa (XXE) XML al procesar datos XML. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para exponer informaci\u00f3n confidencial o consumir recursos de memoria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json index c70ee3f6a93..6ee312c7b2c 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49782.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0\n\n\n\ncould allow a remote attacker to spoof mail server identity when using SSL/TLS security. An attacker could exploit this vulnerability to gain access to sensitive information disclosed through email notifications generated by OpenPages or disrupt notification delivery." + }, + { + "lang": "es", + "value": "IBM OpenPages con Watson 8.3 y 9.0 podr\u00eda permitir que un atacante remoto suplante la identidad del servidor de correo al utilizar seguridad SSL/TLS. Un atacante podr\u00eda aprovechar esta vulnerabilidad para obtener acceso a informaci\u00f3n confidencial divulgada a trav\u00e9s de notificaciones de correo electr\u00f3nico generadas por OpenPages o interrumpir la entrega de notificaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json index 06cf33a06f7..aa71f5ea1b4 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json index 8e392fa01f8..9818875cddb 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49792.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json index ea0fd28dfe0..c3ff8f0a130 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49793.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json index 9165e10dcff..d6374638ba6 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49794.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49795.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49795.json index 0ace8ae0a6b..ae8308b6960 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49795.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49795.json @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json index 316bc36ea75..58edd48c7ba 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49796.json @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json index b63e7c8086b..ee2922be78e 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49797.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json index b520e25cbdd..e7a28853cdf 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49798.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json index 094eaca078f..ee457cc0ff7 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49814.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json index b54470bdc4e..24d5f938344 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4923.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-16T02:15:07.900", "lastModified": "2024-11-21T09:43:52.737", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5048.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5048.json index 764e2af17f7..1cb0d09be86 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5048.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5048.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-17T14:15:21.970", "lastModified": "2024-11-21T09:46:51.377", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json index 6d2273359d5..3e47ebc0553 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5049.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-17T14:15:22.407", "lastModified": "2024-11-21T09:46:51.530", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json index 5fa5447ec91..889e29f7af9 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51450.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json index a53463511a2..83b4b0ce0fd 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51505.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T18:15:26.420", "lastModified": "2025-02-18T18:15:26.420", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Atos Eviden IDRA before 2.7.1. A highly trusted role (Config Admin) could leverage a race condition to escalate privileges." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Atos Eviden IDRA antes del 2.7.1. Un rol altamente confiable (administrador de configuraci\u00f3n) podr\u00eda aprovechar una condici\u00f3n ejecuci\u00f3n para aumentar los privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json index 2be2e10460a..b5cc2273fb4 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51547.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2025-02-06T05:15:12.850", "lastModified": "2025-02-06T05:15:12.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json index e3b28c6dcdd..12147968e4c 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52364.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json index 61baa1ecba2..ea9693530d5 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52365.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52500.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52500.json index 3a206afdd68..2e63fd888c4 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52500.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52500.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in monetagwp Monetag Official Plugin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Monetag Official Plugin: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en monetagwp Monetag Official Plugin permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta al complemento oficial de Monetag: desde n/a hasta 1.1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52541.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52541.json index ec40ba4890d..1e3ac29e2a8 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52541.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52541.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges." + }, + { + "lang": "es", + "value": "Dell Client Platform BIOS contiene una vulnerabilidad de autenticaci\u00f3n d\u00e9bil. Un atacante de alto privilegiado con acceso local podr\u00eda explotar esta vulnerabilidad, lo que lleva a la elevaci\u00f3n de los privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json index eae22835748..47ea56bec4f 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52577.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side." + }, + { + "lang": "es", + "value": "En las versiones de Apache Ignite de la 2.6.0 y anteriores a la 2.17.0, los filtros de serializaci\u00f3n de clases configurados se ignoran en algunos endpoints de Ignite. La vulnerabilidad podr\u00eda aprovecharse si un atacante crea manualmente un mensaje de Ignite que contenga un objeto vulnerable cuya clase est\u00e9 presente en la ruta de clase del servidor de Ignite y lo env\u00eda a los endpoints del servidor de Ignite. La deserializaci\u00f3n de dicho mensaje por parte del servidor de Ignite puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el lado del servidor de Apache Ignite." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json index 97fab16d486..67580d2a887 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json index 0f638837978..8fd55460009 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52895.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM i 7.4 and 7.5 is vulnerable to a database access denial of service caused by a bypass of a database capabilities restriction check. A privileged bad actor can remove or otherwise impact database infrastructure files resulting in incorrect behavior of software products that rely upon the database." + }, + { + "lang": "es", + "value": "IBM i 7.4 y 7.5 son vulnerables a una denegaci\u00f3n de servicio de acceso a la base de datos causada por una omisi\u00f3n de una comprobaci\u00f3n de restricci\u00f3n de capacidades de la base de datos. Un actor malintencionado con privilegios puede eliminar o afectar de otro modo los archivos de infraestructura de la base de datos, lo que da lugar a un comportamiento incorrecto de los productos de software que dependen de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json index 0f207b27ee1..2a95ea5c1c6 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52902.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system." + }, + { + "lang": "es", + "value": "Las aplicaciones cliente de IBM Cognos Controller 11.0.0 a 11.0.1 FP3 e IBM Controller 11.1.0 contienen contrase\u00f1as de base de datos codificadas en el c\u00f3digo fuente que podr\u00edan usarse para acceder sin autorizaci\u00f3n al sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json index 484f6a14d6c..1082706a03a 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5288.json @@ -3,7 +3,7 @@ "sourceIdentifier": "facts@wolfssl.com", "published": "2024-08-27T19:15:17.797", "lastModified": "2024-08-28T12:57:39.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json index 996cb631579..8049b6d5a8a 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53309.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when an overly long string is passed to the \"-f\" parameter. This can lead to memory corruption, potentially allowing arbitrary code execution or causing a denial of service via specially crafted input." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la pila en Effectmatrix Total Video Converter Command Line (TVCC) 2.50 cuando se pasa una cadena demasiado larga al par\u00e1metro \"-f\". Esto puede provocar da\u00f1os en la memoria, lo que puede permitir la ejecuci\u00f3n de c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio a trav\u00e9s de una entrada especialmente manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json index 27a44da4b43..3850215a7f8 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53310.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Structured Exception Handler based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when a specially crafted file is passed to the -ff parameter. The vulnerability occurs due to improper handling of file input with overly long characters, leading to memory corruption. This can result in arbitrary code execution or denial of service." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer basada en el controlador de excepciones estructurado en Effectmatrix Total Video Converter Command Line (TVCC) 2.50 cuando se pasa un archivo especialmente manipulado al par\u00e1metro -ff. La vulnerabilidad se produce debido a una gesti\u00f3n inadecuada de la entrada de archivos con caracteres demasiado largos, lo que provoca la corrupci\u00f3n de la memoria. Esto puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario o la denegaci\u00f3n de servicio." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json index 7879c8a1b30..a2c9dff6735 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53311.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Stack buffer overflow in the arguments parameter in Immunity Inc. Immunity Debugger v1.85 allows attackers to execute arbitrary code via a crafted input that exceeds the buffer size." + }, + { + "lang": "es", + "value": "Un desbordamiento del b\u00fafer de pila en el par\u00e1metro argumentos en Immunity Inc. Immunity Debugger v1.85 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada que excede el tama\u00f1o del b\u00fafer." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json index 9378fc17c8d..ca171213d45 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53974.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + }, + { + "lang": "es", + "value": "Las versiones de Adobe Experience Manager 6.5.21 y anteriores se ven afectadas por una vulnerabilidad Cross-Site Scripting (XSS) Almacenado que podr\u00eda ser abusada por un atacante de bajo privilegiado para inyectar scripts maliciosos en campos de forma vulnerables. JavaScript malicioso puede ejecutarse en el navegador de una v\u00edctima cuando navegan a la p\u00e1gina que contiene el campo vulnerable." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json index cca0cdf13e1..0dac18495e3 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54171.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json index fbb849faf5a..5de132ec472 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54176.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json index 9bad2754e5d..bae3d565def 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54951.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Monica 4.1.2 is vulnerable to Cross Site Scripting (XSS). A malicious user can create a malformed contact and use that contact in the \"HOW YOU MET\" customization options to trigger the XSS." + }, + { + "lang": "es", + "value": "Monica 4.1.2 es vulnerable a Cross Site Scripting (XSS). Un usuario malintencionado puede crear un contacto mal formado y utilizar ese contacto en las opciones de personalizaci\u00f3n de \"C\u00d3MO SE CONOCIERON\" para activar el XSS." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json index 60e3ff9731c..2c6a2132c44 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54960.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A SQL Injection vulnerability in Nagios XI 2024R1.2.2 allows a remote attacker to execute SQL injection via a crafted payload in the History Tab component." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en Nagios XI 2024R1.2.2 permite a un atacante remoto ejecutar una inyecci\u00f3n SQL a trav\u00e9s de un payload manipulado en el componente de la pesta\u00f1a Historial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json index 6fc391f4995..726da25f021 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54961.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Nagios XI 2024R1.2.2 has an Information Disclosure vulnerability, which allows unauthenticated users to access multiple pages displaying the usernames and email addresses of all current users." + }, + { + "lang": "es", + "value": "Nagios XI 2024R1.2.2 tiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n, que permite a usuarios no autenticados acceder a m\u00faltiples p\u00e1ginas que muestran los nombres de usuario y las direcciones de correo electr\u00f3nico de todos los usuarios actuales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5461.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5461.json index 9fe1ea1ae58..f36907949de 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5461.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5461.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Implementation of the Simple Network \nManagement Protocol (SNMP) operating on the Brocade 6547 (FC5022) \nembedded switch blade, makes internal script calls to system.sh from \nwithin the SNMP binary. An authenticated attacker could perform command \nor parameter injection on SNMP operations that are only enabled on the \nBrocade 6547 (FC5022) embedded switch. This injection could allow the \nauthenticated attacker to issue commands as Root." + }, + { + "lang": "es", + "value": "La implementaci\u00f3n de Simple Network Management Protocol (SNMP) que opera en el switch blade integrado Brocade 6547 (FC5022) realiza llamadas de script internas a system.sh desde dentro del binario SNMP. Un atacante autenticado podr\u00eda realizar una inyecci\u00f3n de comandos o par\u00e1metros en operaciones SNMP que solo est\u00e1n habilitadas en el switch integrado Brocade 6547 (FC5022). Esta inyecci\u00f3n podr\u00eda permitir al atacante autenticado emitir comandos como superusuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5462.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5462.json index e734470c415..aa6f8c512b2 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5462.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5462.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "If Brocade Fabric OS before Fabric OS 9.2.0 configuration settings are not set to encrypt SNMP passwords, then the SNMP privsecret / authsecret fields can be exposed in plaintext. The plaintext passwords can be exposed in a configupload capture or a supportsave capture if encryption of passwords is not enabled. An attacker can use these passwords to fetch values of the supported OIDs via SNMPv3 queries. There are also a limited number of MIB objects that can be modified." + }, + { + "lang": "es", + "value": "Si los ajustes de configuraci\u00f3n de Brocade Fabric OS anteriores a Fabric OS 9.2.0 no est\u00e1n configurados para cifrar las contrase\u00f1as SNMP, los campos privsecret/authsecret de SNMP pueden exponerse en texto plano. Las contrase\u00f1as en texto plano pueden exponerse en una captura de configupload o en una captura de supportave si el cifrado de contrase\u00f1as no est\u00e1 habilitado. Un atacante puede usar estas contrase\u00f1as para obtener valores de los OID compatibles a trav\u00e9s de consultas SNMPv3. Tambi\u00e9n hay una cantidad limitada de objetos MIB que se pueden modificar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json index 475314f409c..8a658fdb1ce 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55457.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information." + }, + { + "lang": "es", + "value": "MasterSAM Star Gate 11 es vulnerable a directory traversal a trav\u00e9s de /adama/adama/downloadService. Un atacante puede aprovechar esta vulnerabilidad manipulando el par\u00e1metro de archivo para acceder a archivos arbitrarios en el servidor, lo que podr\u00eda exponer informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55904.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55904.json index 81883c249e6..3b5fd358866 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55904.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55904.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM DevOps Deploy 8.0 through 8.0.1.4, 8.1 through 8.1.0.0 / IBM UrbanCode Deploy 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14, and 7.3 through 7.3.2.9 could allow a remote privileged authenticated attacker to execute arbitrary commands on the system by sending specially crafted input containing special elements." + }, + { + "lang": "es", + "value": "IBM DevOps Deploy 8.0 a 8.0.1.4, 8.1 a 8.1.0.0 / IBM UrbanCode Deploy 7.0 a 7.0.5.25, 7.1 a 7.1.2.21, 7.2 a 7.2.3.14 y 7.3 a 7.3.2.9 podr\u00edan permitir que un atacante remoto autenticado y privilegiado ejecute comandos arbitrarios en el sistema mediante el env\u00edo de entradas especialmente manipuladas que contengan elementos especiales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56000.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56000.json index 445cc058d44..3291ceef53f 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56000.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56000.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in SeventhQueen K Elements allows Privilege Escalation.This issue affects K Elements: from n/a before 5.4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de la asignaci\u00f3n de privilegios incorrectos en SeventhQueen K Elements permite la escalada de privilegios. Este problema afecta a los elementos K: desde N/A hasta N/A." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json index b84d4925ab3..5e8aaaba131 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used." + }, + { + "lang": "es", + "value": "libxml2 antes de 2.12.10 y 2.13.x antes de 2.13.6 tiene un use-after-free en xmlschemaidcfillNodetable y xmlschemabubbleIdcnodetable en xmlschemas.c. Para explotar esto, un documento XML manipulado debe validarse contra un esquema XML con ciertas restricciones de identidad manipulado El esquema XML manipulado debe usarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json index d9ffab77489..e89ad4e44f5 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56463.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM QRadar SIEM 7.5 es vulnerable a ataques de Cross Site Scripting. Esta vulnerabilidad permite que un usuario privilegiado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json index 6a74632fcba..4f48b9814ee 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56467.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json index 71a077c8b11..d1536fbde77 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56470.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json index 3021dd5458a..dc764a51af2 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56471.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json index 4e267d8c853..c31dbd250b0 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56472.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json index 3d5e80a9014..d8bcd60046b 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56473.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56477.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56477.json index 70fb668e692..e4586c088c7 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56477.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56477.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Power Hardware Management Console V10.3.1050.0 could allow an authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system." + }, + { + "lang": "es", + "value": "IBM Power Hardware Management Console V10.3.1050.0 podr\u00eda permitir que un usuario autenticado recorra directorios en el sistema. Un atacante podr\u00eda enviar una solicitud de URL especialmente manipulada que contenga secuencias de \"punto punto\" (/../) para ver archivos arbitrarios en el sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json index d89394860b1..674c82adfc8 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56908.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In Perfex Crm < 3.2.1, an authenticated attacker can send a crafted HTTP POST request to the affected upload_sales_file endpoint. By providing malicious input in the rel_id parameter, combined with improper input validation, the attacker can bypass restrictions and upload arbitrary files to directories of their choice, potentially leading to remote code execution or server compromise." + }, + { + "lang": "es", + "value": "En Perfex Crm anterior a la versi\u00f3n 3.2.1, un atacante autenticado puede enviar una solicitud HTTP POST manipulada al endpoint upload_sales_file afectado. Al proporcionar una entrada maliciosa en el par\u00e1metro rel_id, combinada con una validaci\u00f3n de entrada incorrecta, el atacante puede eludir las restricciones y cargar archivos arbitrarios en los directorios que elija, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo o la vulneraci\u00f3n del servidor." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56973.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56973.json index 544aecec9ce..73ba33db1ea 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56973.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56973.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insecure Permissions vulnerability in Alvaria, Inc Unified IP Unified Director before v.7.2SP2 allows a remote attacker to execute arbitrary code via the source and filename parameters to the ProcessUploadFromURL.jsp component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de permisos inseguros en Alvaria, Inc Unified IP Unified Director anterior a v.7.2SP2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros de origen y nombre de archivo del componente ProcessUploadFromURL.jsp." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json index 8efba99d348..4368c7fc762 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5659.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-06-14T17:15:51.600", "lastModified": "2024-11-21T09:48:06.543", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57056.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57056.json index f7154cce6fa..8d89e8f5be4 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57056.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57056.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect cookie session handling in WombatDialer before 25.02 results in the full session identity being written to system logs and could be used by a malicious attacker to impersonate an existing user session." + }, + { + "lang": "es", + "value": "La gesti\u00f3n incorrecta de la sesi\u00f3n de cookies en Wombatdialer antes de 25.02 da como resultado que la identidad de sesi\u00f3n completa se escriba en sistema registros y podr\u00eda ser utilizado por un atacante malicioso para hacerse pasar por una sesi\u00f3n de usuario existente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json index ae244c74869..e28b9a0fdae 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:33.063", "lastModified": "2025-02-18T21:15:23.657", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57254.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57254.json index 63e567000a0..3c1e34c34b4 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57254.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57254.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem." + }, + { + "lang": "es", + "value": "Un desbordamiento entero en SQFS_Inode_Size en DAS U-Boot antes de 2025.01-RC1 se produce en el c\u00e1lculo del tama\u00f1o de la l\u00ednea de simulaci\u00f3n a trav\u00e9s de un sistema de archivos squashfs manipulado espec\u00edficamente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57255.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57255.json index c16e0435c87..96d5d87046d 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57255.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57255.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite." + }, + { + "lang": "es", + "value": "Un desbordamiento entero en SQFS_RESOLVE_SYMLINK en DAS U-Boot antes de 2025.01-RC1 ocurre a trav\u00e9s de un sistema de archivos manipulado squashfs con un tama\u00f1o de inodoro de 0xffffffffff, lo que resulta en un MALLOC de cero y la memoria de memoria resultante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57256.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57256.json index d9b6b1eff4a..cbc50dafa0f 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57256.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57256.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1 occurs for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite." + }, + { + "lang": "es", + "value": "Un desbordamiento entero en ext4fs_read_symlink en DAS U-Boot antes de 2025.01-RC1 ocurre para ZALLOC (agregando uno a una variable LE32) a trav\u00e9s de un sistema de archivos manipulado ext4 con un tama\u00f1o inode de 0xffffffffff, resultando en un malloc de memoria de memoria y resultante resultante resultante exagerar." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json index e06b88ae4b9..48aef4486f5 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57257.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with deep symlink nesting." + }, + { + "lang": "es", + "value": "Un problema de consumo de pila en SQFS_SIZE en DAS U-Boot antes de 2025.01-RC1 ocurre a trav\u00e9s de un sistema de archivos manipulado squashfs con anidaci\u00f3n profunda de enlaces simb\u00f3licos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json index 3f9207e587d..bf0c67f4350 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57258.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64." + }, + { + "lang": "es", + "value": "Los desbordamientos enteros en la asignaci\u00f3n de memoria en DAS U-Boot antes de 2025.01-RC1 ocurren para un sistema de archivos manipulado squashfs a trav\u00e9s de SBRK, a trav\u00e9s de request2size o porque ptrdiff_t se convierte en x86_64." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json index 4404f5477f2..4780c191c2e 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57259.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation." + }, + { + "lang": "es", + "value": "SQFS_Search_Dir en DAS U-Boot antes de 2025.01-RC1 exhibe un error fuera de uno y corrupci\u00f3n de memoria de mont\u00f3n resultante para el listado del directorio Squashfs porque el separador de ruta no se considera en un c\u00e1lculo de tama\u00f1o." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json index 9f0c6fae4a2..cb6eb74c59b 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57261.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In barebox before 2025.01.0, request2size in common/dlmalloc.c has an integer overflow, a related issue to CVE-2024-57258." + }, + { + "lang": "es", + "value": "En Barbox antes de 2025.01.0, Solic2Size en Common/dlmalloc.c tiene un desbordamiento entero, un problema relacionado con CVE-2024-57258." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json index d2cfb8a18d4..ce785b7828c 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57262.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In barebox before 2025.01.0, ext4fs_read_symlink has an integer overflow for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite, a related issue to CVE-2024-57256." + }, + { + "lang": "es", + "value": "En Barbox antes de 2025.01.0, Ext4fs_read_symlink tiene un desbordamiento entero para Zalloc (agregando uno a una variable LE32) a trav\u00e9s de un sistema de archivos manipulado ext4 con un tama\u00f1o de inodo de 0xffffffff, resultando en un malloc de cero y resultante sobrescribe de memoria, un Problema relacionado con CVE-2024-57256." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json index 1377191400c..2a8e15eace6 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T19:15:19.643", "lastModified": "2025-02-18T19:15:22.387", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json index 78ad29ac54e..2e3fc8f5f53 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57782.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue in Docker-proxy v18.09.0 allows attackers to cause a denial of service." + }, + { + "lang": "es", + "value": "Un problema en Docker-proxy v18.09.0 permite a los atacantes provocar una denegaci\u00f3n de servicio." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json index ecd2c33c9f0..d695e15b2b3 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57790.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IXON B.V. IXrouter IX2400 (Industrial Edge Gateway) v3.0 was discovered to contain hardcoded root credentials stored in the non-volatile flash memory. This vulnerability allows physically proximate attackers to gain root access via UART or SSH." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que IXON B.V. IXrouter IX2400 (Industrial Edge Gateway) v3.0 conten\u00eda credenciales ra\u00edz codificadas almacenadas en la memoria flash no vol\u00e1til. Esta vulnerabilidad permite a los atacantes f\u00edsicamente pr\u00f3ximos obtener acceso ra\u00edz a trav\u00e9s de UART o SSH." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json index 6bbb6ca1ca0..e8bc6165057 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "Insecure Loading of Dynamic Link Libraries have been discovered in USB-CONVERTERCABLE DRIVER, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.\nThis issue affects USB-CONVERTERCABLE DRIVER:." + }, + { + "lang": "es", + "value": "Se ha descubierto una carga insegura de librer\u00edas de v\u00ednculos din\u00e1micos en USB-CONVERTERCABLE DRIVER, lo que podr\u00eda permitir a atacantes locales divulgar informaci\u00f3n o ejecutar c\u00f3digo arbitrario en los sistemas afectados. Este problema afecta a USB-CONVERTERCABLE DRIVER:." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json index 39a95ef382d..1becb3534b0 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "Insecure Loading of Dynamic Link Libraries have been discovered in HVAC Energy Saving Program, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.\nThis issue affects HVAC Energy Saving Program:." + }, + { + "lang": "es", + "value": "Se ha descubierto una carga insegura de librer\u00edas de v\u00ednculos din\u00e1micos en HVAC Energy Saving Program, lo que podr\u00eda permitir a atacantes locales divulgar informaci\u00f3n o ejecutar c\u00f3digo arbitrario en los sistemas afectados. Este problema afecta al programa de ahorro de energ\u00eda HVAC:" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json index 72bb7dfd25e..98792ff3fca 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57969.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "app/Model/Attribute.php in MISP before 2.4.198 ignores an ACL during a GUI attribute search." + }, + { + "lang": "es", + "value": "app/Model/Attribute.php en MISP anterior a 2.4.198 ignora una ACL durante una b\u00fasqueda de atributos de GUI." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57971.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57971.json index 07d74d3bbe5..e5956bbc26d 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57971.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57971.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DataSourceResource.java in the SpagoBI API support in Knowage Server in KNOWAGE before 8.1.30 does not ensure that java:comp/env/jdbc/ occurs at the beginning of a JNDI Name." + }, + { + "lang": "es", + "value": "DataSourceResource.java en el soporte de API de SpagoBI en Knowage Server en KNOWAGE antes de 8.1.30 no garantiza que java:comp/env/jdbc/ aparezca al comienzo de un nombre JNDI." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5705.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5705.json index 7c7b8f4c93f..b95a4a89db2 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5705.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5705.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. (CWE-863) \n\n\n\n\u00a0\n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, have modules enabled by default that allow execution of system level processes. \n\n\n\n\u00a0\n\n\n\n\n\n\n\n\nWhen access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service." + }, + { + "lang": "es", + "value": "El producto realiza una comprobaci\u00f3n de autorizaci\u00f3n cuando un actor intenta acceder a un recurso o realizar una acci\u00f3n, pero no realiza la comprobaci\u00f3n correctamente. Esto permite a los atacantes eludir las restricciones de acceso previstas. (CWE-863) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, tienen m\u00f3dulos habilitados de forma predeterminada que permiten la ejecuci\u00f3n de procesos a nivel del sistema. Cuando las comprobaciones de control de acceso se aplican de forma incorrecta, los usuarios pueden acceder a datos o realizar acciones que no deber\u00edan tener permitido realizar. Esto puede provocar una amplia gama de problemas, incluidas exposiciones de informaci\u00f3n y denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5706.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5706.json index aeb18abc21e..91b23b89c05 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5706.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5706.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99)\u00a0\n\n\n\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not restrict JNDI identifiers during the creation of Community Dashboards, allowing control of system-level data sources.\u00a0\n\n\n\n\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users." + }, + { + "lang": "es", + "value": "El producto recibe informaci\u00f3n de un componente ascendente, pero no restringe o restringe incorrectamente la entrada antes de que se use como un identificador para un recurso que puede estar fuera de la esfera de control prevista. (CWE-99) Las versiones de Hitachi Vantara Pentaho Data Integration & Analytics anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, no restringen los identificadores JNDI durante la creaci\u00f3n de los paneles de la comunidad, lo que permite el control de las fuentes de datos a nivel del sistema. Un atacante podr\u00eda obtener acceso o modificar datos confidenciales o recursos del sistema. Esto podr\u00eda permitir el acceso a archivos o directorios protegidos, incluidos archivos de configuraci\u00f3n y archivos que contienen informaci\u00f3n confidencial, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo por parte de usuarios no autorizados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6432.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6432.json index 2fdf894ee14..c7241548e0c 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6432.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6432.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018content\u2019 parameter within the plugin's shortcode Content Block in all versions up to, and including, 3.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Content Blocks (Custom Post Widget) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'content' dentro del shortcode Content Block del complemento en todas las versiones hasta la 3.3.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json index 9b4356c5963..40952969c11 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6653.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-11T00:15:02.313", "lastModified": "2024-11-21T09:50:04.870", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6696.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6696.json index 48b449692d7..0fce92c9c5c 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6696.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6696.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets. (CWE-1220)\u00a0\n\n\n\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not correctly perform an authorization check in the user console trash content\n\n\n\n\n\n\n\u00a0An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network." + }, + { + "lang": "es", + "value": "El producto implementa controles de acceso a trav\u00e9s de una pol\u00edtica u otra caracter\u00edstica con la intenci\u00f3n de deshabilitar o restringir los accesos (lecturas y/o escrituras) a los activos en un sistema por parte de agentes no confiables. Sin embargo, los controles de acceso implementados carecen de la granularidad requerida, lo que hace que la pol\u00edtica de control sea demasiado amplia porque permite accesos de agentes no autorizados a los activos sensibles a la seguridad. (CWE-1220) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, no realizan correctamente una verificaci\u00f3n de autorizaci\u00f3n en el contenido de la papelera de la consola de usuario Un atacante explota una debilidad en la configuraci\u00f3n de los controles de acceso y puede eludir la protecci\u00f3n prevista que estas medidas protegen y, de ese modo, obtener acceso no autorizado al sistema o la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6697.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6697.json index ab15cf8842b..646f4595974 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6697.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6697.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state. (CWE-280)\n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not handle invalid and missing permissions correctly, resulting in a denial of service.\n\n\n\n\u00a0\n\n\n\nAn adversary leverages a legitimate capability of an application in such a way as to achieve a negative technical impact." + }, + { + "lang": "es", + "value": "El producto no gestiona o gestiona incorrectamente cuando no tiene suficientes privilegios para acceder a los recursos o la funcionalidad seg\u00fan lo especificado por sus permisos. Esto puede provocar que siga rutas de c\u00f3digo inesperadas que pueden dejar al producto en un estado no v\u00e1lido. (CWE-280) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, no manejan correctamente los permisos no v\u00e1lidos o faltantes, lo que da como resultado una denegaci\u00f3n de servicio. Un adversario aprovecha una capacidad leg\u00edtima de una aplicaci\u00f3n de tal manera que logra un impacto t\u00e9cnico negativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json index 007dfd59c04..d8bce79f535 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7052.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Forminator Forms WordPress plugin before 1.38.3 does not sanitise and escape some of its settings, which could allow high privilege users such as Admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento Forminator Forms de WordPress anterior a la versi\u00f3n 1.38.3 no depuraci\u00f3n ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7141.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7141.json index 7b853d48e7b..0aa531ab7a5 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7141.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7141.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Versions of Gliffy Online prior to versions 4.14.0-7 contains a Cross Site Request Forgery (CSRF) flaw." + }, + { + "lang": "es", + "value": "Las versiones de Gliffy Online anteriores a las versiones 4.14.0-7 contienen una falla de Cross-Site Request Forgery (CSRF)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json index 8ed8947ba94..4a741488f25 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7810.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-15T02:15:04.087", "lastModified": "2024-08-19T18:12:14.090", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json index fdb664b1f16..14a7042a049 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7986.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-08-23T12:15:03.920", "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json index b4a110d44f8..2cc4dd73f87 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8626.json @@ -3,7 +3,7 @@ "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-10-08T17:15:56.240", "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json index e4b4ee5b8fd..4e93bd35a8c 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8893.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use of Hard-coded Credentials vulnerability in GoodWe Technologies Co., Ltd. GW1500\u2011XS allows anyone in physical proximity to the device to fully access the web interface of the inverter via Wi\u2011Fi.This issue affects GW1500\u2011XS: 1.1.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de uso de credenciales codificadas en GoodWe Technologies Co., Ltd. GW1500-XS permite que cualquier persona que se encuentre f\u00edsicamente cerca del dispositivo acceda completamente a la interfaz web del inversor a trav\u00e9s de Wi-Fi. Este problema afecta a GW1500-XS: 1.1.2.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9601.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9601.json index f41a554100e..7cc91740557 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9601.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9601.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Qubely \u2013 Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018align\u2019 and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Qubely \u2013 Advanced Gutenberg Blocks para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de los par\u00e1metros 'align' y 'UniqueID' en todas las versiones hasta la 1.8.12 incluida, debido a una depuraci\u00f3n de entrada al escape de salida insuficiente. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0001.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0001.json index b69bbee409b..450b9fda9f4 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0001.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Abacus ERP is versions older than 2024.210.16036, 2023.205.15833, 2022.105.15542 are affected by an authenticated arbitrary file read vulnerability." + }, + { + "lang": "es", + "value": "Las versiones de Abacus ERP anteriores a 2024.210.16036, 2023.205.15833 y 2022.105.15542 est\u00e1n afectadas por una vulnerabilidad de lectura arbitraria de archivos autenticados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json index f6f47169fd7..ac7e584da37 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2025-02-12T21:15:16.470", "lastModified": "2025-02-12T21:15:16.470", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0112.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0112.json index 8646f12594e..621cbba05ab 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0112.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0112.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XDR agent and then perform malicious activity." + }, + { + "lang": "es", + "value": "Un problema con un mecanismo de detecci\u00f3n en el agente Palo Alto Networks Cortex XDR en los dispositivos de Windows permite a un usuario con privilegios no administrativos de Windows para deshabilitar al agente. Esta vulnerabilidad tambi\u00e9n puede ser apalancada por malware para deshabilitar el agente Cortex XDR y luego realizar actividades maliciosas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json index 2764e9718fe..115cb659a85 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0158.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json index ac1a0659fff..53259d70baa 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "IBM Security Verify Access Appliance 10.0.0.0 through 10.0.0.9 and 11.0.0.0 could allow a local user to execute arbitrary code due to improper restrictions on code generation." + }, + { + "lang": "es", + "value": "IBM Security Verify Access Appliance 10.0.0.0 a 10.0.0.9 y 11.0.0.0 podr\u00eda permitir que un usuario local ejecute c\u00f3digo arbitrario debido a restricciones inadecuadas en la generaci\u00f3n de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0168.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0168.json index cda12a6d064..0f3a529b0f8 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0168.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-01T14:15:23.590", "lastModified": "2025-01-01T14:15:23.590", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0174.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0174.json index ff074a638ab..e6f4f63fe10 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0174.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T01:15:08.100", "lastModified": "2025-02-18T22:15:16.000", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0175.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0175.json index dc9f7e25dea..0555f837501 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0175.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0175.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T01:15:08.263", "lastModified": "2025-02-18T22:15:16.190", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0178.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0178.json index ebeca6caebf..3050a943569 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0178.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0178.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\nThis issue affects Fireware OS: from 12.0 up to and including 12.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de validaci\u00f3n de entrada incorrecta en WatchGuard Fireware OS permite a un atacante manipular el valor del encabezado de host HTTP en las solicitudes enviadas a la interfaz web. Un atacante podr\u00eda aprovechar esta vulnerabilidad para redirigir a los usuarios a sitios web maliciosos, envenenar la memoria cach\u00e9 web o inyectar JavaScript malicioso en las respuestas enviadas por la interfaz web. Este problema afecta al sistema operativo Fireware: desde la versi\u00f3n 12.0 hasta la 12.11 inclusive." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json index f668ef53043..85f3b00dfb6 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0195.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T18:15:17.317", "lastModified": "2025-01-03T18:15:17.317", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json index 8a23370f023..d63e34b81d0 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T19:15:12.793", "lastModified": "2025-01-03T19:15:12.793", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json index bf2e76c18a1..91c1327de93 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T20:15:28.873", "lastModified": "2025-01-03T20:15:28.873", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json index 8e6acb719eb..533ec255fc4 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T21:15:14.053", "lastModified": "2025-01-03T21:15:14.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json index a418c9fad88..460e7fde976 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T23:15:08.707", "lastModified": "2025-01-03T23:15:08.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json index 4d811f531a2..ed15c4f8fd2 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0200.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T03:15:07.020", "lastModified": "2025-01-04T03:15:07.020", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json index 75a0e862146..bb663586dfe 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0201.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-04T04:15:05.620", "lastModified": "2025-01-04T04:15:05.620", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json index 34d96ffb936..ba3bcbde680 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0301.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T18:15:21.460", "lastModified": "2025-01-07T18:15:21.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json index d6802147ef0..188da587f8b 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T06:15:15.850", "lastModified": "2025-01-09T06:15:15.850", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json index 9b7a873745a..1c5a07eddd9 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0336.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:27.860", "lastModified": "2025-01-09T07:15:27.860", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json index 8abef8771db..f2574cce5c9 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0339.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:28.080", "lastModified": "2025-01-09T07:15:28.080", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json index a90a19148ed..7d4d40b8eb7 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0340.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T07:15:28.260", "lastModified": "2025-01-09T07:15:28.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json index 712bb717991..043e5aab100 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0346.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T09:15:09.393", "lastModified": "2025-01-09T09:15:09.393", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json index f88ef3fec97..e96d86f940e 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T10:15:07.170", "lastModified": "2025-01-09T10:15:07.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0352.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0352.json index 62353db1cf7..ea94feb1fc2 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0352.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0352.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Rapid Response Monitoring My Security Account App utilizes an API that could be exploited by an attacker to modify request data, potentially causing the API to return information about other users." + }, + { + "lang": "es", + "value": "Rapid Response Monitoring My Security Account App utiliza una API que un atacante podr\u00eda explotar para modificar los datos de la solicitud, lo que podr\u00eda provocar que la API devuelva informaci\u00f3n sobre otros usuarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json index 8176a8923b2..18b7cd53466 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An authenticated user in the \"bestinformed Web\" application can execute commands on the underlying server running the application. (Remote Code Execution) For this, the user must be able to create \"ScriptVars\" with the type \u201escript\" and preview them by, for example, creating a new \"Info\". By default, admin users have those permissions, but with the granular permission system, those permissions may be assigned to other users.\u00a0An attacker is able to execute commands on the server running the \"bestinformed Web\" application if an account with the correct permissions was compromised before." + }, + { + "lang": "es", + "value": "Un usuario autenticado en la aplicaci\u00f3n \"BestInformed Web\" puede ejecutar comandos en el servidor subyacente que ejecuta la aplicaci\u00f3n. (Ejecuci\u00f3n de c\u00f3digo remoto) Para esto, el usuario debe poder crear \"scriptvars\" con el tipo \"script\" y verlo, por ejemplo, creando una nueva \"informaci\u00f3n\". Por defecto, los usuarios de administraci\u00f3n tienen aquellos Permisos, pero con el permiso granular sistema, esos permisos pueden asignarse a otros usuarios, un atacante puede ejecutar comandos en el servidor que ejecuta la aplicaci\u00f3n \"BestInformed Web\" si se comprometi\u00f3 una cuenta con los permisos correctos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json index 8192a8e9602..193578c20d2 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple unauthenticated stored cross-site scripting vulnerabilities.\u00a0An unauthenticated attacker is able to compromise the sessions of users on the server by injecting JavaScript code into their session using an \"Unauthenticated Stored Cross-Site Scripting\". The attacker is then able to ride the session of those users and can abuse their privileges on the \"bestinformed Web\" application." + }, + { + "lang": "es", + "value": "En la aplicaci\u00f3n \"BestInformed Web\", alguna entrada del usuario no se depura correctamente. Esto lleva a m\u00faltiples vulnerabilidades no autenticadas Cross-Site Scripting Almacenado. Un atacante no autenticado puede comprometer las sesiones de los usuarios en el servidor inyectando el c\u00f3digo de JavaScript en su sesi\u00f3n utilizando un \"Cross-Site Scripting Almacenado no autenticado\". El atacante puede entonces aprovechar la sesi\u00f3n de esos usuarios y abusar de sus privilegios en la aplicaci\u00f3n \"bestinformed Web\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json index a0c3e6e1f73..5f4580ba49a 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple authenticated stored cross-site scripting vulnerabilities.\u00a0An authenticated attacker is able to compromise the sessions of other users on the server by injecting JavaScript code into their session using an \"Authenticated Stored Cross-Site Scripting\". Those other users might have more privileges than the attacker, enabling a form of horizontal movement." + }, + { + "lang": "es", + "value": "En la aplicaci\u00f3n \"BestInformed Web\", alguna entrada del usuario no se depura correctamente. Esto conduce a m\u00faltiples vulnerabilidades Cross-Site Scripting Almacenado. Un atacante autenticado puede comprometer las sesiones de otros usuarios en el servidor al inyectar c\u00f3digo JavaScript en sus sesiones mediante un \"Cross-Site Scripting Almacenado Autenticado\". Esos otros usuarios pueden tener m\u00e1s privilegios que el atacante, lo que permite una forma de movimiento horizontal." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json index 789a4241b07..1d49a49e4bd 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Via the GUI of the \"bestinformed Infoclient\", a low-privileged user is by default able to change the server address of the \"bestinformed Server\" to which this client connects. This is dangerous as the \"bestinformed Infoclient\" runs with elevated permissions (\"nt authority\\system\"). By changing the server address to a malicious server, or a script simulating a server, the user is able to escalate his privileges by abusing certain features of the \"bestinformed Web\" server. Those features include:\n * Pushing of malicious update packages\n * Arbitrary Registry Read as \"nt authority\\system\"\n\n\nAn attacker is able to escalate his privileges to \"nt authority\\system\" on the Windows client running the \"bestinformed Infoclient\".\u00a0\n\n\nThis attack is not possible if a custom configuration (\"Infoclient.ini\")\u00a0containing the flags \"ShowOnTaskbar=false\" or \"DisabledItems=stPort,stAddress\" is deployed." + }, + { + "lang": "es", + "value": "A trav\u00e9s de la interfaz gr\u00e1fica de usuario del \"bestinformed Infoclient\", un usuario con pocos privilegios puede cambiar de forma predeterminada la direcci\u00f3n del servidor del \"bestinformed Server\" al que se conecta este cliente. Esto es peligroso, ya que el \"bestinformed Infoclient\" se ejecuta con permisos elevados (\"nt authority\\system\"). Al cambiar la direcci\u00f3n del servidor a un servidor malicioso o a un script que simule un servidor, el usuario puede aumentar sus privilegios abusando de ciertas caracter\u00edsticas del servidor \"bestinformed Web\". Estas caracter\u00edsticas incluyen: * Pushing of malicious update packages * Lectura arbitraria del registro como \"nt authority\\system\" Un atacante puede aumentar sus privilegios a \"nt authority\\system\" en el cliente de Windows que ejecuta el \"bestinformed Infoclient\". Este ataque no es posible si se implementa una configuraci\u00f3n personalizada (\"Infoclient.ini\") que contenga los indicadores \"ShowOnTaskbar=false\" o \"DisabledItems=stPort,stAddress\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json index de2780da497..8ec56327445 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0484.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:29.227", "lastModified": "2025-01-15T20:15:29.227", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json index 099da6b0f63..45b7e380ddc 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0485.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:29.400", "lastModified": "2025-01-15T20:15:29.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json index 0fd7f09efe8..5a2d192a33a 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T21:15:14.960", "lastModified": "2025-01-15T21:15:14.960", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json index 41d2770bd78..d0a38e8b66e 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T21:15:15.160", "lastModified": "2025-01-15T21:15:15.160", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json index c615336932c..62292c624e1 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T22:15:26.990", "lastModified": "2025-01-15T22:15:26.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json index b4d65c86491..e41d08aebcd 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0503.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.11.x <= 9.11.6 fail to filter out DMs from the deleted channels endpoint which allows an attacker to infer user IDs and other metadata from deleted DMs if someone had manually marked DMs as deleted in the database." + }, + { + "lang": "es", + "value": "Las versiones 9.11.x <= 9.11.6 de Mattermost no pueden filtrar los mensajes directos del endpoint de canales eliminados, lo que permite a un atacante inferir las identificaciones de usuario y otros metadatos de los mensajes directos eliminados si alguien hab\u00eda marcado manualmente los mensajes directos como eliminados en la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json index 7bc14e0485e..8577d91c09f 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0527.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T14:15:32.840", "lastModified": "2025-01-17T14:15:32.840", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json index 1a400035247..2911138183f 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0529.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T15:15:12.670", "lastModified": "2025-01-17T15:15:12.670", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json index dd433b048d4..0a341f8662d 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0530.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T16:15:33.937", "lastModified": "2025-01-17T16:15:33.937", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json index 736896a4722..071ab71e0c7 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0531.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T16:15:34.250", "lastModified": "2025-01-17T16:15:34.250", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json index 25217bf9ae5..2ec1b5dbbd6 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0536.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T20:15:29.583", "lastModified": "2025-01-17T20:15:29.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json index 5fb02963b12..0791e3d75e0 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T22:15:29.337", "lastModified": "2025-01-17T22:15:29.337", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json index ec0b8ca0a9f..58b6bd573dc 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0562.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-19T02:15:24.380", "lastModified": "2025-01-19T02:15:24.380", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json index 8122e50b529..3b0cbc4abd9 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0563.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-19T02:15:24.560", "lastModified": "2025-01-19T02:15:24.560", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json index b5e25d34fd0..b470cbcd2cc 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0564.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-19T04:15:07.090", "lastModified": "2025-01-19T04:15:07.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0591.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0591.json index c5ef7fe6884..d257c5e6077 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0591.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0591.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds Read vulnerability (CWE-125) was found in CX-Programmer. Attackers may be able to read sensitive information or cause an application crash by abusing this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de lectura fuera de los l\u00edmites (CWE-125) en CX-Programmer. Los atacantes podr\u00edan leer informaci\u00f3n confidencial o provocar un bloqueo de la aplicaci\u00f3n al aprovechar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0592.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0592.json index dcf211d2ee3..c6d21c8cf78 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0592.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0592.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device." + }, + { + "lang": "es", + "value": "La vulnerabilidad puede permitir que un atacante remoto con bajos privilegios ejecute comandos de shell arbitrarios manipulando el archivo de firmware y carg\u00e1ndolo en el dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0593.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0593.json index 4f7ad9a0599..9a183da3c44 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0593.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0593.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device." + }, + { + "lang": "es", + "value": "La vulnerabilidad puede permitir que un atacante remoto con bajos privilegios ejecute comandos de shell arbitrarios mediante funciones de nivel inferior para interactuar con el dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0622.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0622.json index 7b71cf224da..c7b6417532b 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0622.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0622.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un defecto en command/gpg. En algunos escenarios, los ganchos creados por m\u00f3dulos cargados no se eliminan cuando se descarga el m\u00f3dulo relacionado. Este defecto permite que un atacante obliga a Grub2 llamar a los ganchos una vez que el m\u00f3dulo que lo registr\u00f3 se descarg\u00f3, lo que llev\u00f3 a una vulnerabilidad de use-after-free. Si se explota correctamente, esta vulnerabilidad puede dar como resultado una ejecuci\u00f3n de c\u00f3digo arbitraria, lo que eventualmente permite que el atacante pase por alto las protecciones seguras de arranque." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json index 6a1ecebfe49..cbe6f41bc10 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0624.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en grub2. Durante el proceso de arranque de red, al intentar buscar el archivo de configuraci\u00f3n, grub copia datos de una variable de entorno controlada por el usuario en un b\u00fafer interno mediante la funci\u00f3n grub_strcpy(). Durante este paso, no tiene en cuenta la longitud de la variable de entorno al asignar el b\u00fafer interno, lo que da como resultado una escritura fuera de los l\u00edmites. Si se explota correctamente, este problema puede dar como resultado la ejecuci\u00f3n de c\u00f3digo remoto a trav\u00e9s del mismo segmento de red en el que grub est\u00e1 buscando la informaci\u00f3n de arranque, que se puede utilizar para eludir las protecciones de arranque seguro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0633.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0633.json index 1c1513d32db..b6478d42001 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0633.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0633.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Heap-based Buffer Overflow vulnerability in\u00a0iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory" + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento del b\u00fafer basado en el mont\u00f3n en iniparser_dumpsection_ini () en iniparser permite al atacante leer fuera de la memoria l\u00edmite" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0677.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0677.json index 4af1228514c..9bb49e5ace3 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0677.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0677.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en grub2. Al realizar una b\u00fasqueda de enlace simb\u00f3lico, el m\u00f3dulo UFS de grub verifica el tama\u00f1o de los datos del inodo para asignar el b\u00fafer interno para leer el contenido del archivo, sin embargo, no verifica si el tama\u00f1o de los datos del enlace simb\u00f3lico se ha desbordado. Cuando esto ocurre, se puede llamar a grub_malloc() con un valor menor al necesario. Al leer m\u00e1s datos del disco en el b\u00fafer, la funci\u00f3n grub_ufs_lookup_symlink() escribir\u00e1 m\u00e1s all\u00e1 del final del tama\u00f1o asignado. Un ataque puede aprovechar esto creando un sistema de archivos malicioso y, como resultado, corromper\u00e1 los datos almacenados en el mont\u00f3n, lo que permitir\u00e1 la ejecuci\u00f3n de c\u00f3digo arbitrario utilizado para eludir los mecanismos de arranque seguro." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0721.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0721.json index 2030c021268..35864c14cc5 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0721.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0721.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-27T00:15:26.317", "lastModified": "2025-01-27T00:15:26.317", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0722.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0722.json index d9b75d069dc..2819d85459d 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0722.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0722.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-27T00:15:26.517", "lastModified": "2025-01-27T00:15:26.517", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json index d380b44dbdf..95b76c2ca76 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0799.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0821.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0821.json index a1f8725ff42..baa83574c73 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0821.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0821.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018id\u2019 parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Bit Assist para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.5.2 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0822.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0822.json index 4469486ab85..76e4092f260 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0822.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0822.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + }, + { + "lang": "es", + "value": "El complemento Bit Assist para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 1.5.2 incluida a trav\u00e9s del par\u00e1metro fileID. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0842.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0842.json index 17c0159af35..16aa8183b35 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0842.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0842.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-29T22:15:30.283", "lastModified": "2025-01-29T22:15:30.283", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json index 7bb16484d36..bfca140c7c7 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0865.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Media Category Management plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 2.0 to 2.3.3. This is due to missing or incorrect nonce validation on the wp_mcm_handle_action_settings() function. This makes it possible for unauthenticated attackers to alter plugin settings, such as the taxonomy used for media, the base slug for media categories, and the default media category via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Media Category Management para WordPress es vulnerable a Cross-Site Request Forgery en las versiones 2.0 a 2.3.3. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n wp_mcm_handle_action_settings(). Esto hace posible que atacantes no autenticados alteren la configuraci\u00f3n del complemento, como la taxonom\u00eda utilizada para los medios, el slug base para las categor\u00edas de medios y la categor\u00eda de medios predeterminada a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0866.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0866.json index 8ce8e961862..c3ff8ee7f48 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0866.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0866.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Legoeso PDF Manager plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018checkedVals\u2019 parameter in all versions up to, and including, 1.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Legoeso PDF Manager para WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro 'checkedVals' en todas las versiones hasta la 1.2.2 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de autor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0867.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0867.json index f5f144ccea1..9754c058df4 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0867.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0867.json @@ -3,12 +3,16 @@ "sourceIdentifier": "psirt@sick.de", "published": "2025-02-14T13:15:42.620", "lastModified": "2025-02-14T13:15:42.620", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level." + }, + { + "lang": "es", + "value": "El usuario est\u00e1ndar utiliza la funci\u00f3n ejecutar como para iniciar las aplicaciones MEAC con privilegios administrativos. Para garantizar que el sistema pueda iniciarse por s\u00ed solo, se almacenaron las credenciales del administrador. En consecuencia, el usuario EPC2 puede ejecutar cualquier comando con privilegios administrativos. Esto permite una escalada de privilegios al nivel administrativo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0868.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0868.json index d7ccb97383f..8437f8f50db 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0868.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0868.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.\n\nThis issue affects DocsGPT: from 0.8.1 through 0.12.0." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en DocsGPT que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (RCE). Debido al an\u00e1lisis incorrecto de datos JSON mediante eval(), un atacante no autorizado podr\u00eda enviar c\u00f3digo Python arbitrario para que se ejecute a trav\u00e9s del endpoint /api/remote. Este problema afecta a DocsGPT: desde la versi\u00f3n 0.8.1 hasta la 0.12.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json index 3b97e622b5b..2b6b925640a 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T21:15:14.487", "lastModified": "2025-01-30T21:15:14.487", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json index 2524773155d..81607ecae1a 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-30T21:15:14.820", "lastModified": "2025-01-30T21:15:14.820", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0893.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0893.json index e38f51c3a6f..83d3223bc19 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0893.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0893.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability." + }, + { + "lang": "es", + "value": "Symantec Diagnostic Tool (Symdiag), antes de 3.0.79, puede ser susceptible a una vulnerabilidad de escalada de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0897.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0897.json index 9fbe6a260b9..27f8ce72739 100644 --- a/CVE-2025/CVE-2025-08xx/CVE-2025-0897.json +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0897.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Modal Window \u2013 create popup modal window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframeBox' shortcode in all versions up to, and including, 6.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Modal Window \u2013 create popup modal window para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode 'iframeBox' del complemento en todas las versiones hasta la 6.1.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0916.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0916.json index adab3ee2523..1fc38d57330 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0916.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0916.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function." + }, + { + "lang": "es", + "value": "El complemento YaySMTP y Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service para WordPress es vulnerable a la ejecuci\u00f3n de Cross-Site Scripting almacenado en las versiones 2.4.9 a 2.6.2 debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Nota: La vulnerabilidad se ha corregido inicialmente en la versi\u00f3n 2.4.8 y se reintrodujo en la versi\u00f3n 2.4.9 con la eliminaci\u00f3n de la funci\u00f3n de depuraci\u00f3n integrada de WordPress wp_kses_post()." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0924.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0924.json index 4012bc27ddd..25ce821d8ce 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0924.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0924.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018message\u2019 parameter in all versions up to, and including, 5.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Activity Log para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'message' en todas las versiones hasta la 5.2.2 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0935.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0935.json index 5479a7395cb..6c69a053e93 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0935.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0935.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Media Library Folders plugin for WordPress is vulnerable to unauthorized plugin settings change due to a missing capability check on several AJAX actions in all versions up to, and including, 8.3.0. This makes it possible for authenticated attackers, with Author-level access and above, to change plugin settings related to things such as IP-blocking." + }, + { + "lang": "es", + "value": "El complemento Media Library Folders para WordPress es vulnerable a cambios no autorizados en la configuraci\u00f3n del complemento debido a una falta de verificaci\u00f3n de capacidad en varias acciones AJAX en todas las versiones hasta la 8.3.0 incluida. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, cambien la configuraci\u00f3n del complemento relacionada con cuestiones como el bloqueo de IP." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0967.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0967.json index 8991b5f4c8f..34c4aaee194 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0967.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0967.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-02T16:15:27.693", "lastModified": "2025-02-02T16:15:27.693", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0968.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0968.json index 778398fd9dc..593c878cbac 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0968.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0968.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.0 due to a missing capability checks on the get_megamenu_content() function. This makes it possible for unauthenticated attackers to view any item created in Elementor, such as posts, pages and templates including drafts, trashed and private items." + }, + { + "lang": "es", + "value": "El complemento ElementsKit Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.4.0 incluida debido a la falta de comprobaciones de capacidad en la funci\u00f3n get_megamenu_content(). Esto permite que atacantes no autenticados vean cualquier elemento creado en Elementor, como publicaciones, p\u00e1ginas y plantillas, incluidos borradores, elementos eliminados y privados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0999.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0999.json index 72c732d92d9..63fc60c7005 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0999.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0999.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Heap buffer overflow in V8 in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer del mont\u00f3n en V8 en Google Chrome antes de 133.0.6943.126 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1001.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1001.json index 1392a004864..e475b9c0c16 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1001.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1001.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user." + }, + { + "lang": "es", + "value": "Medixant RadiAnt DICOM Viewer es vulnerable debido a una falla del mecanismo de actualizaci\u00f3n para verificar el certificado del servidor de actualizaci\u00f3n, lo que podr\u00eda permitir que un atacante altere el tr\u00e1fico de la red y lleve a cabo un ataque de tipo m\u00e1quina intermedia (MITM). Un atacante podr\u00eda modificar la respuesta del servidor y enviar una actualizaci\u00f3n maliciosa al usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1005.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1005.json index 1a2a425b73f..0074e1d0622 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1005.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1005.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion widget in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento ElementsKit Elementor para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del widget Image Accordion del complemento en todas las versiones hasta la 3.4.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1006.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1006.json index f6f2b88be9e..723d3eb9e41 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1006.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1006.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Use after free in Network in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted web app. (Chromium security severity: Medium)" + }, + { + "lang": "es", + "value": "Use after free en Google Chrome antes de 133.0.6943.126 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n de almacenamiento de almacenamiento a trav\u00e9s de una aplicaci\u00f3n web manipulado. (Severidad de seguridad del cromo: medio)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1007.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1007.json index ba3414a3f76..2432d66149d 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1007.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1007.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In OpenVSX version v0.9.0 to v0.20.0, the \n/user/namespace/{namespace}/details API allows a user to edit all \nnamespace details, even if the user is not a namespace Owner or \nContributor. The details include: name, description, website, support \nlink and social media links. The same issues existed in \n/user/namespace/{namespace}/details/logo and allowed a user to change \nthe logo." + }, + { + "lang": "es", + "value": "En las versiones v0.9.0 a v0.20.0 de OpenVSX, la API /user/namespace/{namespace}/details permite a un usuario editar todos los detalles del espacio de nombres, incluso si el usuario no es propietario ni colaborador del espacio de nombres. Los detalles incluyen: nombre, descripci\u00f3n, sitio web, enlace de soporte y enlaces a redes sociales. Los mismos problemas exist\u00edan en /user/namespace/{namespace}/details/logo y permit\u00edan a un usuario cambiar el logotipo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1024.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1024.json index 59df4cf0200..842bb064e44 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1024.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in ChurchCRM 5.13.0\u00a0that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php\u00a0page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en ChurchCRM 5.13.0 que permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario en el navegador de una v\u00edctima a trav\u00e9s de Cross-Site Scripting (XSS) Reflejado en la p\u00e1gina EditEventAttendees.php. Esto requiere privilegios de administraci\u00f3n y afecta al par\u00e1metro EID. La falla permite a un atacante robar cookies de sesi\u00f3n, realizar acciones en nombre de un usuario autenticado y obtener acceso no autorizado a la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1035.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1035.json index 079b54b475f..c105b90472c 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1035.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1035.json @@ -3,12 +3,16 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-02-18T12:15:16.087", "lastModified": "2025-02-18T12:15:16.087", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Komtera Technolgies KLog Server allows Manipulating Web Input to File System Calls.This issue affects KLog Server: before 3.1.1." + }, + { + "lang": "es", + "value": "Limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido ('Path Traversal') Vulnerabilidad en Komtera Technolgies Klog Server permite manipular entradas web para llamadas al sistema de archivos. Este problema afecta el servidor Klog: antes de 3.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1039.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1039.json index 366ec4a28f0..bfbaa4371d7 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1039.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1039.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Lenix Elementor Leads addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a URL form field in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Lenix Elementor Leads para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de un campo de formulario de URL en todas las versiones hasta la 1.8.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1043.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1043.json index c4830bab7ec..c398bb6bd49 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1043.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1043.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Embed Any Document \u2013 Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.5 via the 'embeddoc' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento Embed Any Document \u2013 Embed PDF, Word, PowerPoint and Excel Files para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 2.7.5 incluida a trav\u00e9s del c\u00f3digo corto 'embeddoc'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1053.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1053.json index f215e28b80f..b82c024eb12 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1053.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1053.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Under certain error conditions at time of SANnav installation or upgrade, the encryption key can be written into and obtained from a Brocade SANnav supportsave. An attacker with privileged access to the Brocade SANnav database could use the encryption key to obtain passwords used by Brocade SANnav." + }, + { + "lang": "es", + "value": "En determinadas situaciones de error en el momento de la instalaci\u00f3n o actualizaci\u00f3n de SANnav, la clave de cifrado se puede escribir en un archivo de respaldo de Brocade SANnav y obtenerlo de \u00e9l. Un atacante con acceso privilegiado a la base de datos de Brocade SANnav podr\u00eda usar la clave de cifrado para obtener las contrase\u00f1as utilizadas por Brocade SANnav." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1064.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1064.json index 56b2892d398..d50ab8c25e6 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1064.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1064.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's xoo_el_action shortcode in all versions up to, and including, 2.8.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Login/Signup Popup ( Inline Form + Woocommerce ) para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto xoo_el_action del complemento en todas las versiones hasta la 2.8.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json index 2a4945d5d6c..b5538af10be 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1065.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Visualizer: Tables and Charts Manager for WordPress para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los datos de importaci\u00f3n del complemento desde la funci\u00f3n de archivo en todas las versiones hasta 3.11.8 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1071.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1071.json index 55faa17bc1d..b8bbbe44580 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1071.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1071.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en WatchGuard Fireware OS permite XSS almacenado a trav\u00e9s del m\u00f3dulo spamBlocker. Esta vulnerabilidad requiere una sesi\u00f3n de administrador autenticada en un Firebox administrado localmente. Este problema afecta a los sistemas operativos Fireware: desde la versi\u00f3n 12.0 hasta la 12.5.12+701324, desde la versi\u00f3n 12.6 hasta la 12.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1075.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1075.json index 40d32fc408b..818b4d5651a 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1075.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1075.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators." + }, + { + "lang": "es", + "value": "Inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en las versiones CheckMK de CheckMK GmbH <2.3.0p27, <2.2.0p40 y 2.1.0p51 (EOL) hace que las credenciales LDAP se escriban en el archivo de registro de errores de Apache accesible a los administradores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1118.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1118.json index 44ad35ab10e..0e80ba6c999 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1118.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1118.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un defecto en Grub2. El comando de volcado de Grub no se bloquea cuando GRUB est\u00e1 en modo de bloqueo, lo que permite al usuario leer cualquier informaci\u00f3n de memoria, y un atacante puede aprovechar esto para extraer firmas, sales y otra informaci\u00f3n confidencial de la memoria." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1132.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1132.json index f1834d614d6..a07b81c23d0 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1132.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1132.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A time-based blind SQL Injection\u00a0vulnerability exists in the ChurchCRM 5.13.0 and prior\u00a0EditEventAttendees.php\u00a0within the EN_tyid\u00a0parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions.\u00a0This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n Blind SQL basada en el tiempo en ChurchCRM 5.13.0 y anteriores EditEventAttendees.php dentro del par\u00e1metro EN_TYID. El par\u00e1metro se inserta directamente en una consulta SQL sin la depuraci\u00f3n adecuada, lo que permite a los atacantes inyectar comandos SQL maliciosos. Tenga en cuenta que la vulnerabilidad requiere permisos de administrador. Este defecto puede permitir potencialmente a los atacantes retrasar la respuesta, lo que indica la presencia de una vulnerabilidad de inyecci\u00f3n SQL. Si bien es una inyecci\u00f3n ciega basada en el tiempo, se puede explotar para obtener informaci\u00f3n sobre la base de datos subyacente, y con una mayor explotaci\u00f3n, se pueden recuperar datos confidenciales." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1133.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1133.json index eb2a4e137dc..0498c087580 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1133.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1133.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in ChurchCRM 5.13.0 and prior\u00a0that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection\u00a0vulnerability in the EditEventAttendees\u00a0functionality. The EID\u00a0parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion.\u00a0 Please note that this vulnerability requires Administrator privileges." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en ChurchCRM 5.13.0 y versiones anteriores que permite a un atacante ejecutar consultas SQL arbitrarias aprovechando una vulnerabilidad de inyecci\u00f3n SQL ciega basada en booleanos en la funcionalidad EditEventAttendees. El par\u00e1metro EID se concatena directamente en una consulta SQL sin la limpieza adecuada, lo que lo hace susceptible a ataques de inyecci\u00f3n SQL. Un atacante puede manipular la consulta, lo que puede provocar la exfiltraci\u00f3n, modificaci\u00f3n o eliminaci\u00f3n de datos. Tenga en cuenta que esta vulnerabilidad requiere privilegios de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1134.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1134.json index a20ed3770d2..012b07a7bb7 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1134.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1134.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the DonatedItemEditor\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en ChurchCRM 5.13.0 y antes que permite a un atacante ejecutar consultas SQL arbitrarias al explotar una vulnerabilidad de inyecci\u00f3n Blind SQL basada en el tiempo y basada en el tiempo en la funcionalidad de DonedMeditor. El par\u00e1metro CurrentFundraiser se concatena directamente en una consulta SQL sin una depuraci\u00f3n insuficiente, lo que permite a un atacante manipular consultas de bases de datos y ejecutar comandos arbitrarios, lo que potencialmente conduce a la exfiltraci\u00f3n de datos, la modificaci\u00f3n o la supresi\u00f3n. Tenga en cuenta que esta vulnerabilidad requiere privilegios de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1135.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1135.json index 14e8b890c33..d735fc0d8ce 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1135.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1135.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in ChurchCRM\u00a05.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the BatchWinnerEntry\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.\u00a0Please note the vulnerability requires Administrator privileges." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en ChurchCRM 5.13.0. y previo que permita a un atacante ejecutar consultas SQL arbitrarias explotando una vulnerabilidad de inyecci\u00f3n Blind SQL basada en el tiempo y basada en el tiempo en la funcionalidad de BatchWinnerEntry. El par\u00e1metro CurrentFundraiser se concatena directamente en una consulta SQL sin una depuraci\u00f3n suficiente, lo que permite a un atacante manipular consultas de bases de datos y ejecutar comandos arbitrarios, lo que potencialmente conduce a la exfiltraci\u00f3n de datos, la modificaci\u00f3n o la supresi\u00f3n. Tenga en cuenta que la vulnerabilidad requiere privilegios de administrador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json index 5e00b4ffdd8..e9ec2eca5f6 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-10T23:15:15.387", "lastModified": "2025-02-18T18:15:30.120", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json index d9ad3ca6ea1..60b4320fcbf 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1169.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T03:15:07.640", "lastModified": "2025-02-18T18:15:31.317", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json index 25116dc0114..d7fcaf8a4d3 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1170.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T03:15:07.810", "lastModified": "2025-02-18T18:15:31.513", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json index 2d210c13b55..61cbc4cfd28 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1171.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T04:15:08.630", "lastModified": "2025-02-18T18:15:31.700", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json index f0abaab1d40..5a64c6aaa14 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1172.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T04:15:08.800", "lastModified": "2025-02-18T18:15:31.893", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json index a91ae430a44..6e518a3660d 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1173.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T05:15:13.530", "lastModified": "2025-02-18T18:15:32.097", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json index 26b9bea4983..a70e7f63bb5 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1174.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T05:15:13.810", "lastModified": "2025-02-11T05:15:13.810", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json index 004f8dd2a76..7d3d556830e 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:07.863", "lastModified": "2025-02-18T18:15:32.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json index c1f2633b376..5876ba0733d 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T09:15:08.803", "lastModified": "2025-02-18T18:15:33.103", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json index 2dc8e1d8a09..4fe82cd603d 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:08.983", "lastModified": "2025-02-18T18:15:33.303", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1222.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1222.json index c26725ea89c..ccb88117554 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1222.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1222.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac" + }, + { + "lang": "es", + "value": "Un atacante puede obtener privilegios de aplicaci\u00f3n para realizar modificaciones limitadas y/o leer datos arbitrarios en Citrix Secure Access Client para Mac" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1223.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1223.json index 627fd6bf98c..e4f9cf0d74c 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1223.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1223.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in\u00a0Citrix Secure Access Client for Mac" + }, + { + "lang": "es", + "value": "Un atacante puede obtener privilegios de aplicaci\u00f3n para realizar modificaciones limitadas y/o leer datos arbitrarios en Citrix Secure Access Client para Mac" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1239.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1239.json index 24c9dafed36..6c5e36303c8 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1239.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1239.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en WatchGuard Fireware OS permite XSS almacenado a trav\u00e9s de la lista de sitios bloqueados. Esta vulnerabilidad requiere una sesi\u00f3n de administrador autenticada en un Firebox administrado localmente. Este problema afecta a los sistemas operativos Fireware: desde la versi\u00f3n 12.0 hasta la 12.5.12+701324, desde la versi\u00f3n 12.6 hasta la 12.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1265.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1265.json index f771b63bd5c..8704ad87d4e 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1265.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1265.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An OS command injection vulnerability exists in Vinci Protocol Analyzer that could allow an attacker to escalate privileges and perform code execution on affected system." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en Vinci Protocol Analyzer que podr\u00eda permitir a un atacante escalar privilegios y realizar ejecuci\u00f3n de c\u00f3digo en el sistema afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1269.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1269.json index 2470c1a53ba..cb92d4995ae 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1269.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1269.json @@ -3,12 +3,16 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-02-18T14:15:28.513", "lastModified": "2025-02-18T14:15:28.513", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HAVELSAN Liman MYS allows Cross-Site Flashing.This issue affects Liman MYS: before 2.1.1 - 1010." + }, + { + "lang": "es", + "value": "La redirecci\u00f3n de URL a la vulnerabilidad del sitio no confiable ('redirecci\u00f3n abierta') en Havelsan Liman MyS permite Cross-Site Flashing. Este problema afecta a Liman MYS: antes de 2.1.1 - 1010." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1293.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1293.json index cbed47ad40b..5c80a85754b 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1293.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1293.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0." + }, + { + "lang": "es", + "value": "Las versiones de Hermes de hasta 0.4.0 validaron incorrectamente el JWT proporcionado cuando se usa el modo de autenticaci\u00f3n AWS Alb, lo que puede permitir el bypass de autenticaci\u00f3n. Esta vulnerabilidad, CVE-2025-1293, se fij\u00f3 en Hermes 0.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1302.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1302.json index 1ba592a8500..b436c54bd39 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1302.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1302.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.\r\r**Note:**\r\rThis is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884)." + }, + { + "lang": "es", + "value": "Las versiones del paquete jsonpath-plus anteriores a la 10.3.0 son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo (RCE) debido a una depuraci\u00f3n de entrada incorrecta. Un atacante puede ejecutar c\u00f3digo arbitrario en el sistema aprovechando el uso predeterminado inseguro del modo eval='safe'. **Nota:** Esto se debe a una correcci\u00f3n incompleta de [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1328.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1328.json index 3cea1b28d8a..a7adae0499a 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1328.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1328.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Typed JS: A typewriter style animation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018typespeed\u2019 parameter in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Typed JS: A typewriter style animation para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'typespeed' en todas las versiones hasta la 1.2.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json index a57dbd9dc9d..a2df006808d 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1332.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in FastCMS up to 0.1.5 and classified as problematic. This vulnerability affects unknown code of the file /fastcms.html#/template/menu of the component Template Menu. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en FastCMS hasta la versi\u00f3n 0.1.5 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /fastcms.html#/template/menu del componente Template Menu. La manipulaci\u00f3n conduce a Cross Site Scripting. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Este producto utiliza la entrega continua con versiones sucesivas. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json index 2cf731a2281..8c6416c8283 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1335.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in CmsEasy 7.7.7.9. Affected is the function deleteimg_action in the library lib/admin/file_admin.php. The manipulation of the argument imgname leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "En CmsEasy 7.7.7.9 se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica. La funci\u00f3n deleteimg_action en la librer\u00eda lib/admin/file_admin.php est\u00e1 afectada. La manipulaci\u00f3n del argumento imgname provoca un path traversal. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json index 950f4617ab6..b2635ff0192 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1336.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en CmsEasy 7.7.7.9 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n deleteimg_action en la librer\u00eda lib/admin/image_admin.php. La manipulaci\u00f3n del argumento imgname provoca un path traversal. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json index e47d9fd6b5c..c27d43cdf04 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1337.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Eastnets PaymentSafe 2.5.26.0. It has been classified as problematic. This affects an unknown part of the component BIC Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Eastnets PaymentSafe 2.5.26.0. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del componente BIC Search. La manipulaci\u00f3n provoca Cross Site Scripting. Es posible iniciar el ataque de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json index 90eb4618923..188eea992e2 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1338.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in NUUO Camera up to 20250203. It has been declared as critical. This vulnerability affects the function print_file of the file /handle_config.php. The manipulation of the argument log leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en NUUO Camera hasta 20250203. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n print_file del archivo /handle_config.php. La manipulaci\u00f3n del registro de argumentos conduce a la inyecci\u00f3n de comandos. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json index 53f47745200..d6e1294cbf0 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1339.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been rated as critical. This issue affects the function setL2tpdConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK X18 9.1.0cu.2024_B20220329. Se la ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n setL2tpdConfig del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento enable provoca la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json index ea8852068d1..e9d2bd7ebf8 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1340.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK X18 9.1.0cu.2024_B20220329. La funci\u00f3n setPasswordCfg del archivo /cgi-bin/cstecgi.cgi est\u00e1 afectada. La manipulaci\u00f3n como parte de String provoca un desbordamiento del b\u00fafer basado en la pila. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1341.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1341.json index affc74150cc..a9166d28e9e 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1341.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1341.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in PMWeb 7.2.0. This affects an unknown part of the component Setting Handler. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "En PMWeb 7.2.0 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica que afecta a una parte desconocida del componente Setting Handler. La manipulaci\u00f3n da lugar a requisitos de contrase\u00f1a d\u00e9biles. Es posible iniciar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda cambiar los ajustes de configuraci\u00f3n. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1352.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1352.json index 024677f60bb..575dcaa2595 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1352.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1352.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU elfutils 0.192 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n __libdw_thread_tail en la librer\u00eda libdw_alloc.c del componente eu-readelf. La manipulaci\u00f3n del argumento w provoca una corrupci\u00f3n de la memoria. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. El nombre del parche es 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1353.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1353.json index 9d0da6c8469..f6febb2ed23 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1353.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1353.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Kong Insomnia up to 10.3.0 and classified as critical. This issue affects some unknown processing in the library profapi.dll. The manipulation leads to untrusted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Kong Insomnia hasta la versi\u00f3n 10.3.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos en la librer\u00eda profapi.dll. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda no fiable. Un ataque debe abordarse de forma local. La complejidad de un ataque es bastante alta. Se sabe que su explotaci\u00f3n es dif\u00edcil. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json index d9a99959cf4..49187e37680 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1354.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Asus RT-N12E 2.0.0.19. It has been classified as problematic. Affected is an unknown function of the file sysinfo.asp. The manipulation of the argument SSID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Asus RT-N12E 2.0.0.19. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo sysinfo.asp. La manipulaci\u00f3n del argumento SSID provoca ataques de Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1355.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1355.json index 5f66004407d..d3606e2e3ef 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1355.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1355.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T17:15:07.973", "lastModified": "2025-02-16T17:15:07.973", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in needyamin Library Card System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /signup.php of the component Add Picture. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en needyamin Library Card System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /signup.php del componente Add Picture. La manipulaci\u00f3n permite subir archivos sin restricciones. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1356.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1356.json index d1c4e5dd36a..0a523131bb9 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1356.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1356.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T18:15:07.383", "lastModified": "2025-02-16T18:15:07.383", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in needyamin Library Card System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file card.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en needyamin Library Card System 1.0. Se la ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo card.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1357.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1357.json index 1a4909158c7..1b10489d85f 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1357.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1357.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Seventh D-Guard up to 20250206. This affects an unknown part of the component HTTP GET Request Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Seventh D-Guard hasta 20250206. Afecta a una parte desconocida del componente HTTP GET Request Handler. La manipulaci\u00f3n conduce a un path traversal. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1359.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1359.json index 56605117b64..9fd3f5a0157 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1359.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1359.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in SIAM Industria de Automa\u00e7\u00e3o e Monitoramento SIAM 2.0. This issue affects some unknown processing of the file /qrcode.jsp. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en SIAM Industria de Automa\u00e7\u00e3o e Monitoramento SIAM 2.0. Este problema afecta a algunos procesos desconocidos del archivo /qrcode.jsp. La manipulaci\u00f3n del argumento url provoca Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1360.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1360.json index 09464391c84..a980f8a4b94 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1360.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1360.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Internet Web Solutions Sublime CRM up to 20250207. Affected is an unknown function of the file /crm/inicio.php of the component HTTP POST Request Handler. The manipulation of the argument msg_to leads to cross site scripting. It is possible to launch the attack remotely. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Internet Web Solutions Sublime CRM hasta 20250207. Se trata de una funci\u00f3n desconocida del archivo /crm/inicio.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento msg_to provoca Cross Site Scripting. Es posible lanzar el ataque de forma remota. Tambi\u00e9n pueden verse afectados otros par\u00e1metros. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1364.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1364.json index 8024c390693..469d9e363f5 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1364.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1364.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability has been found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this vulnerability is the function passPrompt of the component USB Protection Service. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en MicroWord eScan Antivirus 7.0.32 en Linux que se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n passPrompt del componente USB Protection Service. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en la pila. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1365.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1365.json index e6ca313da94..6b138ead5d7 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1365.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1365.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en GNU elfutils 0.192. Afecta a la funci\u00f3n process_symtab del archivo readelf.c del componente eu-readelf. La manipulaci\u00f3n del argumento D/a provoca un desbordamiento del b\u00fafer. Para abordar este ataque se requiere acceso local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador del parche es 5e5c0394d82c53e97750fe7b18023e6f84157b81. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json index 520364e097f..53126455332 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1366.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en MicroWord eScan Antivirus 7.0.32 en Linux y se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n strcpy del componente VirusPopUp. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer basado en la pila. El ataque debe abordarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1372.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1372.json index 2023a8d1e04..c92325de994 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1372.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1372.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en GNU elfutils 0.192. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n dump_data_section/print_string_section del archivo readelf.c del componente eu-readelf. La manipulaci\u00f3n del argumento z/x provoca un desbordamiento del b\u00fafer. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. El identificador del parche es 73db9d2021cab9e23fd734b0a76a612d52a6f1db. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1373.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1373.json index 9c164e850da..a97d276f264 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1373.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1373.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en FFmpeg hasta la versi\u00f3n 7.1. Se ha calificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n mov_read_trak del archivo libavformat/mov.c del componente MOV Parser. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Se requiere acceso local para abordar este ataque. El exploit se ha hecho p\u00fablico y puede utilizarse. El parche se identifica como 43be8d07281caca2e88bfd8ee2333633e1fb1a13. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1374.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1374.json index d57cbaa48b7..bd46319291d 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1374.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1374.json @@ -3,12 +3,16 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-17T04:15:08.643", "lastModified": "2025-02-17T04:15:08.643", - "vulnStatus": "Received", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Real Estate Property Management System 1.0. This affects an unknown part of the file /search.php. The manipulation of the argument StateName/CityName/AreaName/CatId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Real Estate Property Management System 1.0. Afecta a una parte desconocida del archivo /search.php. La manipulaci\u00f3n del argumento StateName/CityName/AreaName/CatId provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1376.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1376.json index d721804b607..329ab8e5cd3 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1376.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1376.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en GNU elfutils 0.192. Esta vulnerabilidad afecta a la funci\u00f3n elf_strptr en la librer\u00eda /libelf/elf_strptr.c del componente eu-strip. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. Es posible lanzar el ataque en el host local. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece ser dif\u00edcil. El exploit ha sido revelado al p\u00fablico y puede utilizarse. El nombre del parche es b16f441cca0a4841050e3215a9f120a6d8aea918. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1377.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1377.json index 32ae3a17a50..9b38a8a35c1 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1377.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1377.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the file strip.c of the component eu-strip. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is fbf1df9ca286de3323ae541973b08449f8d03aba. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en GNU elfutils 0.192. Este problema afecta a la funci\u00f3n gelf_getsymshndx del archivo strip.c del componente eu-strip. La manipulaci\u00f3n provoca una denegaci\u00f3n de servicio. El ataque debe abordarse localmente. El exploit se ha hecho p\u00fablico y puede utilizarse. El identificador del parche es fbf1df9ca286de3323ae541973b08449f8d03aba. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json index 3b3a049c031..961fac63134 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en radare2 5.9.9 33286. Se trata de una funci\u00f3n desconocida en la librer\u00eda /libr/main/rasm2.c del componente rasm2. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 6.0.0 puede solucionar este problema. El parche se identifica como c6c772d2eab692ce7ada5a4227afd50c355ad545. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1387.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1387.json index 63492da7680..4542d47a9a9 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1387.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1387.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Orca HCM from LEARNING DIGITAL has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to log in to the system as any user." + }, + { + "lang": "es", + "value": "Orca HCM de LEARNING DIGITAL tiene una vulnerabilidad de autenticaci\u00f3n inadecuada, que permite a atacantes remotos no autenticados iniciar sesi\u00f3n en el sistema como cualquier usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1388.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1388.json index acb710c4eef..e1474b825dc 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1388.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Orca HCM from LEARNING DIGITAL has an Arbitrary File Upload vulnerability, allowing remote attackers with regular privileges to upload and run web shells" + }, + { + "lang": "es", + "value": "Orca HCM de LEARNING DIGITAL tiene una vulnerabilidad de carga de archivos arbitrarios, lo que permite a atacantes remotos con privilegios regulares cargar y ejecutar shells web" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1389.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1389.json index 1acabc8aa07..f308fa7fb25 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1389.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1389.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Orca HCM from Learning Digital has a SQL Injection vulnerability, allowing attackers with regular privileges to inject arbitrary SQL commands to read, modify, and delete database contents." + }, + { + "lang": "es", + "value": "Orca HCM de Learning Digital tiene una vulnerabilidad de inyecci\u00f3n SQL, que permite a atacantes con privilegios regulares inyectar comandos SQL arbitrarios para leer, modificar y eliminar contenidos de bases de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json index cb00d3cd337..da83c7b51a8 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1390.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The PAM module pam_cap.so of libcap configuration supports group names starting with \u201c@\u201d, during actual parsing, configurations not starting with \u201c@\u201d are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames." + }, + { + "lang": "es", + "value": "El m\u00f3dulo PAM PAM_CAP.so de la configuraci\u00f3n de LibCap admite nombres de grupo que comienzan con \"@\", durante el an\u00e1lisis real, las configuraciones que no comienzan con \"@\" se reconocen incorrectamente como nombres de grupo. Esto puede resultar en que los usuarios no intencionados se les otorgue un conjunto de capacidad heredado, lo que podr\u00eda conducir a riesgos de seguridad. Los atacantes pueden explotar esta vulnerabilidad para lograr la escalada de privilegios locales en los sistemas donde /etc/security/capability.conf se utiliza para configurar los privilegios hereditarios de los usuarios mediante la construcci\u00f3n de nombres de usuario espec\u00edficos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json index 51ba43f8e03..1ae90f14eda 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1391.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A flaw was found in the Keycloak organization feature, which allows the incorrect assignment of an organization to a user if their username or email matches the organization\u2019s domain pattern. This issue occurs at the mapper level, leading to misrepresentation in tokens. If an application relies on these claims for authorization, it may incorrectly assume a user belongs to an organization they are not a member of, potentially granting unauthorized access or privileges." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en la funci\u00f3n de organizaci\u00f3n de Keycloak, que permite la asignaci\u00f3n incorrecta de una organizaci\u00f3n a un usuario si su nombre de usuario o correo electr\u00f3nico coincide con el patr\u00f3n de dominio de la organizaci\u00f3n. Este problema ocurre en el nivel del asignador, lo que genera una representaci\u00f3n err\u00f3nea en los tokens. Si una aplicaci\u00f3n se basa en estas afirmaciones para la autorizaci\u00f3n, puede asumir incorrectamente que un usuario pertenece a una organizaci\u00f3n de la que no es miembro, lo que podr\u00eda otorgar acceso o privilegios no autorizados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1392.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1392.json index 8c8f160addc..6bcd7986faa 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1392.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1392.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en D-Link DIR-816 1.01TO y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. La manipulaci\u00f3n del argumento SSID provoca cross site scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1414.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1414.json index 2a5e41548f7..fc76926d8c4 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1414.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1414.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory safety bugs present in Firefox 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135.0.1." + }, + { + "lang": "es", + "value": "Los errores de seguridad de la memoria presentes en Firefox 135. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de la memoria y suponemos que con suficiente esfuerzo, algunos de estos podr\u00edan haber sido explotados para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox <135.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1426.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1426.json index 7234ac9b64d..bd26d20ca65 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1426.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1426.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer de mont\u00f3n en GPU en Google Chrome en Android antes de 133.0.6943.126 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json index 188888a1baf..7dd491089fa 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1441.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.1007. This is due to missing or incorrect nonce validation on the 'wpr_filter_woo_products' function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta 1.7.1007 incluida. Esto se debe a la validaci\u00f3n de Nonce faltante o incorrecta en la funci\u00f3n 'wpr_filter_woo_products'. Esto hace posible que los atacantes no autenticados inyecten una web maliciosa scripts a trav\u00e9s de una solicitud falsificada otorgada que pueden enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json index 90ec3afe936..6f264e0e418 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1447.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in kasuganosoras Pigeon 1.0.177. It has been declared as critical. This vulnerability affects unknown code of the file /pigeon/imgproxy/index.php. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. Upgrading to version 1.0.181 is able to address this issue. The patch is identified as 84cea5fe73141689da2e7ec8676d47435bd6423e. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Kasuganosoras Pigeon 1.0.177. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta el c\u00f3digo desconocido del archivo /pigeon/imgproxy/index.php. La manipulaci\u00f3n de la URL de argumento conduce a Server-Side Request Forgery. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.0.181 puede abordar este problema. El parche se identifica como 84CEA5FE73141689DA2E7EC8676D47435BD6423E. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json index 6e020d95018..004e2195aad 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1448.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Synway SMG Gateway Management Software up to 20250204. It has been rated as critical. This issue affects some unknown processing of the file 9-12ping.php. The manipulation of the argument retry leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en el software Synway SMG Gateway Management hasta 20250204. Ha sido calificado como cr\u00edtica. Este problema afecta a alg\u00fan procesamiento desconocido del archivo 9-12ping.php. La manipulaci\u00f3n del argumento retry conduce a la inyecci\u00f3n de comando. El ataque puede iniciarse de forma remota. La exploit ha sido revelada al p\u00fablico y puede usarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1464.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1464.json index 1af01160d6c..706f76001a4 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1464.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1464.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Baiyi Cloud Asset Management System up to 20250204. This issue affects some unknown processing of the file /wuser/admin.house.collect.php. The manipulation of the argument project_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en Baiyi Cloud Asset Management System hasta 20250204. Este problema afecta a algunos procesos desconocidos del archivo /wuser/admin.house.collect.php. La manipulaci\u00f3n del argumento project_id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json index 96a901df519..b9bbc778213 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1465.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "En lmxcms 1.41 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica. Se trata de una funci\u00f3n desconocida del archivo db.inc.php del componente Maintenance. La manipulaci\u00f3n da lugar a la inyecci\u00f3n de c\u00f3digo. Es posible lanzar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1483.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1483.json index 5f051fa4355..f340fc3eac9 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1483.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1483.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LTL Freight Quotes \u2013 GlobalTranz Edition plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the engtz_wd_save_dropship AJAX endpoint in all versions up to, and including, 2.3.12. This makes it possible for unauthenticated attackers to update the drop shipping settings." + }, + { + "lang": "es", + "value": "El complemento LTL Freight Quotes \u2013 GlobalTranz Edition para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en el endpoint AJAX engtz_wd_save_dropship en todas las versiones hasta la 2.3.12 incluida. Esto permite que atacantes no autenticados actualicen la configuraci\u00f3n de env\u00edo directo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1492.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1492.json index 995875e508e..0acd09cf1d3 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1492.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1492.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file" + }, + { + "lang": "es", + "value": "Los fallos del protocolo Bundle y del disector CBOR en Wireshark 4.4.0 a 4.4.3 y 4.2.0 a 4.2.10 permiten la denegaci\u00f3n de servicio a trav\u00e9s de la inyecci\u00f3n de paquetes o un archivo de captura manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json index df7254fd58e..f59ade915a2 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Relative Path Traversal en Ping Identity PingAM Java Policy Agent permite la inyecci\u00f3n de par\u00e1metros. Este problema afecta a PingAM Java Policy Agent: hasta 5.10.3, hasta 2023.11.1, hasta 2024.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20075.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20075.json index 31622220d42..ca0c739d20b 100644 --- a/CVE-2025/CVE-2025-200xx/CVE-2025-20075.json +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20075.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Server-side request forgery (SSRF) vulnerability exists in FileMegane versions above 3.0.0.0 prior to 3.4.0.0. Executing arbitrary backend Web API requests could potentially lead to rebooting the services." + }, + { + "lang": "es", + "value": "Server-Side Request Forgery (SSRF) La vulnerabilidad existe en las versiones de Filemangane por encima de 3.0.0.0 antes de 3.4.0.0. Ejecutar solicitudes de API web arbitraria de backend podr\u00eda conducir a reiniciar los servicios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json index b95f2c0f306..22f73133f56 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20153.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device.  \r\n\r\nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el mecanismo de filtrado de correo electr\u00f3nico de Cisco Secure Email Gateway podr\u00eda permitir que un atacante remoto no autenticado eluda las reglas configuradas y permita que correos electr\u00f3nicos que deber\u00edan haber sido denegados fluyan a trav\u00e9s de un dispositivo afectado. Esta vulnerabilidad se debe a una gesti\u00f3n inadecuada del correo electr\u00f3nico que pasa a trav\u00e9s de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un correo electr\u00f3nico dise\u00f1ado a trav\u00e9s del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante eludir los filtros de correo electr\u00f3nico en el dispositivo afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json index 0a47d1c4804..efd444eb11e 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20158.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el shell de depuraci\u00f3n de Cisco Video Phone 8875 y Cisco Desk Phone 9800 Series podr\u00eda permitir que un atacante local autenticado acceda a informaci\u00f3n confidencial en un dispositivo afectado. Para explotar esta vulnerabilidad, el atacante debe tener credenciales administrativas v\u00e1lidas con acceso SSH en el dispositivo afectado. El acceso SSH est\u00e1 deshabilitado de forma predeterminada. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario por parte del shell de depuraci\u00f3n de un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un comando de cliente SSH manipulado a la CLI. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial en el sistema operativo subyacente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json index 71c790a7b9c..bdc7def89ac 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20211.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco BroadWorks Application Delivery Platform podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un v\u00ednculo manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21103.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21103.json index 1cfd162fdcb..fa05534a797 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21103.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21103.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell NetWorker Management Console, version(s) 19.11 through 19.11.0.3 & Versions prior to 19.10.0.7 contain(s) an improper neutralization of server-side vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability and run arbitrary code on the server." + }, + { + "lang": "es", + "value": "Dell NetWorker Management Console, versiones 19.11 a 19.11.0.3 y versiones anteriores a 19.10.0.7 contienen una neutralizaci\u00f3n incorrecta de la vulnerabilidad del lado del servidor. Un atacante no autenticado con acceso local podr\u00eda aprovechar esta vulnerabilidad y ejecutar c\u00f3digo arbitrario en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21105.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21105.json index 4204bfd7949..6d0dfb51b09 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21105.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21105.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data." + }, + { + "lang": "es", + "value": "Dell RecoverPoint for Virtual Machines 6.0.X contiene una vulnerabilidad de ejecuci\u00f3n de comandos. Un usuario malintencionado con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad ejecutando el binario espec\u00edfico y realizando cualquier acci\u00f3n administrativa permitida por este, lo que provocar\u00eda el apagado del servidor y la modificaci\u00f3n de la configuraci\u00f3n, lo que dar\u00eda lugar a un acceso no autorizado a datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21106.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21106.json index 046dc7ba524..32098399fe4 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21106.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21106.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system." + }, + { + "lang": "es", + "value": "Dell Recover Point for Virtual Machines 6.0.X contiene una vulnerabilidad de permisos d\u00e9biles en el sistema de archivos. Un atacante local con pocos privilegios podr\u00eda aprovechar esta vulnerabilidad, lo que afectar\u00eda \u00fanicamente a los recursos no confidenciales del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json index 07a765f876b..a26b7942185 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.583", "lastModified": "2025-02-11T18:15:27.583", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json index 68c4d66cf09..3995f7a2632 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.787", "lastModified": "2025-02-11T18:15:27.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json index 0998511e22b..3e37d84f344 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:27.977", "lastModified": "2025-02-11T18:15:27.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json index f73f06093a0..a94d57b940a 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.163", "lastModified": "2025-02-11T18:15:28.163", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json index 64d8ca5295d..d6e63fa66e6 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.347", "lastModified": "2025-02-11T18:15:28.347", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json index 243fde630f1..1d70cdc0607 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:28.747", "lastModified": "2025-02-11T18:15:28.747", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json index a2a34c5f0e7..5f42e7d1354 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21325.json @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json index 6e176f0df9d..0ea81b17e7b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21355.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network" + }, + { + "lang": "es", + "value": "Falta de autenticaci\u00f3n para la funci\u00f3n cr\u00edtica en Microsoft Bing permite a un atacante no autorizado ejecutar c\u00f3digo a trav\u00e9s de una red" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21608.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21608.json index 87394a42769..348886dd481 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21608.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21608.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Meshtastic is an open source mesh networking solution. In affected firmware versions crafted packets over MQTT are able to appear as a DM in client to a node even though they were not decoded with PKC. This issue has been addressed in version 2.5.19 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Meshtastic es una soluci\u00f3n de red de malla de c\u00f3digo abierto. En las versiones de firmware afectadas los paquetes manipulados sobre MQTT pueden aparecer como DM en el cliente a un nodo a pesar de que no estaban decodificados con PKC. Este problema se ha abordado en la versi\u00f3n 2.5.19 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json index df9f0e989af..e69d168f55f 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json @@ -3,12 +3,16 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-18T15:15:18.530", "lastModified": "2025-02-18T15:15:18.530", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch->limit == 0\n\nExpected behaviour:\nIn case we reach scheduler's limit, pfifo_tail_enqueue() will drop a\npacket in scheduler's queue and decrease scheduler's qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler's qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch->limit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the 'drop a packet' step will do nothing.\nThis means the scheduler's qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler's qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet's say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A's type must have '->graft()' function to create parent/child relationship.\n Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch->limit == 0`.\n - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B->q.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` => hfsc_enqueue() don't increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A->q.qlen == 0 and Qdisc_B->q.qlen == 1.\nReplace 'hfsc' with other type (for example: 'drr') still lead to the same problem.\nThis violate the design where parent's qlen should equal to the sum of its childrens'qlen.\n\nBug impact: This issue can be used for user->kernel privilege escalation when it is reachable." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pfifo_tail_enqueue: Descartar nuevo paquete cuando sch->limit == 0 Comportamiento esperado: En caso de que alcancemos el l\u00edmite del planificador, pfifo_tail_enqueue() descartar\u00e1 un paquete en la cola del planificador y disminuir\u00e1 el qlen del planificador en uno. Luego, pfifo_tail_enqueue() pone en cola un nuevo paquete y aumenta el qlen del planificador en uno. Finalmente, pfifo_tail_enqueue() devuelve el c\u00f3digo de estado `NET_XMIT_CN`. Comportamiento extra\u00f1o: En caso de que establezcamos `sch->limit == 0` y activemos pfifo_tail_enqueue() en un planificador que no tiene ning\u00fan paquete, el paso 'descartar un paquete' no har\u00e1 nada. Esto significa que el qlen del planificador todav\u00eda tiene un valor igual a 0. Luego, continuamos poniendo en cola un nuevo paquete y aumentamos el qlen del planificador en uno. En resumen, podemos aprovechar pfifo_tail_enqueue() para aumentar qlen en uno y devolver el c\u00f3digo de estado `NET_XMIT_CN`. El problema es: digamos que tenemos dos qdiscs: Qdisc_A y Qdisc_B. - El tipo de Qdisc_A debe tener la funci\u00f3n '->graft()' para crear una relaci\u00f3n padre/hijo. Digamos que el tipo de Qdisc_A es `hfsc`. Poner en cola un paquete en esta qdisc activar\u00e1 `hfsc_enqueue`. - El tipo de Qdisc_B es pfifo_head_drop. Poner en cola un paquete en esta qdisc activar\u00e1 `pfifo_tail_enqueue`. - Qdisc_B est\u00e1 configurado para tener `sch->limit == 0`. - Qdisc_A est\u00e1 configurado para enrutar el paquete en cola a Qdisc_B. Poner en cola un paquete a trav\u00e9s de Qdisc_A conducir\u00e1 a: - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B) - Qdisc_B->q.qlen += 1 - pfifo_tail_enqueue() devuelve `NET_XMIT_CN` - hfsc_enqueue() comprueba `NET_XMIT_SUCCESS` y ve `NET_XMIT_CN` => hfsc_enqueue() no aumenta el qlen de Qdisc_A. Todo el proceso conduce a una situaci\u00f3n en la que Qdisc_A->q.qlen == 0 y Qdisc_B->q.qlen == 1. Reemplazar 'hfsc' por otro tipo (por ejemplo: 'drr') sigue conduciendo al mismo problema. Esto viola el dise\u00f1o donde el qlen del padre debe ser igual a la suma del qlen de sus hijos. Impacto del error: este problema se puede utilizar para la escalada de privilegios de usuario a kernel cuando sea posible." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json index 8718b6efaad..cb2ef7b43f1 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security@joomla.org", "published": "2025-02-18T16:15:20.467", "lastModified": "2025-02-18T16:15:20.467", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_scheduler." + }, + { + "lang": "es", + "value": "Las cl\u00e1usulas de orden construidas incorrectamente provocan una vulnerabilidad de inyecci\u00f3n SQL en la lista de tareas del backend de com_scheduler." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22284.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22284.json index 6c01114c824..27f06462d58 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22284.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22284.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in enituretechnology LTL Freight Quotes \u2013 Unishippers Edition allows Reflected XSS. This issue affects LTL Freight Quotes \u2013 Unishippers Edition: from n/a through 2.5.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en enituretechnology LTL Freight Quotes \u2013 Unishippers Edition permite XSS reflejado. Este problema afecta a LTL Freight Quotes \u2013 Unishippers Edition: desde n/d hasta 2.5.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22286.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22286.json index 4f31eae535d..151642d6041 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22286.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22286.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in enituretechnology LTL Freight Quotes \u2013 Worldwide Express Edition allows Reflected XSS. This issue affects LTL Freight Quotes \u2013 Worldwide Express Edition: from n/a through 5.0.21." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en enituretechnology LTL Freight Quotes \u2013 Worldwide Express Edition permite XSS reflejado. Este problema afecta a LTL Freight Quotes \u2013 Worldwide Express Edition: desde n/a hasta 5.0.21." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22289.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22289.json index b1f6ab29917..7ebd7c1e9ff 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22289.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22289.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in NotFound LTL Freight Quotes \u2013 Unishippers Edition allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LTL Freight Quotes \u2013 Unishippers Edition: from n/a through 2.5.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en NotFound LTL Freight Quotes \u2013 Unishippers Edition permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a LTL Freight Quotes \u2013 Unishippers Edition: desde n/d hasta 2.5.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22290.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22290.json index 525ad21b595..ef103c85f2b 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22290.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22290.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in enituretechnology LTL Freight Quotes \u2013 FreightQuote Edition allows SQL Injection. This issue affects LTL Freight Quotes \u2013 FreightQuote Edition: from n/a through 2.3.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en enituretechnology LTL Freight Quotes \u2013 FreightQuote Edition permite la inyecci\u00f3n SQL. Este problema afecta a LTL Freight Quotes \u2013 FreightQuote Edition: desde n/a hasta 2.3.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22291.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22291.json index 88e09a6a46b..5b847831fe5 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22291.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22291.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in enituretechnology LTL Freight Quotes \u2013 Worldwide Express Edition allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LTL Freight Quotes \u2013 Worldwide Express Edition: from n/a through 5.0.20." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en enituretechnology LTL Freight Quotes \u2013 Worldwide Express Edition permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a LTL Freight Quotes \u2013 Worldwide Express Edition: desde n/a hasta 5.0.20." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22622.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22622.json index 285edd2b6ae..0a5d7907ba4 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22622.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22622.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Age Verification for your checkout page. Verify your customer's identity 1.20.0 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/class-wc-integration-agechecker-integration.php." + }, + { + "lang": "es", + "value": "Verificaci\u00f3n de edad para su p\u00e1gina de pago. Verificar la identidad de su cliente 1.20.0 se encontr\u00f3 que era vulnerable. La aplicaci\u00f3n web genera din\u00e1micamente contenido web sin validar la fuente de los datos potencialmente no confiables en MyApp/Class-WC-Integration-Agechecker-Integration.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22630.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22630.json index 024c0b8917e..ea89f728c72 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22630.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22630.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in MarketingFire Widget Options allows OS Command Injection.This issue affects Widget Options: from n/a through 4.1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando ('Inyecci\u00f3n de comando') en MarketingFire Widget Options permite la inyecci\u00f3n de comandos del sistema operativo. Este problema afecta a las Opciones de widget: desde n/a hasta 4.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22639.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22639.json index 710b36e7187..0965ba21f42 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22639.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22639.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Distance Rate Shipping for WooCommerce allows Blind SQL Injection. This issue affects Distance Rate Shipping for WooCommerce: from n/a through 1.3.4." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('inyecci\u00f3n SQL') vulnerabilidad en NotFound Distance Rate Shipping for WooCommerce permite Blind SQL inyecci\u00f3n. Este problema afecta el env\u00edo de la tasa de distancia para WooCommerce: desde N/A hasta 1.3.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22645.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22645.json index 900b41e5bf8..4eedff92ad4 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22645.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22645.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Restriction of Excessive Authentication Attempts vulnerability in Rameez Iqbal Real Estate Manager allows Password Brute Forcing. This issue affects Real Estate Manager: from n/a through 7.3." + }, + { + "lang": "es", + "value": "La restricci\u00f3n inadecuada de los intentos de autenticaci\u00f3n excesivos de vulnerabilidad en Rameez Iqbal Real Estate Manager permite el forzamiento bruto de contrase\u00f1a. Este problema afecta al administrador de bienes ra\u00edces: desde N/A hasta 7.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22650.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22650.json index ec267f2e965..ca878e87cf1 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22650.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Erez Hadas-Sonnenschein Smartarget allows Stored XSS. This issue affects Smartarget: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Erez Hadas-Sonnenschein Smartarget permite XSS almacenado. Este problema afecta a Smartarget: desde N/A hasta 1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22654.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22654.json index 831d926f7b8..abab54ac850 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22654.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22654.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in kodeshpa Simplified allows Using Malicious Files. This issue affects Simplified: from n/a through 1.0.6." + }, + { + "lang": "es", + "value": "La carga sin restricciones de archivo con vulnerabilidad de tipo peligroso en Kodeshpa Simplified permite usar archivos maliciosos. Este problema afecta a Simplified: desde N/A hasta 1.0.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22656.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22656.json index cdef4b6cac7..fcede5bdf94 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22656.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22656.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Oscar Alvarez Cookie Monster allows PHP Local File Inclusion. This issue affects Cookie Monster: from n/a through 1.2.2." + }, + { + "lang": "es", + "value": "Control inadecuado del nombre de archivo para la declaraci\u00f3n de inclusi\u00f3n de incluir/requerir en la vulnerabilidad del programa PHP ('PHP Remote File Anchusion') en Oscar Alvarez Cookie Monster permite la inclusi\u00f3n de archivos locales de PHP. Este problema afecta a Cookie Monster: desde N/A hasta 1.2.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22657.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22657.json index 6b6b992224c..98cbc48de01 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22657.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22657.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Vito Peleg Atarim allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Atarim: from n/a through 4.0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de la autorizaci\u00f3n faltante en Vito Peleg Atarim permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Atarim: desde N/A hasta 4.0.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22663.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22663.json index 2a1c4f42b81..a14512cc663 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22663.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22663.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper Paid Videochat Turnkey Site allows Path Traversal. This issue affects Paid Videochat Turnkey Site: from n/a through 7.2.12." + }, + { + "lang": "es", + "value": "Limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido ('Path Traversal') Vulnerabilidad en videowhisper Paid Videochat Turnkey Site permite Path Traversal. Este problema afecta el sitio llave en mano de VideoChat pagado: desde N/A hasta 7.2.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22676.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22676.json index 235d16f0979..a90ed063a6f 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22676.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in upcasted AWS S3 for WordPress Plugin \u2013 Upcasted allows Stored XSS. This issue affects AWS S3 for WordPress Plugin \u2013 Upcasted: from n/a through 3.0.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en upcasted AWS S3 for WordPress Plugin \u2013 Upcasted permite XSS almacenado. Este problema afecta al complemento AWS S3 para WordPress de Upcasted: desde n/a hasta 3.0.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22680.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22680.json index 99758fcde9f..fb13d31860c 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22680.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22680.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Ad Inserter Pro allows Reflected XSS. This issue affects Ad Inserter Pro: from n/a through 2.7.39." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Ad Inserter Pro permite XSS reflejado. Este problema afecta a Ad Inserter Pro: desde n/a hasta 2.7.39." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22689.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22689.json index cff683b7e9d..1016da3afb7 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22689.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22689.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Levan Tarbor Forex Calculators allows Stored XSS. This issue affects Forex Calculators: from n/a through 1.3.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Levan Tarbor Forex Calculators permite XSS almacenado. Este problema afecta a las calculadoras Forex desde la versi\u00f3n n/a hasta la 1.3.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22698.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22698.json index 8df2e1936ab..594d7cd9232 100644 --- a/CVE-2025/CVE-2025-226xx/CVE-2025-22698.json +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22698.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Ability, Inc Accessibility Suite by Online ADA allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Accessibility Suite by Online ADA: from n/a through 4.16." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Ability, Inc Accessibility Suite by Online ADA permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Accessibility Suite by Online ADA: desde n/a hasta 4.16." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22702.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22702.json index 3a611d5fd51..9dc5ff8c416 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22702.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22702.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en EPC Photography. Este problema afecta a Photography: desde n/a hasta 7.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22705.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22705.json index 46c3710a986..fa517f941a0 100644 --- a/CVE-2025/CVE-2025-227xx/CVE-2025-22705.json +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22705.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in godthor Disqus Popular Posts allows Reflected XSS. This issue affects Disqus Popular Posts: from n/a through 2.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Disqus Popular Posts de godthor permite XSS reflejado. Este problema afecta a Disqus Popular Posts: desde n/a hasta 2.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json index 4e4dabda49d..660cf0a02dd 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22888.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Movable Type contains a stored cross-site scripting vulnerability in the custom block edit page of MT Block Editor. If exploited, an arbitrary script may be executed on a logged-in user's web browser." + }, + { + "lang": "es", + "value": "El tipo m\u00f3vil contiene una vulnerabilidad Cross-Site Scripting Almacenado en la p\u00e1gina de edici\u00f3n de bloque personalizado del editor de bloques MT. Si se explota, un arbitrario script puede ejecutarse en el navegador web de un usuario iniciado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json index f6b2526613a..334ced976c0 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22960.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de secuestro de sesi\u00f3n en la interfaz de administraci\u00f3n basada en web de los transmisores GatesAir Maxiva UAXT y VAXT. Los atacantes no autenticados pueden acceder a los archivos de registro expuestos (/logs/debug/xteLog*), lo que podr\u00eda revelar informaci\u00f3n confidencial relacionada con la sesi\u00f3n, como los identificadores de sesi\u00f3n (sess_id) y los tokens de \u00e9xito de la autenticaci\u00f3n (user_check_password OK). La explotaci\u00f3n de esta falla podr\u00eda permitir a los atacantes secuestrar sesiones activas, obtener acceso no autorizado y aumentar los privilegios en los dispositivos afectados." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json index 18627cb9705..ae7cdb33150 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22961.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A critical information disclosure vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters due to Incorrect Access Control (CWE-284). Unauthenticated attackers can directly access sensitive database backup files (snapshot_users.db) via publicly exposed URLs (/logs/devcfg/snapshot/ and /logs/devcfg/user/). Exploiting this vulnerability allows retrieval of sensitive user data, including login credentials, potentially leading to full system compromise." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad cr\u00edtica de divulgaci\u00f3n de informaci\u00f3n en la interfaz de administraci\u00f3n basada en web de los transmisores GatesAir Maxiva UAXT, VAXT debido a un control de acceso incorrecto (CWE-284). Los atacantes no autenticados pueden acceder directamente a archivos de respaldo de bases de datos confidenciales (snapshot_users.db) a trav\u00e9s de URL expuestas p\u00fablicamente (/logs/devcfg/snapshot/ y /logs/devcfg/user/). La explotaci\u00f3n de esta vulnerabilidad permite la recuperaci\u00f3n de datos confidenciales de usuarios, incluidas las credenciales de inicio de sesi\u00f3n, lo que puede provocar un compromiso total del sistema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json index 808a0759fc9..cc500bb13ea 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22962.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad cr\u00edtica de ejecuci\u00f3n remota de c\u00f3digo (RCE) en la interfaz de administraci\u00f3n basada en web de los transmisores GatesAir Maxiva UAXT y VAXT cuando est\u00e1 habilitado el modo de depuraci\u00f3n. Un atacante con un ID de sesi\u00f3n v\u00e1lido (sess_id) puede enviar solicitudes POST especialmente manipuladas al endpoint /json, lo que permite la ejecuci\u00f3n arbitraria de comandos en el sistema subyacente. Esta vulnerabilidad puede provocar un compromiso total del sistema, incluido el acceso no autorizado, la escalada de privilegios y, potencialmente, la toma de control total del dispositivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23020.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23020.json index b02f6875be4..15b20161071 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23020.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs)." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Kwik antes de 0.10.1. Una vulnerabilidad de colisi\u00f3n hash (en la tabla hash utilizada para administrar conexiones) permite a los atacantes remotos causar una carga de CPU considerable en el servidor (un ataque de hash DOS) al iniciar conexiones con ID de conexi\u00f3n de origen colisionales (SCID)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23406.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23406.json index cf5e1414ca2..eb4978069bf 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23406.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23406.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Out-of-bounds read vulnerability caused by improper checking of TCP MSS option values exists in Cente middleware TCP/IP Network Series, which may lead to processing a specially crafted packet to cause the affected product crashed." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites causada por una verificaci\u00f3n incorrecta de los valores de las opciones TCP MSS en el middleware TCP/IP Network Series de Cente, lo que puede llevar al procesamiento de un paquete especialmente manipulado para provocar el bloqueo del producto afectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23428.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23428.json index 6e1d6550e9a..5caf190e70e 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23428.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23428.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound QMean \u2013 WordPress Did You Mean allows Reflected XSS. This issue affects QMean \u2013 WordPress Did You Mean: from n/a through 2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound QMean \u2013 WordPress Did You Mean permite XSS reflejado. Este problema afecta a QMean \u2013 WordPress Did You Mean: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23431.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23431.json index e60dcac56b4..82f8180814c 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23431.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23431.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Envato Affiliater allows Reflected XSS. This issue affects Envato Affiliater: from n/a through 1.2.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Envato Affiliater permite XSS reflejado. Este problema afecta a Envato Affiliater: desde n/a hasta 1.2.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23474.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23474.json index 008daf1cb95..10e7fd4b754 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23474.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23474.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mike Martel Live Dashboard allows Reflected XSS. This issue affects Live Dashboard: from n/a through 0.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Mike Martel Live Dashboard permite XSS reflejado. Este problema afecta a Live Dashboard: desde n/a hasta 0.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23492.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23492.json index 10f3eb64cf3..8fb98a780f5 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23492.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23492.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CantonBolo WordPress \u6dd8\u5b9d\u5ba2\u63d2\u4ef6 allows Reflected XSS. This issue affects WordPress \u6dd8\u5b9d\u5ba2\u63d2\u4ef6: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en CantonBolo WordPress ????? permite XSS Reflected. Este problema afecta a las versiones de WordPress: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23523.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23523.json index 739c7ad7797..3b45e3ecca9 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23523.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23523.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hoststreamsell HSS Embed Streaming Video allows Reflected XSS. This issue affects HSS Embed Streaming Video: from n/a through 3.23." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en HSS Embed Streaming Video de hoststreamsell que permite XSS reflejado. Este problema afecta a HSS Embed Streaming Video: desde n/a hasta 3.23." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23525.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23525.json index dc670a1b703..c9a68664d33 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23525.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23525.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kvvaradha Kv Compose Email From Dashboard allows Reflected XSS. This issue affects Kv Compose Email From Dashboard: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en kvvaradha Kv Compose Email From Dashboard permite XSS reflejado. Este problema afecta a Kv Compose Email From Dashboard: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23534.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23534.json index 33812f8fb86..44d5043bbeb 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23534.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23534.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Mark Winiarski WPLingo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WPLingo: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en WPLingo de Mark Winiarski permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WPLingo: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23568.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23568.json index 922dd03c573..a3f8bcadca5 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23568.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23568.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fredsted WP Login Attempt Log allows Reflected XSS. This issue affects WP Login Attempt Log: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en fredsted WP Login Attempt Log permite XSS reflejado. Este problema afecta a WP Login Attempt Log: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23571.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23571.json index 8fb0464803e..27ab497a06d 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23571.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23571.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Internal Links Generator allows Reflected XSS. This issue affects Internal Links Generator: from n/a through 3.51." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Internal Links Generator permite XSS reflejado. Este problema afecta al generador de enlaces internos: desde n/a hasta 3.51." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23598.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23598.json index eec7acd1504..c03fba52f1a 100644 --- a/CVE-2025/CVE-2025-235xx/CVE-2025-23598.json +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23598.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in craig.edmunds@gmail.com Recip.ly allows Reflected XSS. This issue affects Recip.ly: from n/a through 1.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en craig.edmunds@gmail.com Recip.ly permite XSS reflejado. Este problema afecta a Recip.ly: desde n/a hasta 1.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23646.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23646.json index 3bd94e6c3a4..d52449aa3fb 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23646.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23646.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matt Brooks Library Instruction Recorder allows Reflected XSS. This issue affects Library Instruction Recorder: from n/a through 1.1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Matt Brooks Library Instruction Recorder permite XSS reflejado. Este problema afecta al registrador de instrucciones de la librer\u00eda: desde n/a hasta 1.1.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23647.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23647.json index 8169b19e8c5..7ed469fdf3e 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23647.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23647.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ariagle WP-Clap allows Reflected XSS. This issue affects WP-Clap: from n/a through 1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Ariagle WP-Clap permite XSS reflejado. Este problema afecta a WP-Clap: desde n/a hasta 1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23648.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23648.json index c43a33f5323..7b3dbacba3e 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23648.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23648.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wjharil AdsMiddle allows Reflected XSS. This issue affects AdsMiddle: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en wjharil AdsMiddle que permite XSS reflejado. Este problema afecta a AdsMiddle: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23650.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23650.json index 68bcb4350e2..34caacfb56a 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23650.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23650.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in razvypp Tidy.ro allows Reflected XSS. This issue affects Tidy.ro: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en razvypp Tidy.ro permite XSS reflejado. Este problema afecta a Tidy.ro: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23651.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23651.json index fec2070aa36..b5ba2588a46 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23651.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23651.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Scroll Top allows Reflected XSS. This issue affects Scroll Top: from n/a through 1.3.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Scroll Top permite XSS reflejado. Este problema afecta a Scroll Top: desde n/a hasta 1.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23652.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23652.json index dcf60967238..9ff6ee2ea0d 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23652.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23652.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Add custom content after post allows Reflected XSS. This issue affects Add custom content after post: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Add custom content after post permite XSS reflejado. Este problema afecta a Add custom content after post: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23653.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23653.json index 6e17ddcf06a..144f6f35e71 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23653.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23653.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Form To Online Booking allows Reflected XSS. This issue affects Form To Online Booking: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Form To Online Booking permite XSS reflejado. Este problema afecta a Form To Online Booking: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23655.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23655.json index 60a07eb4fe0..dc71a0c788e 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23655.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23655.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Contact Form 7 \u2013 Paystack Add-on allows Reflected XSS. This issue affects Contact Form 7 \u2013 Paystack Add-on: from n/a through 1.2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Contact Form 7 \u2013 Paystack Add-on permite XSS reflejado. Este problema afecta a Contact Form 7 \u2013 Paystack Add-on: desde n/a hasta 1.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23657.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23657.json index 74e0385a4b4..e1dacc06a00 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23657.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23657.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WordPress-to-candidate for Salesforce CRM allows Reflected XSS. This issue affects WordPress-to-candidate for Salesforce CRM: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound WordPress-to-candidate for Salesforce CRM permite XSS reflejado. Este problema afecta a WordPress-to-candidate for Salesforce CRM: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23658.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23658.json index 1b5746279f9..dae8aaa29e5 100644 --- a/CVE-2025/CVE-2025-236xx/CVE-2025-23658.json +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23658.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tauhidul Alam Advanced Angular Contact Form allows Reflected XSS. This issue affects Advanced Angular Contact Form: from n/a through 1.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tauhidul Alam Advanced Angular Contact Form permite XSS reflejado. Este problema afecta a Advanced Angular Contact Form: desde n/a hasta 1.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23742.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23742.json index 578fc9fc55a..aa05dc9f8d8 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23742.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23742.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Podamibe Nepal Podamibe Twilio Private Call allows Reflected XSS. This issue affects Podamibe Twilio Private Call: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Podamibe Nepal Podamibe Twilio Private Call permite XSS reflejado. Este problema afecta a Podamibe Twilio Private Call: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23748.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23748.json index 8665546e57b..f28322ad05b 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23748.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23748.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Singsys -Awesome Gallery allows Reflected XSS. This issue affects Singsys -Awesome Gallery: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Singsys -Awesome Gallery permite XSS reflejado. Este problema afecta a Singsys -Awesome Gallery: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23750.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23750.json index 70a8944c959..3b22d7d082b 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23750.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23750.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in devbunchuk Custom Widget Creator allows Reflected XSS. This issue affects Custom Widget Creator: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en devbunchuk Custom Widget Creator que permite XSS reflejado. Este problema afecta a Custom Widget Creator: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23751.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23751.json index 0dc523b027a..18eb279480b 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23751.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23751.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 Data Dash allows Reflected XSS. This issue affects Data Dash: from n/a through 1.2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Think201 Data Dash que permite XSS reflejado. Este problema afecta a Data Dash: desde n/a hasta 1.2.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23766.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23766.json index 6ce9c67156c..d141607fd75 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23766.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23766.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in ashamil OPSI Israel Domestic Shipments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects OPSI Israel Domestic Shipments: from n/a through 2.6.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en ashamil OPSI Israel Domestic Shipments permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a los env\u00edos nacionales de OPSI Israel: desde n/a hasta 2.6.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23771.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23771.json index 45846465858..6f461454b53 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23771.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23771.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Murali Push Notification for Post and BuddyPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Push Notification for Post and BuddyPress: from n/a through 2.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Murali Push Notification for Post and BuddyPress permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a las notificaciones push para Post y BuddyPress desde n/d hasta 2.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23786.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23786.json index 65b3cf59091..6ab498d47b1 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23786.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23786.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DuoGeek Email to Download allows Reflected XSS. This issue affects Email to Download: from n/a through 3.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en DuoGeek Email to Download permite XSS reflejado. Este problema afecta a Email to Download: desde n/a hasta 3.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23787.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23787.json index 71e1f027b41..bcc2937f872 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23787.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23787.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Bet allows Reflected XSS. This issue affects Easy Bet: from n/a through 1.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Easy Bet permite XSS reflejado. Este problema afecta a Easy Bet: desde n/a hasta 1.0.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23788.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23788.json index de4801070f0..df56ae84bea 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23788.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23788.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Filter allows Reflected XSS. This issue affects Easy Filter: from n/a through 1.10." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Easy Filter permite XSS reflejado. Este problema afecta a Easy Filter: desde n/a hasta 1.10." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23789.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23789.json index 2eb12692188..bb78f3cf5a2 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23789.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23789.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tahminajannat URL Shortener | Conversion Tracking | AB Testing | WooCommerce allows Reflected XSS. This issue affects URL Shortener | Conversion Tracking | AB Testing | WooCommerce: from n/a through 9.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en tahminajannat URL Shortener | Conversion Tracking | AB Testing | WooCommerce permite XSS reflejado. Este problema afecta a URL Shortener | Conversion Tracking | AB Testing | WooCommerce: desde n/a hasta 9.0.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23790.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23790.json index efefd5531b5..a6532ddbf9d 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23790.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23790.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wassereimer Easy Code Placement allows Reflected XSS. This issue affects Easy Code Placement: from n/a through 18.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Easy Code Placement de wassereimer que permite XSS reflejado. Este problema afecta a Easy Code Placement: desde n/a hasta 18.11." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json index c613d8ca60d..15dba9b794b 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webjema WP-NOTCAPTCHA allows Reflected XSS. This issue affects WP-NOTCAPTCHA: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en webjema WP-NOTCAPTCHA permite XSS reflejado. Este problema afecta a WP-NOTCAPTCHA: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json index 438ce0121d5..02bbf14f363 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ERA404 ImageMeta allows Reflected XSS. This issue affects ImageMeta: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en ERA404 ImageMeta permite XSS reflejado. Este problema afecta a ImageMeta: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23851.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23851.json index ab7bebe36a4..99a8f976132 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23851.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23851.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Coronavirus (COVID-19) Outbreak Data Widgets allows Reflected XSS. This issue affects Coronavirus (COVID-19) Outbreak Data Widgets: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross Site Scripting') en NotFound Coronavirus (COVID-19) Outbreak Data Widgets permite XSS reflejado. Este problema afecta a los widgets de datos del brote de coronavirus (COVID-19): desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23853.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23853.json index 7b0da787e56..3c6a145488f 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23853.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23853.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in michelem NoFollow Free allows Reflected XSS. This issue affects NoFollow Free: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NoFollow Free de Michelem que permite XSS reflejado. Este problema afecta a NoFollow Free: desde n/a hasta 1.6.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23857.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23857.json index dfbc2ea9a10..abd3e38aff7 100644 --- a/CVE-2025/CVE-2025-238xx/CVE-2025-23857.json +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23857.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Essential WP Real Estate allows Reflected XSS. This issue affects Essential WP Real Estate: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Essential WP Real Estate permite XSS reflejado. Este problema afecta a Essential WP Real Estate: desde n/a hasta 1.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23905.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23905.json index 5189b3978b4..e3efe9f31f1 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23905.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23905.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Johannes van Poelgeest Admin Options Pages allows Reflected XSS. This issue affects Admin Options Pages: from n/a through 0.9.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Johannes van Poelgeest Admin Options Pages permite XSS reflejado. Este problema afecta a las p\u00e1ginas de opciones de administraci\u00f3n: desde n/a hasta 0.9.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23975.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23975.json index dceb733c70c..5032ee5fb64 100644 --- a/CVE-2025/CVE-2025-239xx/CVE-2025-23975.json +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23975.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Botnet Attack Blocker allows Stored XSS. This issue affects Botnet Attack Blocker: from n/a through 2.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Botnet Attack Blocker permite XSS almacenado. Este problema afecta a Botnet Attack Blocker: desde n/a hasta 2.0.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json index cbe85e5da33..b6fad1385ad 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24406.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@adobe.com", "published": "2025-02-11T18:15:41.300", "lastModified": "2025-02-11T18:15:41.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24554.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24554.json index bb14a455165..c791c168d1f 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24554.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24554.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in awcode AWcode Toolkit allows Reflected XSS. This issue affects AWcode Toolkit: from n/a through 1.0.14." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en awcode AWcode Toolkit permite XSS reflejado. Este problema afecta a AWcode Toolkit: desde n/a hasta 1.0.14." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24558.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24558.json index 6739f6b4930..489c18e3fea 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24558.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24558.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks allows Reflected XSS. This issue affects CRM Perks: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en CRM Perks CRM Perks permite XSS reflejado. Este problema afecta a CRM Perks: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24564.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24564.json index d127ce99ebe..b075a979969 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24564.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24564.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aviplugins.com Contact Form With Shortcode allows Reflected XSS. This issue affects Contact Form With Shortcode: from n/a through 4.2.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en aviplugins.com Contact Form With Shortcode que permite XSS reflejado. Este problema afecta al formulario de contacto con c\u00f3digo corto: desde n/a hasta 4.2.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24565.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24565.json index 9b84cba3801..548d092096a 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24565.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24565.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder Team Tobias WP2LEADS allows Reflected XSS. This issue affects WP2LEADS: from n/a through 3.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Saleswonder Team Tobias WP2LEADS permite XSS reflejado. Este problema afecta a WP2LEADS: desde n/a hasta 3.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24566.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24566.json index 54339a66f78..5011d9de84e 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24566.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24566.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tom\u00e1\u0161 Groul\u00edk Intro Tour Tutorial DeepPresentation allows Reflected XSS. This issue affects Intro Tour Tutorial DeepPresentation: from n/a through 6.5.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Tom\u00e1\u0161 Groul\u00edk Intro Tour Tutorial DeepPresentation permite XSS reflejado. Este problema afecta a Intro Tour Tutorial DeepPresentation: desde n/a hasta 6.5.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24567.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24567.json index 6a0c16348d6..b0600008516 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24567.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24567.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data. This issue affects WP Mailster: from n/a through 1.8.16.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en brandtoss WP Mailster permite recuperar datos confidenciales incrustados. Este problema afecta a WP Mailster: desde n/a hasta 1.8.16.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24592.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24592.json index 8ab5b285968..4289f4c4f6e 100644 --- a/CVE-2025/CVE-2025-245xx/CVE-2025-24592.json +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24592.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SysBasics Customize My Account for WooCommerce allows Reflected XSS. This issue affects Customize My Account for WooCommerce: from n/a through 2.8.22." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Customize My Account for WooCommerce de SysBasics permite XSS reflejado. Este problema afecta a Customize My Account for WooCommerce: desde n/a hasta 2.8.22." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24607.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24607.json index 338b6e2ae68..70f26f50b3e 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24607.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24607.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Northern Beaches Websites IdeaPush allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects IdeaPush: from n/a through 8.71." + }, + { + "lang": "es", + "value": "Vulnerabilidad de falta de autorizaci\u00f3n en Northern Beaches Websites IdeaPushh permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a IdeaPush: desde n/a hasta 8.71." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24614.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24614.json index 9c339f9619c..10ce7276b9b 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24614.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24614.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in agileLogix Post Timeline allows Reflected XSS. This issue affects Post Timeline: from n/a through 2.3.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Post Timeline de agileLogix permite XSS reflejado. Este problema afecta a Post Timeline: desde n/a hasta 2.3.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24615.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24615.json index 36e9f4db15f..c2630a2bad3 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24615.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24615.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Analytics Cat allows Reflected XSS. This issue affects Analytics Cat: from n/a through 1.1.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en fatcatapps Analytics Cat permite XSS reflejado. Este problema afecta a Analytics Cat: desde n/a hasta 1.1.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24616.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24616.json index c96f4f934df..6178d9a3e3e 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24616.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24616.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UIUX Lab Uix Page Builder allows Reflected XSS. This issue affects Uix Page Builder: from n/a through 1.7.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en UIUX Lab Uix Page Builder permite XSS reflejado. Este problema afecta a Uix Page Builder: desde n/a hasta 1.7.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24617.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24617.json index ddaa4172bf3..32b380cf2e4 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24617.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24617.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AcyMailing Newsletter Team AcyMailing SMTP Newsletter allows Reflected XSS. This issue affects AcyMailing SMTP Newsletter: from n/a through n/a." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AcyMailing Newsletter Team AcyMailing SMTP Newsletter permite XSS reflejado. Este problema afecta al equipo de AcyMailing SMTP Newsletter: desde n/d hasta n/d." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24641.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24641.json index b1e9f486661..bc8f99d716c 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24641.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24641.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rickonline_nl Better WishList API allows Stored XSS. This issue affects Better WishList API: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en la API Better WishList de rickonline_nl que permite XSS almacenado. Este problema afecta a la API Better WishList: desde n/a hasta 1.1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24688.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24688.json index cf06e4e2fda..295cedad376 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24688.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24688.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brandtoss WP Mailster allows Reflected XSS. This issue affects WP Mailster: from n/a through 1.8.20.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en brandtoss WP Mailster permite XSS reflejado. Este problema afecta a WP Mailster: desde n/a hasta 1.8.20.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24692.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24692.json index 2895fa41999..e717acf2963 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24692.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24692.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Michael Revellin-Clerc Bulk Menu Edit allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Bulk Menu Edit: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Bulk Menu Edit de Michael Revellin-Clerc permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Bulk Menu Edit: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24699.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24699.json index d2ae465fa6d..a1252d5b070 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24699.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24699.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company WP Coder allows Cross-Site Scripting (XSS). This issue affects WP Coder: from n/a through 3.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Wow-Company WP Coder permite la ejecuci\u00f3n de Cross Site Scripting (XSS). Este problema afecta a WP Coder: desde n/a hasta 3.6." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24700.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24700.json index 3733acc4daa..f296cb27537 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24700.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24700.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xylus Themes WP Event Aggregator allows Reflected XSS. This issue affects WP Event Aggregator: from n/a through 1.8.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Xylus Themes WP Event Aggregator permite XSS reflejado. Este problema afecta a WP Event Aggregator: desde n/a hasta 1.8.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24806.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24806.json index 4439c5978e6..c91074656aa 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24806.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24806.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It's important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it's effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address." + }, + { + "lang": "es", + "value": "Authelia es un servidor de autenticaci\u00f3n y autorizaci\u00f3n de c\u00f3digo abierto que proporciona autenticaci\u00f3n de dos factores e inicio de sesi\u00f3n \u00fanico (SSO) para aplicaciones a trav\u00e9s de un portal web. Si se permite a los usuarios iniciar sesi\u00f3n tanto con nombre de usuario como con correo electr\u00f3nico, el sistema de regulaci\u00f3n los trata como eventos de inicio de sesi\u00f3n separados. Esto hace que las limitaciones de la regulaci\u00f3n se dupliquen en la pr\u00e1ctica, suponiendo que un atacante utilice la fuerza bruta para encontrar la contrase\u00f1a de un usuario. Es importante se\u00f1alar que, debido al funcionamiento eficaz de la regulaci\u00f3n, en el que no hay ninguna se\u00f1al visible para el usuario de su prohibici\u00f3n de regulaci\u00f3n, ya sea mediante el tiempo o mediante respuestas de API, es pr\u00e1cticamente imposible determinar si se produce una falla debido a una combinaci\u00f3n incorrecta de nombre de usuario y contrase\u00f1a, o una prohibici\u00f3n efectiva que bloquea el intento, lo que mitiga en gran medida cualquier forma de fuerza bruta. Esto ocurre porque el proceso de registros y recuento de este sistema utiliza el m\u00e9todo utilizado para iniciar sesi\u00f3n en lugar del atributo de nombre de usuario efectivo. Esto tiene un impacto m\u00ednimo en la seguridad de la cuenta; este impacto aumenta naturalmente en escenarios en los que no se requiere autenticaci\u00f3n de dos factores y se utilizan contrase\u00f1as d\u00e9biles. Esto hace que sea un poco m\u00e1s f\u00e1cil forzar una contrase\u00f1a. Se ha aplicado un parche para este problema a las versiones 4.38.19 y 4.39.0. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben 1. No modificar en gran medida la configuraci\u00f3n predeterminada de una manera que termine con prohibiciones de regulaci\u00f3n m\u00e1s breves o menos frecuentes. La configuraci\u00f3n predeterminada mitiga de manera efectiva cualquier posibilidad de que se explote este problema. y 2. Deshabilitar la capacidad de los usuarios de iniciar sesi\u00f3n a trav\u00e9s de una direcci\u00f3n de correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json index 5a7557dc0c8..28f939ad082 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24841.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Movable Type contains a stored cross-site scripting vulnerability in the HTML edit mode of MT Block Editor. It is exploitable when TinyMCE6 is used as a rich text editor and an arbitrary script may be executed on a logged-in user's web browser." + }, + { + "lang": "es", + "value": "El tipo m\u00f3vil contiene una vulnerabilidad Cross-Site Scripting Almacenado en el modo de edici\u00f3n HTML del editor de bloques MT. Es explotable cuando TinyMCE6 se usa como un editor de texto rico y un arbitrary script puede ejecutarse en el navegador web de un usuario conectado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24893.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24893.json index f5ccded0e72..b015b8ba8e0 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24893.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24893.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28\"Hello%20from\"%20%2B%20\"%20search%20text%3A\"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed." + }, + { + "lang": "es", + "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. Cualquier invitado puede ejecutar c\u00f3digo remoto arbitrario mediante una solicitud a `SolrSearch`. Esto afecta la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Para reproducir en una instancia sin iniciar sesi\u00f3n, vaya a `/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28\"Hello%20from\"%20%2B%20\"%20search%20text%3A\"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. Si hay una salida y el t\u00edtulo de la fuente RSS contiene `Hello from search text:42`, entonces la instancia es vulnerable. Esta vulnerabilidad ha sido corregida en XWiki 15.10.11, 16.4.1 y 16.5.0RC1. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden editar `Main.SolrSearchMacros` en `SolrSearchMacros.xml` en la l\u00ednea 955 para que coincida con la macro `rawResponse` en `macros.vm#L2824` con un tipo de contenido de `application/xml`, en lugar de simplemente mostrar el contenido de la fuente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24894.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24894.json index bd0ebd9f913..0cc48210f14 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24894.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24894.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SPID.AspNetCore.Authentication is an AspNetCore Remote Authenticator for SPID. Authentication using Spid and CIE is based on the SAML2 standard which provides two entities: Identity Provider (IDP): the system that authenticates users and provides identity information (SAML affirmation) to the Service Provider, in essence, is responsible for the management of the credentials and identity of users; Service Provider (SP): the system that provides a service to the user and relies on the Identity Provider to authenticate the user, receives SAML assertions from the IdP to grant access to resources. The validation logic of the signature is central as it ensures that you cannot create a SAML response with arbitrary assertions and then impersonate other users. There is no guarantee that the first signature refers to the root object, it follows that if an attacker injects an item signed as the first element, all other signatures will not be verified. The only requirement is to have an XML element legitimately signed by the IdP, a condition that is easily met using the IdP's public metadata. An attacker could create an arbitrary SAML response that would be accepted by SPs using vulnerable SDKs, allowing him to impersonate any Spid and/or CIE user. This vulnerability has been addressed in version 3.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "SPID.AspNetCore.Authentication es un Autenticador Remoto AspNetCore para SPID. La autenticaci\u00f3n mediante Spid y CIE se basa en el est\u00e1ndar SAML2 que proporciona dos entidades: Proveedor de Identidad (IDP): el sistema que autentica a los usuarios y proporciona informaci\u00f3n de identidad (afirmaci\u00f3n SAML) al Proveedor de Servicios, en esencia, es responsable de la gesti\u00f3n de las credenciales e identidad de los usuarios; Proveedor de Servicios (SP): el sistema que proporciona un servicio al usuario y se basa en el Proveedor de Identidad para autenticar al usuario, recibe aserciones SAML del IdP para otorgar acceso a los recursos. La l\u00f3gica de validaci\u00f3n de la firma es central ya que asegura que no se puede crear una respuesta SAML con aserciones arbitrarias y luego suplantar a otros usuarios. No hay garant\u00eda de que la primera firma se refiera al objeto ra\u00edz, se deduce que si un atacante inyecta un elemento firmado como primer elemento, todas las dem\u00e1s firmas no ser\u00e1n verificadas. El \u00fanico requisito es tener un elemento XML firmado leg\u00edtimamente por el IdP, una condici\u00f3n que se cumple f\u00e1cilmente utilizando los metadatos p\u00fablicos del IdP. Un atacante podr\u00eda crear una respuesta SAML arbitraria que ser\u00eda aceptada por los SP utilizando SDK vulnerables, lo que le permitir\u00eda hacerse pasar por cualquier usuario de Spid y/o CIE. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 3.4.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24895.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24895.json index faae7a9e7fe..473a63b984d 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24895.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24895.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CIE.AspNetCore.Authentication is an AspNetCore Remote Authenticator for CIE 3.0. Authentication using Spid and CIE is based on the SAML2 standard which provides two entities: 1. Identity Provider (IDP): the system that authenticates users and provides identity information (SAML affirmation) to the Service Provider, in essence, is responsible for the management of the credentials and identity of users; 2. Service Provider (SP): the system that provides a service to the user and relies on the Identity Provider to authenticate the user, receives SAML assertions from the IdP to grant access to resources. The library cie-aspnetcore refers to the second entity, the SP, and implements the validation logic of SAML assertions within SAML responses. In affected versions there is no guarantee that the first signature refers to the root object, it follows that if an attacker injects an item signed as the first element, all other signatures will not be verified. The only requirement is to have an XML element legitimately signed by the IdP, a condition that is easily met using the IdP's public metadata. An attacker could create an arbitrary SAML response that would be accepted by SPs using vulnerable SDKs, allowing him to impersonate any Spid and/or CIE user. This issue has been addressed in version 2.1.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "CIE.AspNetCore.Authentication es un Autenticador Remoto AspNetCore para CIE 3.0. La autenticaci\u00f3n mediante Spid y CIE se basa en el est\u00e1ndar SAML2 que proporciona dos entidades: 1. Proveedor de Identidad (IDP): el sistema que autentica a los usuarios y proporciona informaci\u00f3n de identidad (afirmaci\u00f3n SAML) al Proveedor de Servicios, en esencia, es responsable de la gesti\u00f3n de las credenciales e identidad de los usuarios; 2. Proveedor de Servicios (SP): el sistema que proporciona un servicio al usuario y se basa en el Proveedor de Identidad para autenticar al usuario, recibe aserciones SAML del IdP para otorgar acceso a los recursos. La librer\u00eda cie-aspnetcore hace referencia a la segunda entidad, el SP, e implementa la l\u00f3gica de validaci\u00f3n de aserciones SAML dentro de las respuestas SAML. En las versiones afectadas no hay garant\u00eda de que la primera firma se refiera al objeto ra\u00edz, se deduce que si un atacante inyecta un elemento firmado como primer elemento, todas las dem\u00e1s firmas no ser\u00e1n verificadas. El \u00fanico requisito es tener un elemento XML firmado leg\u00edtimamente por el IdP, una condici\u00f3n que se cumple f\u00e1cilmente utilizando los metadatos p\u00fablicos del IdP. Un atacante podr\u00eda crear una respuesta SAML arbitraria que ser\u00eda aceptada por los SP utilizando SDK vulnerables, lo que le permitir\u00eda hacerse pasar por cualquier usuario de Spid y/o CIE. Este problema se ha solucionado en la versi\u00f3n 2.1.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24928.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24928.json index 274aa1347bc..551d0f6c552 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24928.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24928.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047." + }, + { + "lang": "es", + "value": "LibXML2 antes de 2.12.10 y 2.13.x antes de 2.13.6 tiene un desbordamiento de b\u00fafer basado en pila en XMLSNPrintfelements en Valid.c. Para explotar esto, la validaci\u00f3n de DTD debe ocurrir para un documento no confiable o DTD no confiable. Nota: Esto es similar a CVE-2017-9047." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24946.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24946.json index 7d605679962..99fee4bafb9 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24946.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24946.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The hash table used to manage connections in picoquic before b80fd3f uses a weak hash function, allowing remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs)." + }, + { + "lang": "es", + "value": "La tabla hash utilizada para administrar las conexiones en Picoquic antes de B80FD3F utiliza una funci\u00f3n hash d\u00e9bil, lo que permite a los atacantes remotos causar una carga de CPU considerable en el servidor (un ataque de hash DOS) iniciando conexiones con ID de conexi\u00f3n de origen (SCID)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24947.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24947.json index d20c72eb64b..ffe1be00847 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24947.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24947.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A hash collision vulnerability (in the hash table used to manage connections) in LSQUIC (aka LiteSpeed QUIC) before 4.2.0 allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs). This is caused by XXH32 usage." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de colisi\u00f3n hash (en la tabla hash utilizada para administrar conexiones) en LSQUIC (tambi\u00e9n conocido como Litespeed Quic) antes de 4.2.0 permite a los atacantes remotos causar una carga de CPU considerable en el servidor (un ataque con hash DOS) al iniciar conexiones con la conexi\u00f3n de fuente colid\u00eda IDS (SCID). Esto es causado por el uso XXH32." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24965.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24965.json index 22c58bc63d3..aa5ccad6374 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24965.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24965.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Crun es un tiempo de ejecuci\u00f3n de contenedores OCI de c\u00f3digo abierto completamente escrito en C. En versiones afectadas, una imagen de contenedor malicioso podr\u00eda enga\u00f1ar al controlador Krun para que escape del sistema de archivos ra\u00edz, permitiendo la creaci\u00f3n o modificaci\u00f3n de archivos en el host. No se necesitan permisos especiales, solo la capacidad del usuario actual de escribir en el archivo de destino. El problema se soluciona en Crun 1.20 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json index 07aefb8ef1a..abd97619d7a 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Movable Type contains a reflected cross-site scripting vulnerability in the user information edit page. When Multi-Factor authentication plugin is enabled and a user accesses a crafted page while logged in to the affected product, an arbitrary script may be executed on the web browser of the user." + }, + { + "lang": "es", + "value": "El tipo m\u00f3vil contiene una vulnerabilidad Cross-Site Scripting Reflejado en la p\u00e1gina Editar informaci\u00f3n del usuario. Cuando se habilita el complemento de autenticaci\u00f3n de factores multifactores y un usuario accede a una p\u00e1gina manipulado mientras se registra al producto afectado, se puede ejecutar un script arbitrario en el navegador web del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25055.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25055.json index 04c79ed8d00..0305f69a288 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25055.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25055.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authentication bypass by spoofing issue exists in FileMegane versions above 1.0.0.0 prior to 3.4.0.0, which may lead to user impersonation. If exploited, restricted file contents may be accessed." + }, + { + "lang": "es", + "value": "El bypass de la autenticaci\u00f3n por su problema existe en las versiones de Filemangane por encima de 1.0.0.0 antes de 3.4.0.0, lo que puede conducir a la suplantaci\u00f3n del usuario. Si se explota, se puede acceder al contenido de archivo restringido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25196.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25196.json index f1ba12982b6..79ab4f5003d 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25196.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25196.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "OpenFGA es un motor de autorizaci\u00f3n/permiso de alto rendimiento y flexible creado para desarrolladores e inspirado en Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) es vulnerable a la omisi\u00f3n de autorizaci\u00f3n cuando se ejecutan ciertas llamadas Check y ListObject. Los usuarios de OpenFGA v1.8.4 o anteriores, espec\u00edficamente en las siguientes condiciones, se ven afectados por esta vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n: 1. Llamar a la API Check o ListObjects con un modelo que tiene una relaci\u00f3n directamente asignable tanto al acceso p\u00fablico como al conjunto de usuarios con el mismo tipo. 2. Una tupla de acceso p\u00fablico vinculada a un tipo se asigna a un objeto. 3. La tupla de conjunto de usuarios no se asigna al mismo objeto. y 4. El campo de usuario de la solicitud Check es un conjunto de usuarios que tiene el mismo tipo que el tipo de usuario de la tupla de acceso p\u00fablico vinculada a un tipo. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.8.5, que es compatible con versiones anteriores. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json index 945e154474e..b672ede99a4 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25204.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "`gh` is GitHub\u2019s official command line tool. Starting in version 2.49.0 and prior to version 2.67.0, under certain conditions, a bug in GitHub's Artifact Attestation cli tool `gh attestation verify` causes it to return a zero exit status when no attestations are present. This behavior is incorrect: When no attestations are present, `gh attestation verify` should return a non-zero exit status code, thereby signaling verification failure. An attacker can abuse this flaw to, for example, deploy malicious artifacts in any system that uses `gh attestation verify`'s exit codes to gatekeep deployments. Users are advised to update `gh` to patched version `v2.67.0` as soon as possible." + }, + { + "lang": "es", + "value": "`gh` es la herramienta de l\u00ednea de comandos oficial de GitHub. A partir de la versi\u00f3n 2.49.0 y antes de la versi\u00f3n 2.67.0, bajo ciertas condiciones, un error en la herramienta de l\u00ednea de comandos Artifact Attestation de GitHub `gh attestation verified` hace que devuelva un estado de salida cero cuando no hay atestaciones presentes. Este comportamiento es incorrecto: cuando no hay atestaciones presentes, `gh attestation verified` debe devolver un c\u00f3digo de estado de salida distinto de cero, lo que indica un error de verificaci\u00f3n. Un atacante puede aprovechar esta falla para, por ejemplo, implementar artefactos maliciosos en cualquier sistema que use los c\u00f3digos de salida de `gh attestation verified` para controlar las implementaciones. Se recomienda a los usuarios actualizar `gh` a la versi\u00f3n parcheada `v2.67.0` lo antes posible." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json index 5b78acff86b..189d80b9293 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25206.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "eLabFTW is an open source electronic lab notebook for research labs. Prior to version 5.1.15, an incorrect input validation could allow an authenticated user to read sensitive information, including login token or other content stored in the database. This could lead to privilege escalation if cookies are enabled (default setting). Users must upgrade to eLabFTW version 5.1.15 to receive a fix. No known workarounds are available." + }, + { + "lang": "es", + "value": "eLabFTW es un cuaderno de laboratorio electr\u00f3nico de c\u00f3digo abierto para laboratorios de investigaci\u00f3n. Antes de la versi\u00f3n 5.1.15, una validaci\u00f3n de entrada incorrecta pod\u00eda permitir que un usuario autenticado leyera informaci\u00f3n confidencial, incluido el token de inicio de sesi\u00f3n u otro contenido almacenado en la base de datos. Esto pod\u00eda provocar una escalada de privilegios si se habilitaban las cookies (configuraci\u00f3n predeterminada). Los usuarios deben actualizar a la versi\u00f3n 5.1.15 de eLabFTW para recibir una soluci\u00f3n. No se conocen workarounds." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25221.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25221.json index 646b5ddd59e..8d2fb915ced 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25221.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25221.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains an SQL injection vulnerability in pdf.php. If this vulnerability is exploited, information in a database may be deleted, altered, or retrieved." + }, + { + "lang": "es", + "value": "LuxCal Web Calendar antes de 5.3.3m (versi\u00f3n MySQL) y antes de 5.3.3L (versi\u00f3n SQLite) contiene una vulnerabilidad de inyecci\u00f3n SQL en PDF.PHP. Si se explota esta vulnerabilidad, la informaci\u00f3n en una base de datos puede eliminarse, alterarse o recuperarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25222.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25222.json index 900cc3ab018..e3eb339fb84 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25222.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25222.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains an SQL injection vulnerability in retrieve.php. If this vulnerability is exploited, information in a database may be deleted, altered, or retrieved." + }, + { + "lang": "es", + "value": "LuxCal Web Calendar antes de 5.3.3m (versi\u00f3n MySQL) y antes de 5.3.3L (versi\u00f3n SQLite) contiene una vulnerabilidad de inyecci\u00f3n SQL en Retrieve.php. Si se explota esta vulnerabilidad, la informaci\u00f3n en una base de datos puede eliminarse, alterarse o recuperarse." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25223.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25223.json index f1c9f5f7164..408b0652f5d 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25223.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25223.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains a path traversal vulnerability in dloader.php. If this vulnerability is exploited, arbitrary files on a server may be obtained." + }, + { + "lang": "es", + "value": "LuxCal Web Calendar antes de 5.3.3m (versi\u00f3n MySQL) y antes de 5.3.3L (versi\u00f3n sqlite) contiene una vulnerabilidad Path Traversal en dloader.php. Si se explota esta vulnerabilidad, se pueden obtener archivos arbitrarios en un servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25224.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25224.json index c692c3b4419..953c717a6bc 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25224.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25224.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains a missing authentication vulnerability in dloader.php. If this vulnerability is exploited, arbitrary files on a server may be obtained." + }, + { + "lang": "es", + "value": "LuxCal Web Calendar antes de 5.3.3m (versi\u00f3n MySQL) y antes de 5.3.3L (versi\u00f3n SQLite) contiene una vulnerabilidad de autenticaci\u00f3n faltante en dloader.php. Si se explota esta vulnerabilidad, se pueden obtener archivos arbitrarios en un servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25284.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25284.json index fd6acccf007..5d3605e8d5b 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25284.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25284.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The ZOO-Project is an open source processing platform, released under MIT/X11 Licence. A vulnerability in ZOO-Project's WPS (Web Processing Service) implementation allows unauthorized access to files outside the intended directory through path traversal. Specifically, the Gdal_Translate service, when processing VRT (Virtual Format) files, does not properly validate file paths referenced in the VRTRasterBand element, allowing attackers to read arbitrary files on the system. The vulnerability exists because the service doesn't properly sanitize the SourceFilename parameter in VRT files, allowing relative path traversal sequences (../). When combined with VRT's raw data handling capabilities, this allows reading arbitrary files as raw binary data and converting them to TIFF format, effectively exposing their contents. This vulnerability is particularly severe because it allows attackers to read sensitive system files, potentially exposing configuration data, credentials, or other confidential information stored on the server. An unauthenticated attacker can read arbitrary files from the system through path traversal, potentially accessing sensitive information such as configuration files, credentials, or other confidential data stored on the server. The vulnerability requires no authentication and can be exploited remotely through the WPS service. This issue has been addressed in commit `5f155a8` and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "ZOO-Project es una plataforma de procesamiento de c\u00f3digo abierto, publicada bajo la licencia MIT/X11. Una vulnerabilidad en la implementaci\u00f3n de WPS (Web Processing Service) del proyecto ZOO permite el acceso no autorizado a archivos fuera del directorio previsto a trav\u00e9s de path traversal. En concreto, el servicio Gdal_Translate, al procesar archivos VRT (Virtual Format), no valida correctamente las rutas de archivo a las que se hace referencia en el elemento VRTRasterBand, lo que permite a los atacantes leer archivos arbitrarios en el sistema. La vulnerabilidad existe porque el servicio no desinfecta correctamente el par\u00e1metro SourceFilename en los archivos VRT, lo que permite secuencias de navegaci\u00f3n por path traversal (../). Cuando se combina con las capacidades de gesti\u00f3n de datos sin procesar de VRT, esto permite leer archivos arbitrarios como datos binarios sin procesar y convertirlos a formato TIFF, exponiendo de manera efectiva su contenido. Esta vulnerabilidad es particularmente grave porque permite a los atacantes leer archivos sensibles del sistema, lo que potencialmente expone datos de configuraci\u00f3n, credenciales u otra informaci\u00f3n confidencial almacenada en el servidor. Un atacante no autenticado puede leer archivos arbitrarios del sistema a trav\u00e9s de path traversal, lo que podr\u00eda permitirle acceder a informaci\u00f3n confidencial, como archivos de configuraci\u00f3n, credenciales u otros datos confidenciales almacenados en el servidor. La vulnerabilidad no requiere autenticaci\u00f3n y se puede explotar de forma remota a trav\u00e9s del servicio WPS. Este problema se ha solucionado en el commit `5f155a8` y se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25285.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25285.json index 459dfee5926..1350a57d813 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25285.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25285.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "@octokit/endpoint turns REST API endpoints into generic request options. Starting in version 4.1.0 and prior to version 10.1.3, by crafting specific `options` parameters, the `endpoint.parse(options)` call can be triggered, leading to a regular expression denial-of-service (ReDoS) attack. This causes the program to hang and results in high CPU utilization. The issue occurs in the `parse` function within the `parse.ts` file of the npm package `@octokit/endpoint`. Version 10.1.3 contains a patch for the issue." + }, + { + "lang": "es", + "value": "@octokit/endpoint convierte los endpoints de la API REST en opciones de solicitud gen\u00e9ricas. A partir de la versi\u00f3n 4.1.0 y antes de la versi\u00f3n 10.1.3, al crear par\u00e1metros `options` espec\u00edficos, se puede activar la llamada `endpoint.parse(options)`, lo que lleva a un ataque de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS). Esto hace que el programa se cuelgue y da como resultado un alto uso de la CPU. El problema ocurre en la funci\u00f3n `parse` dentro del archivo `parse.ts` del paquete npm `@octokit/endpoint`. La versi\u00f3n 10.1.3 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25288.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25288.json index 22faf807a50..79788d7df4f 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25288.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25288.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "@octokit/plugin-paginate-rest is the Octokit plugin to paginate REST API endpoint responses. For versions starting in 1.0.0 and prior to 11.4.1 of the npm package `@octokit/plugin-paginate-rest`, when calling `octokit.paginate.iterator()`, a specially crafted `octokit` instance\u2014particularly with a malicious `link` parameter in the `headers` section of the `request`\u2014can trigger a ReDoS attack. Version 11.4.1 contains a fix for the issue." + }, + { + "lang": "es", + "value": "@octokit/plugin-paginate-rest es el complemento de Octokit para paginar las respuestas de los endpoints de la API REST. En las versiones que comienzan con la 1.0.0 y anteriores a la 11.4.1 del paquete npm `@octokit/plugin-paginate-rest`, al llamar a `octokit.paginate.iterator()`, una instancia de `octokit` especialmente manipulada (en particular, con un par\u00e1metro `link` malicioso en la secci\u00f3n `headers` de `request`) puede desencadenar un ataque ReDoS. La versi\u00f3n 11.4.1 contiene una soluci\u00f3n para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25289.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25289.json index 88dcfca0a17..0732cf01d2c 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25289.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25289.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "@octokit/request-error is an error class for Octokit request errors. Starting in version 1.0.0 and prior to version 6.1.7, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the processing of HTTP request headers. By sending an authorization header containing an excessively long sequence of spaces followed by a newline and \"@\", an attacker can exploit inefficient regular expression processing, leading to excessive resource consumption. This can significantly degrade server performance or cause a denial-of-service (DoS) condition, impacting availability. Version 6.1.7 contains a fix for the issue." + }, + { + "lang": "es", + "value": "@octokit/request-error es una clase de error para los errores de solicitud de Octokit. A partir de la versi\u00f3n 1.0.0 y antes de la versi\u00f3n 6.1.7, existe una vulnerabilidad de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en el procesamiento de encabezados de solicitud HTTP. Al enviar un encabezado de autorizaci\u00f3n que contiene una secuencia excesivamente larga de espacios seguidos de una nueva l\u00ednea y \"@\", un atacante puede explotar un procesamiento ineficiente de expresiones regulares, lo que lleva a un consumo excesivo de recursos. Esto puede degradar significativamente el rendimiento del servidor o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS), lo que afecta la disponibilidad. La versi\u00f3n 6.1.7 contiene una soluci\u00f3n para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25290.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25290.json index 57da4ac1bfe..4001a8d51c7 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25290.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25290.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "@octokit/request sends parameterized requests to GitHub\u2019s APIs with sensible defaults in browsers and Node. Starting in version 1.0.0 and prior to version 9.2.1, the regular expression `/<([^>]+)>; rel=\"deprecation\"/` used to match the `link` header in HTTP responses is vulnerable to a ReDoS (Regular Expression Denial of Service) attack. This vulnerability arises due to the unbounded nature of the regex's matching behavior, which can lead to catastrophic backtracking when processing specially crafted input. An attacker could exploit this flaw by sending a malicious `link` header, resulting in excessive CPU usage and potentially causing the server to become unresponsive, impacting service availability. Version 9.2.1 fixes the issue." + }, + { + "lang": "es", + "value": "@octokit/request env\u00eda solicitudes parametrizadas a las API de GitHub con valores predeterminados razonables en los navegadores y Node. A partir de la versi\u00f3n 1.0.0 y antes de la versi\u00f3n 9.2.1, la expresi\u00f3n regular `/<([^>]+)>; rel=\"deprecation\"/` utilizada para hacer coincidir el encabezado `link` en las respuestas HTTP es vulnerable a un ataque ReDoS (denegaci\u00f3n de servicio de expresi\u00f3n regular). Esta vulnerabilidad surge debido a la naturaleza ilimitada del comportamiento de coincidencia de la expresi\u00f3n regular, que puede provocar un retroceso catastr\u00f3fico al procesar una entrada especialmente manipulada. Un atacante podr\u00eda explotar esta falla enviando un encabezado `link` malicioso, lo que resultar\u00eda en un uso excesivo de la CPU y potencialmente causar\u00eda que el servidor dejara de responder, lo que afectar\u00eda la disponibilidad del servicio. La versi\u00f3n 9.2.1 corrige el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json index 585156b232c..6e0b47b9f58 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25295.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Label Studio is an open source data labeling tool. A path traversal vulnerability in Label Studio SDK versions prior to 1.0.10 allows unauthorized file access outside the intended directory structure. The flaw exists in the VOC, COCO and YOLO export functionalities. These functions invoke a `download` function on the `label-studio-sdk` python package, which fails to validate file paths when processing image references during task exports. By creating tasks with path traversal sequences in the image field, an attacker can force the application to read files from arbitrary server filesystem locations when exporting projects in any of the mentioned formats. This is authentication-required vulnerability allowing arbitrary file reads from the server filesystem. It may lead to potential exposure of sensitive information like configuration files, credentials, and confidential data. Label Studio versions before 1.16.0 specified SDK versions prior to 1.0.10 as dependencies, and the issue was confirmed in Label Studio version 1.13.2.dev0; therefore, Label Studio users should upgrade to 1.16.0 or newer to mitigate it." + }, + { + "lang": "es", + "value": "Label Studio es una herramienta de etiquetado de datos de c\u00f3digo abierto. Una vulnerabilidad de path traversal en las versiones del SDK de Label Studio anteriores a la 1.0.10 permite el acceso no autorizado a archivos fuera de la estructura de directorio prevista. La falla existe en las funcionalidades de exportaci\u00f3n de VOC, COCO y YOLO. Estas funciones invocan una funci\u00f3n de `descarga` en el paquete de Python `label-studio-sdk`, que no puede validar las rutas de archivo al procesar referencias de im\u00e1genes durante las exportaciones de tareas. Al crear tareas con secuencias de path traversal en el campo de imagen, un atacante puede obligar a la aplicaci\u00f3n a leer archivos de ubicaciones arbitrarias del sistema de archivos del servidor al exportar proyectos en cualquiera de los formatos mencionados. Esta es una vulnerabilidad que requiere autenticaci\u00f3n que permite lecturas arbitrarias de archivos del sistema de archivos del servidor. Puede conducir a la posible exposici\u00f3n de informaci\u00f3n confidencial como archivos de configuraci\u00f3n, credenciales y datos confidenciales. Las versiones de Label Studio anteriores a la 1.16.0 especificaban versiones del SDK anteriores a la 1.0.10 como dependencias, y el problema se confirm\u00f3 en la versi\u00f3n 1.13.2.dev0 de Label Studio; Por lo tanto, los usuarios de Label Studio deben actualizar a la versi\u00f3n 1.16.0 o m\u00e1s reciente para mitigarlo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25296.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25296.json index 29c28d8e595..76afeb4ede1 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25296.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25296.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's `/projects/upload-example` endpoint allows injection of arbitrary HTML through a `GET` request with an appropriately crafted `label_config` query parameter. By crafting a specially formatted XML label config with inline task data containing malicious HTML/JavaScript, an attacker can achieve Cross-Site Scripting (XSS). While the application has a Content Security Policy (CSP), it is only set in report-only mode, making it ineffective at preventing script execution. The vulnerability exists because the upload-example endpoint renders user-provided HTML content without proper sanitization on a GET request. This allows attackers to inject and execute arbitrary JavaScript in victims' browsers by getting them to visit a maliciously crafted URL. This is considered vulnerable because it enables attackers to execute JavaScript in victims' contexts, potentially allowing theft of sensitive data, session hijacking, or other malicious actions. Version 1.16.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Label Studio es una herramienta de etiquetado de datos de c\u00f3digo abierto. Antes de la versi\u00f3n 1.16.0, el punto de conexi\u00f3n `/projects/upload-example` de Label Studio permite la inyecci\u00f3n de HTML arbitrario a trav\u00e9s de una solicitud `GET` con un par\u00e1metro de consulta `label_config` manipulado de forma adecuada. Al manipular una configuraci\u00f3n de etiqueta XML con un formato especial con datos de tareas en l\u00ednea que contienen HTML/JavaScript malicioso, un atacante puede lograr Cross-Site Scripting (XSS). Si bien la aplicaci\u00f3n tiene una Pol\u00edtica de seguridad de contenido (CSP), solo est\u00e1 configurada en modo de solo informes, lo que la hace ineficaz para evitar la ejecuci\u00f3n de scripts. La vulnerabilidad existe porque el punto de conexi\u00f3n upload-example muestra contenido HTML proporcionado por el usuario sin la depuraci\u00f3n adecuada en una solicitud GET. Esto permite a los atacantes inyectar y ejecutar JavaScript arbitrario en los navegadores de las v\u00edctimas al hacer que visiten una URL manipulada de forma maliciosa. Esto se considera vulnerable porque permite a los atacantes ejecutar JavaScript en los contextos de las v\u00edctimas, lo que potencialmente permite el robo de datos confidenciales, el secuestro de sesiones u otras acciones maliciosas. La versi\u00f3n 1.16.0 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25297.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25297.json index 9e768213ec5..07f10db65dd 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25297.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25297.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, the application allows users to specify a custom S3 endpoint URL via the s3_endpoint parameter. This endpoint URL is passed directly to the boto3 AWS SDK without proper validation or restrictions on the protocol or destination. The vulnerability allows an attacker to make the application send HTTP requests to arbitrary internal services by specifying them as the S3 endpoint. When the storage sync operation is triggered, the application attempts to make S3 API calls to the specified endpoint, effectively making HTTP requests to the target service and returning the response in error messages. This SSRF vulnerability enables attackers to bypass network segmentation and access internal services that should not be accessible from the external network. The vulnerability is particularly severe because error messages from failed requests contain the full response body, allowing data exfiltration from internal services. Version 1.16.0 contains a patch for the issue." + }, + { + "lang": "es", + "value": "Label Studio es una herramienta de etiquetado de datos de c\u00f3digo abierto. Antes de la versi\u00f3n 1.16.0, la funci\u00f3n de integraci\u00f3n de almacenamiento S3 de Label Studio contiene una vulnerabilidad de Server-Side Request Forgery (SSRF) en su configuraci\u00f3n de endpoint. Al crear una conexi\u00f3n de almacenamiento S3, la aplicaci\u00f3n permite a los usuarios especificar una URL de endpoint S3 personalizada a trav\u00e9s del par\u00e1metro s3_endpoint. Esta URL de endpoint se pasa directamente al SDK de AWS de boto3 sin la validaci\u00f3n adecuada ni restricciones en el protocolo o el destino. La vulnerabilidad permite a un atacante hacer que la aplicaci\u00f3n env\u00ede solicitudes HTTP a servicios internos arbitrarios al especificarlos como el endpoint S3. Cuando se activa la operaci\u00f3n de sincronizaci\u00f3n de almacenamiento, la aplicaci\u00f3n intenta realizar llamadas a la API S3 al endpoint especificado, lo que efectivamente realiza solicitudes HTTP al servicio de destino y devuelve la respuesta en mensajes de error. Esta vulnerabilidad SSRF permite a los atacantes eludir la segmentaci\u00f3n de la red y acceder a servicios internos que no deber\u00edan ser accesibles desde la red externa. La vulnerabilidad es particularmente grave porque los mensajes de error de las solicitudes fallidas contienen el cuerpo completo de la respuesta, lo que permite la exfiltraci\u00f3n de datos de los servicios internos. La versi\u00f3n 1.16.0 contiene un parche para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25299.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25299.json index b588e6da6d7..c90a835fe38 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25299.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25299.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. During a recent internal audit, a Cross-Site Scripting (XSS) vulnerability was discovered in the CKEditor 5 real-time collaboration package. This vulnerability affects user markers, which represent users' positions within the document. It can lead to unauthorized JavaScript code execution, which might happen with a very specific editor and token endpoint configuration. This vulnerability affects only installations with Real-time collaborative editing enabled. The problem has been recognized and patched. The fix is available in version 44.2.1 (and above). Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "CKEditor 5 es un editor de texto enriquecido de JavaScript moderno con una arquitectura MVC. Durante una auditor\u00eda interna reciente, se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) en el paquete de colaboraci\u00f3n en tiempo real de CKEditor 5. Esta vulnerabilidad afecta a los marcadores de usuario, que representan las posiciones de los usuarios dentro del documento. Puede provocar la ejecuci\u00f3n no autorizada de c\u00f3digo JavaScript, lo que podr\u00eda ocurrir con una configuraci\u00f3n de endpoint de token y editor muy espec\u00edfica. Esta vulnerabilidad afecta solo a las instalaciones con la edici\u00f3n colaborativa en tiempo real habilitada. El problema se ha reconocido y se ha corregido. La soluci\u00f3n est\u00e1 disponible en la versi\u00f3n 44.2.1 (y posteriores). Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json index 358148f888f..385c427bc94 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25300.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel=\"noopener\"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel=\"noopener\"` is imposed on all `target=\"_blank\"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue." + }, + { + "lang": "es", + "value": "SmartBanner.js es un banner de aplicaciones inteligente personalizable para iOS y Android. Antes de la versi\u00f3n 1.14.1, haga clic en el enlace SmartBanner `View` y navegando a la p\u00e1gina de terceros de las hojas de` Window.opener` expuestas. Puede permitir que terceros hostiles abusen de `window.opener`, por ejemplo, mediante redirecci\u00f3n o inyecci\u00f3n en la p\u00e1gina original con SmartBanner. `rel =\" noopener \"` se pobla autom\u00e1ticamente en enlaces a partir de `v1.14.1`, que es una actualizaci\u00f3n recomendada para resolver la vulnerabilidad. Algunos workarounds est\u00e1n disponibles para aquellos que no pueden actualizar. Aseg\u00farese de que el enlace 'Ver' solo est\u00e9 llevando a los usuarios a App Store o Google Play Store, donde la seguridad est\u00e1 protegida por los respectivos equipos de seguridad de la tienda de aplicaciones. Si el enlace `View` va a una p\u00e1gina de terceros, limite SmartBanner.js para usarse en iOS que disminuye el alcance de la vulnerabilidad ya que a partir de Safari 12.1,` rel = \"noopener\" `se impone en todos los` target = \" _Blank \"` enlaces. La versi\u00f3n 1.14.1 de SmartBanner.js contiene una soluci\u00f3n para el problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25304.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25304.json index 9d100887617..c467111ba7e 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25304.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25304.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Prior to version 5.26.0 of vega and 5.4.2 of vega-selections, the `vlSelectionTuples` function can be used to call JavaScript functions, leading to cross-site scripting.`vlSelectionTuples` calls multiple functions that can be controlled by an attacker, including one call with an attacker-controlled argument. This can be used to call `Function()` with arbitrary JavaScript and the resulting function can be called with `vlSelectionTuples` or using a type coercion to call `toString` or `valueOf`. Version 5.26.0 of vega and 5.4.2 of vega-selections fix this issue." + }, + { + "lang": "es", + "value": "Vega es una gram\u00e1tica de visualizaci\u00f3n, un formato declarativo para crear, guardar y compartir dise\u00f1os de visualizaci\u00f3n interactivos. Antes de la versi\u00f3n 5.26.0 de vega y 5.4.2 de vega-selections, la funci\u00f3n `vlSelectionTuples` se puede utilizar para llamar a funciones de JavaScript, lo que conduce a Cross Site Scripting. `vlSelectionTuples` llama a m\u00faltiples funciones que pueden ser controladas por un atacante, incluida una llamada con un argumento controlado por el atacante. Esto se puede utilizar para llamar a `Function()` con JavaScript arbitrario y la funci\u00f3n resultante se puede llamar con `vlSelectionTuples` o utilizando una coerci\u00f3n de tipo para llamar a `toString` o `valueOf`. La versi\u00f3n 5.26.0 de vega y 5.4.2 de vega-selections solucionan este problema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25305.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25305.json index 6f398f4ce72..fd100ad06b8 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25305.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25305.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Home Assistant Core is an open source home automation that puts local control and privacy first. Affected versions are subject to a potential man-in-the-middle attacks due to missing SSL certificate verification in the project codebase and used third-party libraries. In the past, `aiohttp-session`/`request` had the parameter `verify_ssl` to control SSL certificate verification. This was a boolean value. In `aiohttp` 3.0, this parameter was deprecated in favor of the `ssl` parameter. Only when `ssl` is set to `None` or provided with a correct configured SSL context the standard SSL certificate verification will happen. When migrating integrations in Home Assistant and libraries used by Home Assistant, in some cases the `verify_ssl` parameter value was just moved to the new `ssl` parameter. This resulted in these integrations and 3rd party libraries using `request.ssl = True`, which unintentionally turned off SSL certificate verification and opened up a man-in-the-middle attack vector. This issue has been addressed in version 2024.1.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Home Assistant Core es una automatizaci\u00f3n de origen de c\u00f3digo abierto que pone primero el control local y la privacidad. Las versiones afectadas est\u00e1n sujetas a los posibles ataques de hombre en el medio debido a la verificaci\u00f3n de certificado SSL faltante en la base de c\u00f3digo del proyecto y usaron de terceros librer\u00edas. En el pasado, `aiohttp-session`/` request 'ten\u00eda el par\u00e1metro `verify_ssl` para controlar la verificaci\u00f3n del certificado SSL. Este era un valor booleano. En `aiohttp` 3.0, este par\u00e1metro estaba desapercibido a favor del par\u00e1metro` SSL`. Solo cuando `SSL` se establece en` None` o se proporciona con un contexto SSL configurado correcto, la verificaci\u00f3n de certificado SSL est\u00e1ndar ocurrir\u00e1. Al migrar las integraciones en el Asistente de inicio librer\u00edas Aries utilizados por el Asistente de inicio, en algunos casos el valor del par\u00e1metro `Verify_SSL` se movi\u00f3 al nuevo par\u00e1metro` SSL`. Esto dio como resultado estas integraciones y librer\u00edas usando `request.ssl ??= true`, que desactiv\u00f3 involuntariamente la verificaci\u00f3n del certificado SSL y abri\u00f3 un vector de ataque de hombre en el medio. Este problema se ha abordado en la versi\u00f3n 2024.1.6 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25388.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25388.json index c463a0af0e8..d6e20bba711 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25388.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25388.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A SQL Injection vulnerability was found in /admin/edit-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the editid GET request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit-propertytype.php en PHPGurukul Land Record System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud GET editid." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25679.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25679.json index 2a766d0b382..e4b614acaff 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25679.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25679.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tenda i12 V1.0.0.10(3805) contiene un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro de \u00edndice en la funci\u00f3n formWifiMacFilterSet." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25740.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25740.json index a31a1c91745..dd07d78d28f 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25740.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25740.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro PSK en el m\u00f3dulo SetQuickVPNSettings." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25745.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25745.json index 0d7ae2c77db..94c94457125 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25745.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25745.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetQuickVPNSettings module." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DIR-853 A1 FW1.20B07 conten\u00eda una vulnerabilidad de desbordamiento de b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro Contrase\u00f1a en el m\u00f3dulo SetQuickVPNSettings." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json index 305887bf9e2..529a3890d80 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'gw' parameter at /userRpm/WanDynamicIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s del par\u00e1metro 'gw' en /userRpm/WanDynamicIpV6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json index 1b34f046db2..9482ce0fad6 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25968.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file' parameter. By referencing specific files (e.g., cm3.xml), attackers can bypass access controls, leading to account takeover and potential privilege escalation." + }, + { + "lang": "es", + "value": "La versi\u00f3n 10.1.1 de cm3 Acora CMS de DDSN Interactive contiene una vulnerabilidad de control de acceso indebido. Un usuario con privilegios de editor puede acceder a informaci\u00f3n confidencial, como las credenciales del administrador del sistema, al forzar la navegaci\u00f3n en el endpoint y explotar el par\u00e1metro 'file'. Al hacer referencia a archivos espec\u00edficos (por ejemplo, cm3.xml), los atacantes pueden eludir los controles de acceso, lo que lleva a la apropiaci\u00f3n de cuentas y a una posible escalada de privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json index 15c731525ef..50a359319c1 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25973.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A stored Cross Site Scripting vulnerability in the \"related recommendations\" feature in Ppress v.0.0.9 allows a remote attacker to execute arbitrary code via a crafted script to the article.title, article.category, and article.tags parameters." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting Almacenado en la funci\u00f3n \"recomendaciones relacionadas\" en Ppress v.0.0.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado espec\u00edficamente para los par\u00e1metros article.title, article.category y article.tags." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json index de59552efdd..bac52504428 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25988.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross Site Scripting vulnerability in hooskcms v.1.8 allows a remote attacker to cause a denial of service via the custom Link title parameter and the Title parameter." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en hooskcms v.1.8 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del par\u00e1metro de t\u00edtulo de enlace personalizado y el par\u00e1metro T\u00edtulo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json index 31e8c2e1a68..8719e869dd5 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25991.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL Injection vulnerability in hooskcms v.1.7.1 allows a remote attacker to obtain sensitive information via the /install/index.php component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en hooskcms v.1.7.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /install/index.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json index 5b8cea8c070..d3a5de6db92 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25992.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL Injection vulnerability in FeMiner wms 1.0 allows a remote attacker to obtain sensitive information via the inquire_inout_item.php component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en FeMiner wms 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente inquire_inout_item.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json index 0ebff9b0ff4..17a24863e43 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25993.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameter \"itemid.\"" + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en FeMiner wms wms 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro \"itemid\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json index 639a5ba2c08..b0f70c0c5ce 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26156.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /shopping/track-orders.php en PHPGurukul Online Shopping Portal v2.1, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST orderid." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json index 93817220f95..7052e6bc1ee 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26157.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A SQL Injection vulnerability was found in /bpms/index.php in Source Code and Project Beauty Parlour Management System V1.1, which allows remote attackers to execute arbitrary code via the name POST request parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /bpms/index.php en Source Code and Project Beauty Parlour Management System V1.1, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST de nombre." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json b/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json index ebac076ffab..1de61196bfa 100644 --- a/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json +++ b/CVE-2025/CVE-2025-261xx/CVE-2025-26158.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) almacenado en la p\u00e1gina manage-employee.php del Kashipara Online Attendance Management System V1.0. Esta vulnerabilidad permite a atacantes remotos ejecutar secuencias de comandos arbitrarias a trav\u00e9s del par\u00e1metro department." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json index 674aa913721..70258fbd580 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26306.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A memory leak has been identified in the readSizedString function in util/read.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted file." + }, + { + "lang": "es", + "value": "Se ha identificado una p\u00e9rdida de memoria en la funci\u00f3n readSizedString en util/read.c de libming v0.4.8, que permite a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo manipulado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json index 3138fcc1e8e..c980031068c 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26308.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A memory leak has been identified in the parseSWF_FILTERLIST function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file." + }, + { + "lang": "es", + "value": "Se ha identificado una p\u00e9rdida de memoria en la funci\u00f3n parseSWF_FILTERLIST en util/parser.c de libming v0.4.8, que permite a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo SWF manipulado espec\u00edficamente para ello." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json index 4830df85801..7a231fdb4d5 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26311.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Multiple memory leaks have been identified in the clip actions parsing functions (parseSWF_CLIPACTIONS and parseSWF_CLIPACTIONRECORD) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted SWF file." + }, + { + "lang": "es", + "value": "Se han identificado m\u00faltiples fugas de memoria en las funciones de an\u00e1lisis de acciones de clip (parseSWF_CLIPACTIONS y parseSWF_CLIPACTIONRECORD) en util/parser.c de libming v0.4.8, que permiten a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo SWF manipulado espec\u00edficamente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json index 860d5a2f914..69493ef8117 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26506.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job." + }, + { + "lang": "es", + "value": "Algunas impresoras HP LaserJet Pro, HP LaserJet Enterprise y HP LaserJet Managed pueden ser potencialmente vulnerables a la ejecuci\u00f3n remota de c\u00f3digo y a la elevaci\u00f3n de privilegios al procesar un trabajo de impresi\u00f3n PostScript." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json index 19b69971ba9..d315c621115 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26507.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job." + }, + { + "lang": "es", + "value": "Algunas impresoras HP LaserJet Pro, HP LaserJet Enterprise y HP LaserJet Managed pueden ser potencialmente vulnerables a la ejecuci\u00f3n remota de c\u00f3digo y a la elevaci\u00f3n de privilegios al procesar un trabajo de impresi\u00f3n PostScript." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json index 2d1c4a46369..380fe38dac7 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26508.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job." + }, + { + "lang": "es", + "value": "Algunas impresoras HP LaserJet Pro, HP LaserJet Enterprise y HP LaserJet Managed pueden ser potencialmente vulnerables a la ejecuci\u00f3n remota de c\u00f3digo y a la elevaci\u00f3n de privilegios al procesar un trabajo de impresi\u00f3n PostScript." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json index 545987ab908..a3c4fec7575 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26519.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "musl libc 0.9.13 through 1.2.5 before 1.2.6 has an out-of-bounds write vulnerability when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8." + }, + { + "lang": "es", + "value": "musl libc 0.9.13 a 1.2.5 antes de 1.2.6 tiene una vulnerabilidad de escritura fuera de los l\u00edmites cuando un atacante puede activar la conversi\u00f3n iconv de texto EUC-KR no confiable a UTF-8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26522.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26522.json index 8b64b0f23f7..0af0041804b 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26522.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26522.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "This vulnerability exists in RupeeWeb trading platform due to improper implementation of OTP validation mechanism in certain API endpoints. A remote attacker with valid credentials could exploit this vulnerability by manipulating API responses. \n\nSuccessful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en RupeeWeb trading platform debido a la implementaci\u00f3n incorrecta del mecanismo de validaci\u00f3n OTP en ciertos endpoints de API. Un atacante remoto con credenciales v\u00e1lidas podr\u00eda aprovechar esta vulnerabilidad manipulando las respuestas de API. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir al atacante eludir la autenticaci\u00f3n de dos factores (2FA) para otras cuentas de usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26523.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26523.json index eb78904eda3..a7a859f96d8 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26523.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26523.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "This vulnerability exists in RupeeWeb trading platform due to insufficient authorization controls on certain API endpoints handling addition and deletion operations. Successful exploitation of this vulnerability could allow an authenticated remote attacker to modify information belonging to other user accounts." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en RupeeWeb trading platform debido a controles de autorizaci\u00f3n insuficientes en ciertos endpoints de API que gestionan operaciones de adici\u00f3n y eliminaci\u00f3n. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir que un atacante remoto autenticado modifique informaci\u00f3n perteneciente a otras cuentas de usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26524.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26524.json index 488f807ca49..fd00661554d 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26524.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26524.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "This vulnerability exists in RupeeWeb trading platform due to missing rate limiting on OTP requests in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints which could lead to the OTP bombing/ flooding on the targeted system." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en RupeeWeb trading platform debido a la falta de limitaci\u00f3n de velocidad en las solicitudes OTP en ciertos endpoints de API. Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad enviando m\u00faltiples solicitudes OTP a trav\u00e9s de endpoints de API vulnerables, lo que podr\u00eda provocar un bombardeo o inundaci\u00f3n de OTP en el sistema objetivo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26603.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26603.json index 3585b1fd579..c842d9b7c7c 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26603.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26603.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Vim is a greatly improved version of the good old UNIX editor Vi. Vim allows to redirect screen messages using the `:redir` ex command to register, variables and files. It also allows to show the contents of registers using the `:registers` or `:display` ex command. When redirecting the output of `:display` to a register, Vim will free the register content before storing the new content in the register. Now when redirecting the `:display` command to a register that is being displayed, Vim will free the content while shortly afterwards trying to access it, which leads to a use-after-free. Vim pre 9.1.1115 checks in the ex_display() function, that it does not try to redirect to a register while displaying this register at the same time. However this check is not complete, and so Vim does not check the `+` and `*` registers (which typically donate the X11/clipboard registers, and when a clipboard connection is not possible will fall back to use register 0 instead. In Patch 9.1.1115 Vim will therefore skip outputting to register zero when trying to redirect to the clipboard registers `*` or `+`. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "VIM es una versi\u00f3n muy mejorada del buen editor de Unix VI. VIM permite redirigir mensajes de pantalla utilizando el comando `: redir` ex para registrarse, variables y archivos. Tambi\u00e9n permite mostrar el contenido de los registros utilizando el comando `: Registros` o`: Display` ex. Al redirigir la salida de `: Display` a un registro, VIM liberar\u00e1 el contenido de registro antes de almacenar el nuevo contenido en el registro. Ahora, al redirigir el comando `: Display` a un registro que se muestra, VIM liberar\u00e1 el contenido mientras que poco despu\u00e9s intenta acceder a \u00e9l, lo que conduce a un use-after-free. VIM PRE 9.1.1115 verifica la funci\u00f3n ex_display (), que no intenta redirigir a un registro al mostrar este registro al mismo tiempo. Sin embargo, esta verificaci\u00f3n no est\u00e1 completa, por lo que VIM no verifica los registros `+` y `*` que generalmente donan los registros X11/Portapaplos, y cuando una conexi\u00f3n de portapapeles no es posible volver\u00e1 a usar el registro 0. Patch 9.1.1115 VIM, por lo tanto, se saltar\u00e1 la salida para registrar cero al intentar redirigir a los registros de portapapeles `*` o `+`. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26604.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26604.json index 6defd1e79e9..5b6def0ac5a 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26604.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26604.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Discord-Bot-Framework-Kernel is a Discord bot framework built with interactions.py, featuring modular extension management and secure execution. Because of the nature of arbitrary user-submited code execution, this allows user to execute potentially malicious code to perform damage or extract sensitive information. By loading the module containing the following code and run the command, the bot token can be extracted. Then the attacker can load a blocking module to sabotage the bot (DDoS attack) and the token can be used to make the fake bot act as the real one. If the bot has very high privilege, the attacker basically has full control before the user kicks the bot. Any Discord user that hosts Discord-Bot-Framework-Kernel before commit f0d9e70841a0e3170b88c4f8d562018ccd8e8b14 is affected. Users are advised to upgrade. Users unable to upgrade may attempt to limit their discord bot's access via configuration options." + }, + { + "lang": "es", + "value": "Discord-Bot-Framework-Kernel es un framework de bots de Discord creado con interactions.py, que cuenta con administraci\u00f3n de extensiones modulares y ejecuci\u00f3n segura. Debido a la naturaleza de la ejecuci\u00f3n de c\u00f3digo arbitrario enviado por el usuario, esto le permite al usuario ejecutar c\u00f3digo potencialmente malicioso para causar da\u00f1os o extraer informaci\u00f3n confidencial. Al cargar el m\u00f3dulo que contiene el siguiente c\u00f3digo y ejecutar el comando, se puede extraer el token del bot. Luego, el atacante puede cargar un m\u00f3dulo de bloqueo para sabotear el bot (ataque DDoS) y el token se puede usar para hacer que el bot falso act\u00fae como el real. Si el bot tiene privilegios muy altos, el atacante b\u00e1sicamente tiene control total antes de que el usuario expulse al bot. Cualquier usuario de Discord que aloje Discord-Bot-Framework-Kernel antes del commit f0d9e70841a0e3170b88c4f8d562018ccd8e8b14 se ve afectado. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden intentar limitar el acceso de su bot de Discord a trav\u00e9s de las opciones de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26605.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26605.json index e48917fbefa..4fe503b618f 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26605.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26605.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `deletar_cargo.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `Deletar_cargo.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante autorizado ejecute consultas SQL arbitrarias, permitiendo el acceso a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json index 98df47a7b8a..a96ce67ab10 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26606.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `informacao_adicional.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `Informacao_adicional.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json index d161feef68c..1ca1754562d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26607.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `documento_excluir.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `documentO_excluir.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json index 6e736cffe61..8ca737b11c7 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26608.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `dependente_docdependente.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `dependiente_docdependente.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json index ae889179a48..be144fb614a 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26609.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `familiar_docfamiliar.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `familiar_docfamiliar.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json index 4910c5691d8..280c6e76d79 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26610.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `restaurar_produto_desocultar.php` endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `restaurante_produto_desocultar.php` endpoint. Esta vulnerabilidad permite que un atacante autorizado ejecute consultas SQL arbitrarias, lo que permite el acceso a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json index 7d05bf8d421..dbcf1395401 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26611.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `remover_produto.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `remover_produto.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json index 14916d9d24f..383429f7e6b 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26612.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `adicionar_almoxarife.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `adicionar_almoxarife.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.13 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json index 7c3a1d5c11d..8ea962f086f 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26613.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. An OS Command Injection vulnerability was discovered in the WeGIA application, `gerenciar_backup.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en la aplicaci\u00f3n WEGIA, `gerenciar_backup.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute el c\u00f3digo arbitrario de forma remota. Este problema se ha abordado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json index c6bbc4f640a..750ec470a13 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26614.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `deletar_documento.php` endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `Deletar_Documento.php` endpoint. Esta vulnerabilidad permite que un atacante autorizado ejecute consultas SQL arbitrarias, lo que permite el acceso a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json index 258d064e630..227233f0b90 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26615.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `examples.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. A Path Traversal se descubri\u00f3 la vulnerabilidad en la aplicaci\u00f3n WEGIA, `ejemplos.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante obtenga acceso no autorizado a la informaci\u00f3n confidencial almacenada en `config.php`. `config.php` contiene informaci\u00f3n que podr\u00eda permitir el acceso directo a la base de datos. Este problema se ha abordado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json index 99602227c80..f616ed7bb62 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26616.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `exportar_dump.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Path Traversal se descubri\u00f3 la vulnerabilidad en la aplicaci\u00f3n WEGIA, `exportar_dump.php` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante obtenga acceso no autorizado a la informaci\u00f3n confidencial almacenada en `config.php`. `config.php` contiene informaci\u00f3n que podr\u00eda permitir el acceso directo a la base de datos. Este problema se ha abordado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json index 440ddca8b4c..591915a733d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26617.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `historico_paciente.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WEGIA es un administrador web de c\u00f3digo abierto para instituciones con un enfoque en los usuarios de idiomas portugueses. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WEGIA, `HISTRICO_PACENTE.PHP` endpoint. Esta vulnerabilidad podr\u00eda permitir que un atacante ejecute consultas SQL arbitrarias, lo que permite el acceso no autorizado a informaci\u00f3n confidencial. Este problema se ha abordado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26618.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26618.json index a91b113a815..6b6bcf574bd 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26618.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26618.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Erlang es un lenguaje de programaci\u00f3n y un sistema de ejecuci\u00f3n para crear sistemas de tiempo real flexibles y escalables de forma masiva con requisitos de alta disponibilidad. OTP es un conjunto de bibliotecas de Erlang, que consta del sistema de ejecuci\u00f3n de Erlang, una serie de componentes listos para usar escritos principalmente en Erlang. El tama\u00f1o de los paquetes no se verifica correctamente para los paquetes SFTP. Como resultado, cuando se reciben varios paquetes SSH (que se ajustan al tama\u00f1o m\u00e1ximo de paquete SSH) por ssh, es posible que se combinen en un paquete SFTP que superar\u00e1 el tama\u00f1o m\u00e1ximo de paquete permitido y potencialmente provocar\u00e1 que se asigne una gran cantidad de memoria. Tenga en cuenta que la situaci\u00f3n descrita anteriormente solo puede ocurrir para usuarios autenticados correctamente despu\u00e9s de completar el protocolo de enlace SSH. Este problema se ha corregido en las versiones 27.2.4, 26.2.5.9 y 25.3.2.18 de OTP. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json index bc3576d3db6..2de6ba2c3d9 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26620.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-18T18:15:36.767", "lastModified": "2025-02-18T18:15:36.767", - "vulnStatus": "Received", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Duende.AccessTokenManagement is a set of .NET libraries that manage OAuth and OpenId Connect access tokens. Duende.AccessTokenManagement contains a race condition when requesting access tokens using the client credentials flow. Concurrent requests to obtain an access token using differing protocol parameters can return access tokens obtained with the wrong scope, resource indicator, or other protocol parameters. Such usage is somewhat atypical, and only a small percentage of users are likely to be affected. Duende.AccessTokenManagement can request access tokens using the client credentials flow in several ways. In basic usage, the client credentials flow is configured once and the parameters do not vary. In more advanced situations, requests with varying protocol parameters may be made by calling specific overloads of these methods: `HttpContext.GetClientAccessTokenAsync()` and `IClientCredentialsTokenManagementService.GetAccessTokenAsync()`. There are overloads of both of these methods that accept a `TokenRequestParameters` object that customizes token request parameters. However, concurrent requests with varying `TokenRequestParameters` will result in the same token for all concurrent calls. Most users can simply update the NuGet package to the latest version. Customizations of the `IClientCredentialsTokenCache` that derive from the default implementation (`DistributedClientCredentialsTokenCache`) will require a small code change, as its constructor was changed to add a dependency on the `ITokenRequestSynchronization` service. The synchronization service will need to be injected into the derived class and passed to the base constructor. The impact of this vulnerability depends on how Duende.AccessTokenManagement is used and on the security architecture of the solution. Most users will not be vulnerable to this issue. More advanced users may run into this issue by calling the methods specified above with customized token request parameters. The impact of obtaining an access token with different than intended protocol parameters will vary depending on application logic, security architecture, and the authorization policy of the resource servers." + }, + { + "lang": "es", + "value": "Duende.AccessTokenManagement es un conjunto de librer\u00edas .NET que administran tokens de acceso de OAuth y OpenId Connect. Duende.AccessTokenManagement contiene una condici\u00f3n de ejecuci\u00f3n cuando se solicitan tokens de acceso mediante el flujo de credenciales del cliente. Las solicitudes concurrentes para obtener un token de acceso mediante diferentes par\u00e1metros de protocolo pueden devolver tokens de acceso obtenidos con el alcance, el indicador de recursos u otros par\u00e1metros de protocolo incorrectos. Este uso es algo at\u00edpico y es probable que solo un peque\u00f1o porcentaje de usuarios se vea afectado. Duende.AccessTokenManagement puede solicitar tokens de acceso mediante el flujo de credenciales del cliente de varias formas. En el uso b\u00e1sico, el flujo de credenciales del cliente se configura una vez y los par\u00e1metros no var\u00edan. En situaciones m\u00e1s avanzadas, se pueden realizar solicitudes con par\u00e1metros de protocolo variables llamando a sobrecargas espec\u00edficas de estos m\u00e9todos: `HttpContext.GetClientAccessTokenAsync()` y `IClientCredentialsTokenManagementService.GetAccessTokenAsync()`. Existen sobrecargas de ambos m\u00e9todos que aceptan un objeto `TokenRequestParameters` que personaliza los par\u00e1metros de solicitud de token. Sin embargo, las solicitudes concurrentes con distintos `TokenRequestParameters` dar\u00e1n como resultado el mismo token para todas las llamadas concurrentes. La mayor\u00eda de los usuarios pueden simplemente actualizar el paquete NuGet a la \u00faltima versi\u00f3n. Las personalizaciones de `IClientCredentialsTokenCache` que derivan de la implementaci\u00f3n predeterminada (`DistributedClientCredentialsTokenCache`) requerir\u00e1n un peque\u00f1o cambio de c\u00f3digo, ya que su constructor se modific\u00f3 para agregar una dependencia en el servicio `ITokenRequestSynchronization`. El servicio de sincronizaci\u00f3n deber\u00e1 inyectarse en la clase derivada y pasarse al constructor base. El impacto de esta vulnerabilidad depende de c\u00f3mo se use Duende.AccessTokenManagement y de la arquitectura de seguridad de la soluci\u00f3n. La mayor\u00eda de los usuarios no ser\u00e1n vulnerables a este problema. Los usuarios m\u00e1s avanzados pueden encontrarse con este problema al llamar a los m\u00e9todos especificados anteriormente con par\u00e1metros de solicitud de token personalizados. El impacto de obtener un token de acceso con par\u00e1metros de protocolo diferentes a los previstos variar\u00e1 seg\u00fan la l\u00f3gica de la aplicaci\u00f3n, la arquitectura de seguridad y la pol\u00edtica de autorizaci\u00f3n de los servidores de recursos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26623.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26623.json index ced7f0d8eb3..1ac0d9253d4 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26623.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26623.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are **not** affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fixiso`. The bug is fixed in version v0.28.5. Users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Exiv2 es un C ++ librer\u00eda y una utilidad de l\u00ednea de comandos para leer, escribir, eliminar y modificar los metadatos de imagen EXIF, IPTC, XMP e ICC. Se encontr\u00f3 un desbordamiento del b\u00fafer Heap en las versiones EXIV2 V0.28.0 a V0.28.4. Las versiones anteriores a V0.28.0, como V0.27.7, ** no ** son afectadas. Exiv2 es una utilidad de l\u00ednea de comandos y una biblioteca de C++ para leer, escribir, eliminar y modificar los metadatos de archivos de imagen. El desbordamiento del mont\u00f3n se activa cuando Exiv2 se usa para escribir metadatos en un archivo de imagen manipulado. Un atacante podr\u00eda explotar la vulnerabilidad para obtener la ejecuci\u00f3n del c\u00f3digo, si puede enga\u00f1ar a la v\u00edctima para que ejecute Exiv manipulado Archivo de imagen elaborado. Tenga en cuenta que este error solo se activa al escribir los metadatos, que es una operaci\u00f3n exiv2 de uso menos frecuente que leer los metadatos. Por ejemplo, para activar el error en la aplicaci\u00f3n de l\u00ednea de comandos Exiv2, debe agregar un argumento de l\u00ednea de comandos adicional como `FixISO`. El error se soluciona en la versi\u00f3n v0.28.5. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26624.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26624.json index e19da57497b..d148bf54175 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26624.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26624.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Rufus is a utility that helps format and create bootable USB flash drives. A DLL hijacking vulnerability in Rufus 4.6.2208 and earlier versions allows an attacker loading and executing a malicious DLL with escalated privileges (since the executable has been granted higher privileges during the time of launch) due to the ability to inject a malicious `cfgmgr32.dll` in the same directory as the executable and have it side load automatically. This is fixed in commit `74dfa49`, which will be part of version 4.7. Users are advised to upgrade as soon as version 4.7 becomes available. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Rufus es una utilidad que ayuda a formatear y crear unidades flash USB de arranque. Una vulnerabilidad de secuestro de DLL en Rufus 4.6.2208 y versiones anteriores permite que un atacante cargue y ejecute una DLL maliciosa con privilegios escalados (ya que al ejecutable se les ha otorgado privilegios m\u00e1s altos durante el tiempo de lanzamiento) debido a la capacidad de inyectar un `CFGMGR32 malicioso. dll` en el mismo directorio que el ejecutable y haga que se cargue lateralmente autom\u00e1ticamente. Esto se soluciona en el commit `74DFA49`, que ser\u00e1 parte de la versi\u00f3n 4.7. Se recomienda a los usuarios que actualicen tan pronto como est\u00e9 disponible la versi\u00f3n 4.7. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26700.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26700.json index 3098ec6a869..55936e42ba9 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26700.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26700.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Authentication bypass using an alternate path or channel issue exists in \u201dRoboForm Password Manager\" App for Android versions prior to 9.7.4, which may allow an attacker with access to a device where the application is installed to bypass the lock screen and obtain sensitive information." + }, + { + "lang": "es", + "value": "Existe un problema de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en la aplicaci\u00f3n \"RoboForm Password Manager\" para versiones de Android anteriores a 9.7.4, lo que puede permitir que un atacante con acceso a un dispositivo donde est\u00e1 instalada la aplicaci\u00f3n omita la pantalla de bloqueo y obtenga informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json index 09356ecbaa6..7c940711a1a 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Timeline Block allows Stored XSS. This issue affects Timeline Block: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en bPlugins Timeline Block permite XSS almacenado. Este problema afecta a Timeline Block: desde n/a hasta 1.1.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26755.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26755.json index 53d61608d93..cb8677624d7 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26755.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26755.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in jgwhite33 WP Airbnb Review Slider allows Blind SQL Injection. This issue affects WP Airbnb Review Slider: from n/a through 3.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en jgwhite33 WP Airbnb Review Slider permite la inyecci\u00f3n SQL a ciegas. Este problema afecta a WP Airbnb Review Slider: desde n/a hasta 3.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json index 68ae16cc9ea..d41f3add3aa 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RebelCode Spotlight Social Media Feeds allows Retrieve Embedded Sensitive Data. This issue affects Spotlight Social Media Feeds: from n/a through 1.7.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad Exposici\u00f3n de informaci\u00f3n confidencial del sistema a una esfera de control no autorizada en RebelCode Spotlight Social Media Feeds permite recuperar datos confidenciales integrados. Este problema afecta a los feeds de redes sociales de Spotlight: desde n/a hasta 1.7.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26759.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26759.json index ccc06c2a9a3..42a0ea3110d 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26759.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26759.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in alexvtn Content Snippet Manager allows Stored XSS. This issue affects Content Snippet Manager: from n/a through 1.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en alexvtn Content Snippet Manager permite XSS almacenado. Este problema afecta al administrador de fragmentos de contenido: desde n/a hasta 1.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26761.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26761.json index 8a191db7e3a..bc400348608 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26761.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26761.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Easy Elementor Addons allows DOM-Based XSS. This issue affects Easy Elementor Addons: from n/a through 2.1.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en HashThemes Easy Elementor Addons permite XSS basado en DOM. Este problema afecta a Easy Elementor Addons: desde n/a hasta 2.1.5." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26765.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26765.json index 981b6292bda..e5aa6143f65 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26765.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26765.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en enituretechnology Distance Based Shipping Calculator permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a la Calculadora de env\u00edo basada en distancia: desde n/d hasta 2.0.22." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26766.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26766.json index d0214f62e6b..04dba392f12 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26766.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26766.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VaultDweller Leyka allows Stored XSS. This issue affects Leyka: from n/a through 3.31.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en VaultDweller Leyka permite XSS almacenado. Este problema afecta a Leyka: desde n/a hasta 3.31.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26767.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26767.json index a44ef280f24..87a9494d86f 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26767.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26767.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely \u2013 Advanced Gutenberg Blocks allows Stored XSS. This issue affects Qubely \u2013 Advanced Gutenberg Blocks: from n/a through 1.8.12." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Themeum Qubely \u2013 Advanced Gutenberg Blocks permite XSS almacenado. Este problema afecta a Qubely \u2013 Advanced Gutenberg Blocks: desde n/a hasta 1.8.12." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26768.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26768.json index c3cfef308ac..e816f40ce0b 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26768.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26768.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in what3words what3words Address Field allows Stored XSS. This issue affects what3words Address Field: from n/a through 4.0.15." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en what3words what3words Address Field permite XSS almacenado. Este problema afecta al campo de direcci\u00f3n de what3words: desde n/a hasta 4.0.15." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json index aa5f9870082..e713085e2e2 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilia Inc. Vertex Addons for Elementor allows Stored XSS. This issue affects Vertex Addons for Elementor: from n/a through 1.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Webilia Inc. Vertex Addons for Elementor permite XSS almacenado. Este problema afecta a Vertex Addons for Elementor: desde n/a hasta 1.2.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json index d611c11037d..a4da1e82b3c 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Waymark allows Stored XSS. This issue affects Waymark: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Joe Waymark permite XSS almacenado. Este problema afecta a Waymark: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json index ba97e3758f0..bfd478196bd 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS. This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en sonalsinha21 SKT Blocks \u2013 Gutenberg based Page Builder permite XSS almacenado. Este problema afecta a SKT Blocks \u2013 Gutenberg based Page Builder: desde n/a hasta 1.7." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json index 74c0f5d01bb..c5895f5f21e 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Detheme DethemeKit For Elementor allows Stored XSS. This issue affects DethemeKit For Elementor: from n/a through 2.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Detheme DethemeKit For Elementor permite XSS almacenado. Este problema afecta a DethemeKit For Elementor: desde n/a hasta 2.1.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json index e151abf509e..601587096a1 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de falta de autorizaci\u00f3n en Adnan Analytify permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Analytify desde la versi\u00f3n n/a hasta la versi\u00f3n 5.5.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json index 77b22879895..94d40c0b37b 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 BEAR allows Stored XSS. This issue affects BEAR: from n/a through 1.1.4.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en RealMag777 BEAR permite XSS almacenado. Este problema afecta a BEAR: desde n/a hasta 1.1.4.4." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json index e2235c8fb24..8d512f334ef 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en NotFound Gallery permite XSS almacenado. Este problema afecta a Gallery: desde n/a hasta 2.2.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26779.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26779.json index 1d287212b34..616e75ff15c 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26779.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26779.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fahad Mahmood Keep Backup Daily allows Path Traversal. This issue affects Keep Backup Daily: from n/a through 2.1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en Fahad Mahmood Keep Backup Daily permite Path Traversal. Este problema afecta a Keep Backup Daily: desde n/a hasta 2.1.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26788.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26788.json index cba94940393..ed656d8f1a4 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26788.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26788.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction." + }, + { + "lang": "es", + "value": "StrongKey FIDO Server anterior a 4.15.1 trata un flujo no detectable (namedcredential) como una transacci\u00f3n detectable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26789.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26789.json index 25ce0b93fc9..93a6aa90933 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26789.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26789.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Logpoint AgentX before 1.5.0. A vulnerability caused by limited access controls allowed li-admin users to access sensitive information about AgentX Manager in a Logpoint deployment." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Logpoint AgentX antes de la versi\u00f3n 1.5.0. Una vulnerabilidad causada por controles de acceso limitados permit\u00eda a los usuarios li-admin acceder a informaci\u00f3n confidencial sobre AgentX Manager en una implementaci\u00f3n de Logpoint." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26791.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26791.json index 04f046ebd9f..ee028c3defe 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26791.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26791.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "DOMPurify before 3.2.4 has an incorrect template literal regular expression, sometimes leading to mutation cross-site scripting (mXSS)." + }, + { + "lang": "es", + "value": "DOMPurify anterior a 3.2.4 tiene una expresi\u00f3n regular literal de plantilla incorrecta, lo que a veces provoca Cross Site Scripting (mXSS) de mutaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26793.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26793.json index 63ef764c9a1..e992f067042 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26793.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26793.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE: the Supplier's perspective is that the \"vulnerable systems are not following manufacturers' recommendations to change the default password.\"" + }, + { + "lang": "es", + "value": "El panel de configuraci\u00f3n de la interfaz gr\u00e1fica de usuario web de Hirsch (anteriormente Identiv y Viscount) Enterphone MESH hasta 2024 se entrega con credenciales predeterminadas (nombre de usuario freedom, contrase\u00f1a viscond). No se le solicita al administrador que cambie estas credenciales en la configuraci\u00f3n inicial, y cambiar las credenciales requiere muchos pasos. Los atacantes pueden usar las credenciales a trav\u00e9s de Internet mediante mesh.webadmin.MESHAdminServlet para obtener acceso a docenas de edificios de apartamentos canadienses y estadounidenses y obtener informaci\u00f3n de identificaci\u00f3n personal de los residentes del edificio. NOTA: la perspectiva del proveedor es que los \"sistemas vulnerables no siguen las recomendaciones de los fabricantes para cambiar la contrase\u00f1a predeterminada\"." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26819.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26819.json index effd8e1ca1c..c3096a5359d 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26819.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26819.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Monero through 0.18.3.4 before ec74ff4 does not have response limits on HTTP server connections." + }, + { + "lang": "es", + "value": "Monero hasta la versi\u00f3n 0.18.3.4 anterior a ec74ff4 no tiene l\u00edmites de respuesta en las conexiones del servidor HTTP." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26856.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26856.json index d0b2f44e223..0c8e0669f00 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26856.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26856.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If an attacker logs in to the affected product with an administrative account and manipulates requests for a certain screen operation, an arbitrary OS command may be executed. This vulnerability was reported on a different screen operation from CVE-2025-20617." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n inadecuada de los elementos especiales utilizados en un problema de comando OS ('inyecci\u00f3n de comando de os') existe en el firmware UD-LT2 ver.1.00.008_SE y anterior. Si un atacante inicia sesi\u00f3n en el producto afectado con una cuenta administrativa y manipula las solicitudes de una determinada operaci\u00f3n de pantalla, se puede ejecutar un comando Arbitrary OS. Esta vulnerabilidad se inform\u00f3 en una operaci\u00f3n de pantalla diferente de CVE-2025-20617." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27013.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27013.json index fb58f8ae24b..a8db063df54 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27013.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27013.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Missing Authorization vulnerability in EPC MediCenter - Health Medical Clinic WordPress Theme allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MediCenter - Health Medical Clinic WordPress Theme: from n/a through n/a." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en EPC MediCenter - Health Medical Clinic WordPress Theme permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta el tema Medicenter - WordPress de la cl\u00ednica m\u00e9dica de salud: desde N/A hasta N/A. " } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27016.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27016.json index 5180d48065d..c605773c203 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27016.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in awsm.in Drivr Lite \u2013 Google Drive Plugin allows Stored XSS. This issue affects Drivr Lite \u2013 Google Drive Plugin: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en AWSM.in Drivr Lite-Google Drive Plugin permite XSS almacenado. Este problema afecta a DRIVR Lite - complemento de Google Drive: desde N/A hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27089.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27089.json index 0126e9f7e17..a7abf40e281 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27089.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27089.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. In affected versions if there are two overlapping policies for the `update` action that allow access to different fields, instead of correctly checking access permissions against the item they apply for the user is allowed to update the superset of fields allowed by any of the policies. E.g. have one policy allowing update access to `field_a` if the `id == 1` and one policy allowing update access to `field_b` if the `id == 2`. The user with both these policies is allowed to update both `field_a` and `field_b` for the items with ids `1` and `2`. Before v11, if a user was allowed to update an item they were allowed to update the fields that the single permission, that applied to that item, listed. With overlapping permissions this isn't as clear cut anymore and the union of fields might not be the fields the user is allowed to update for that specific item. The solution that this PR introduces is to evaluate the permissions for each field that the user tries to update in the validateItemAccess DB query, instead of only verifying access to the item as a whole. This is done by, instead of returning the actual field value, returning a flag that indicates if the user has access to that field. This uses the same case/when mechanism that is used for stripping out non permitted field that is at the core of the permissions engine. As a result, for every item that the access is validated for, the expected result is an item that has either 1 or null for all the \"requested\" fields instead of any of the actual field values. These results are not useful for anything other than verifying the field level access permissions. The final check in validateItemAccess can either fail if the number of items does not match the number of items the access is checked for (ie. the user does not have access to the item at all) or if not all of the passed in fields have access permissions for any of the returned items. This is a vulnerability that allows update access to unintended fields, potentially impacting the password field for user accounts. This has been addressed in version 11.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Directus es un tablero de API y aplicaciones en tiempo real para administrar el contenido de la base de datos SQL. En las versiones afectadas, si hay dos pol\u00edticas superpuestas para la acci\u00f3n `` `update'' que permiten el acceso a diferentes campos, en lugar de verificar correctamente los permisos de acceso contra el elemento que solicitan para el usuario puede actualizar el superconjunto de campos permitidos por cualquiera de las pol\u00edticas. Por ejemplo: Tenga una pol\u00edtica que permita actualizar el acceso a `field_a` si el` id == 1` y una pol\u00edtica que permite el acceso de actualizaci\u00f3n a `field_b` si el` id == 2`. El usuario con ambas pol\u00edticas puede actualizar tanto `Field_A` y` Field_B` para los elementos con IDS `1` y` 2`. Antes de V11, si a un usuario se le permit\u00eda actualizar un elemento, se le permit\u00eda actualizar los campos que el permiso \u00fanico, que se aplicaba a ese elemento, enumer\u00f3. Con los permisos superpuestos, esto ya no es tan claro y la uni\u00f3n de los campos podr\u00eda no ser los campos que el usuario puede actualizar para ese elemento espec\u00edfico. La soluci\u00f3n que introduce este PR es evaluar los permisos para cada campo que el usuario intenta actualizar en la consulta DB de ValidateItemAccess, en lugar de verificar solo el acceso al elemento en su conjunto. Esto se hace, en lugar de devolver el valor de campo real, devolver un indicador que indica si el usuario tiene acceso a ese campo. Esto utiliza el mismo mecanismo de caso/cuando se utiliza para eliminar el campo no permitido que est\u00e9 en el n\u00facleo del motor de permisos. Como resultado, para cada elemento para el que se valida el acceso, el resultado esperado es un elemento que tiene 1 o NULL para todos los campos \"solicitados\" en lugar de cualquiera de los valores de campo reales. Estos resultados no son \u00fatiles para nada m\u00e1s que verificar los permisos de acceso a nivel de campo. La comprobaci\u00f3n final de ValidateItemAccess puede fallar si el n\u00famero de elementos no coincide con el n\u00famero de elementos para el que se verifica el acceso (es decir, el usuario no tiene acceso al elemento) o si no todos los campos pasados ??tienen Permisos de acceso para cualquiera de los art\u00edculos devueltos. Esta es una vulnerabilidad que permite actualizar el acceso a los campos no deseados, lo que puede impactar el campo de contrase\u00f1a para las cuentas de los usuarios. Esto se ha abordado en la versi\u00f3n 11.1.2 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27090.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27090.json index 9103837d495..37ea173c288 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27090.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27090.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on the sliver teamserver without verifying if the operator instructed the implant to do so. The only impact that has been shown is the exposure of the server's IP address to a third party. This issue has been addressed in version 1.5.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Sliver es una emulaci\u00f3n adversaria cruzada de c\u00f3digo abierto/equipo rojo framework, las organizaciones de todos los tama\u00f1os pueden utilizar las pruebas de seguridad. El reenv\u00edo de puerto inverso en Sliver TeamServer permite al implante abrir un t\u00fanel inverso en el servidor de equipos de Sliver sin verificar si el operador instruy\u00f3 al implante que lo hiciera. El \u00fanico impacto que se ha demostrado es la exposici\u00f3n de la direcci\u00f3n IP del servidor a un tercero. Este problema se ha abordado en la versi\u00f3n 1.5.43 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json index 90e30977909..7e98b123d43 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27091.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim's user decoding client and, possibly, perform arbitrary commands on the victim's host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 software releases 2.6.0 and later contained the fix for this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* [Open an issue in cisco/openh264](https://github.com/cisco/openh264/issues)\n* Email Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) and Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com))\n\n### Credits:\n\n* **Research:** Octavian Guzu and Andrew Calvano of Meta\n* **Fix ideation:** Philipp Hancke and Shyam Sadhwani of Meta\n* **Fix implementation:** Benzheng Zhang (@BenzhengZhang)\n* **Release engineering:** Benzheng Zhang (@BenzhengZhang)" + }, + { + "lang": "es", + "value": "OpenH264 es una librer\u00eda de c\u00f3decs con licencia libre que admite la codificaci\u00f3n y decodificaci\u00f3n H.264. Una vulnerabilidad en las funciones de decodificaci\u00f3n de la librer\u00eda de c\u00f3decs OpenH264 podr\u00eda permitir que un atacante remoto no autenticado provoque un desbordamiento de pila. Esta vulnerabilidad se debe a una condici\u00f3n de ejecuci\u00f3n entre una asignaci\u00f3n de memoria de conjunto de par\u00e1metros de secuencia (SPS) y un uso posterior de memoria de la unidad de capa de abstracci\u00f3n de red (NAL) que no sea de actualizaci\u00f3n instant\u00e1nea del decodificador (no IDR). Un atacante podr\u00eda aprovechar esta vulnerabilidad manipulando un flujo de bits malicioso y enga\u00f1ando al usuario v\u00edctima para que procese un v\u00eddeo arbitrario que contenga el flujo de bits malicioso. Un exploit podr\u00eda permitir al atacante provocar un bloqueo inesperado en el cliente de decodificaci\u00f3n del usuario de la v\u00edctima y, posiblemente, ejecutar comandos arbitrarios en el host de la v\u00edctima abusando del desbordamiento de pila. Esta vulnerabilidad afecta a OpenH264 2.5.0 y versiones anteriores. Tanto el modo de codificaci\u00f3n de v\u00eddeo escalable (SVC) como el modo de codificaci\u00f3n de v\u00eddeo avanzada (AVC) se ven afectados por esta vulnerabilidad. Las versiones 2.6.0 y posteriores del software OpenH264 conten\u00edan la correcci\u00f3n para esta vulnerabilidad. Se recomienda a los usuarios que actualicen. No existen workarounds para esta vulnerabilidad. ### Para obtener m\u00e1s informaci\u00f3n Si tiene alguna pregunta o comentario sobre este aviso: * [Abra un problema en cisco/openh264](https://github.com/cisco/openh264/issues) * Env\u00ede un correo electr\u00f3nico a Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) y Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com)) ### Cr\u00e9ditos: * **Investigaci\u00f3n:** Octavian Guzu y Andrew Calvano de Meta * **Idea de la correcci\u00f3n:** Philipp Hancke y Shyam Sadhwani de Meta * **Implementaci\u00f3n de la correcci\u00f3n:** Benzheng Zhang (@BenzhengZhang) * **Ingenier\u00eda de la versi\u00f3n:** Benzheng Zhang (@BenzhengZhang)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27092.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27092.json index b0ea7d6011f..5b06de488b2 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27092.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27092.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile photos for NPCs (Non-Player Characters) but fails to properly validate and sanitize file paths. When an NPC is created with a specially crafted photoLink value containing path traversal sequences (../, ..\\, etc.), the application processes these sequences without proper sanitization. This allows an attacker to traverse directory structures and access files outside of the intended photo directory, potentially exposing sensitive system files. The vulnerability is particularly severe because it allows reading arbitrary files from the server's filesystem with the permissions of the web application process, which could include configuration files, credentials, or other sensitive data. This issue has been addressed in version 8.2.7.90 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "Ghosts es una simulaci\u00f3n de usuario de c\u00f3digo abierto framework para la experimentaci\u00f3n cibern\u00e9tica, simulaci\u00f3n, entrenamiento y ejercicio. Se descubri\u00f3 una vulnerabilidad Path Traversal en Ghosts versi\u00f3n 8.0.0.0 que permite a un atacante acceder a archivos fuera del directorio previsto a trav\u00e9s de la recuperaci\u00f3n de fotos endpoint. La vulnerabilidad existe en/API/NPCS/{ID}/endpoint DPOINT, que est\u00e1 dise\u00f1ada para servir fotos de perfil para NPC (caracteres no jugadores) pero no puede validar correctamente y depurar rutas de archivo. Cuando se crea un NPC con un valor especialmente manipulado Photolink que contiene secuencias Path Traversal (../, .. \\, etc.), la aplicaci\u00f3n procesa estas secuencias sin apropiado depuraci\u00f3n. Esto permite a un atacante recorrer estructuras de directorio y acceder a archivos fuera del directorio de fotos previsto, lo que puede exponer archivos sensibles sistema. La vulnerabilidad es particularmente severa porque permite leer archivos arbitrarios del sistema de archivos del servidor con los permisos del proceso de aplicaci\u00f3n web, que podr\u00eda incluir archivos de configuraci\u00f3n, credenciales u otros datos confidenciales. Este problema se ha abordado en la versi\u00f3n 8.2.7.90 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json index dd1289d5543..96dc14010d9 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "WeGIA is a Web Manager for Institutions with a focus on Portuguese language. A SQL Injection vulnerability was discovered in the WeGIA application, personalizacao_upload.php endpoint. This vulnerability allow an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "WeGIA es un administrador web para instituciones enfocado en el idioma portugu\u00e9s. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en el endpoint personalizacao_upload.php de la aplicaci\u00f3n WeGIA. Esta vulnerabilidad permite que un atacante autorizado ejecute consultas SQL arbitrarias, lo que permite el acceso a informaci\u00f3n confidencial. Este problema se ha solucionado en la versi\u00f3n 3.2.14 y se recomienda a todos los usuarios que actualicen la versi\u00f3n. No se conocen workarounds para esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27097.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27097.json index 180e85921fc..f0ccfe65e5a 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27097.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. When a user transforms on the root level or single source with transforms, and the client sends the same query with different variables, the initial variables are used in all following requests until the cache evicts DocumentNode. If a token is sent via variables, the following requests will act like the same token is sent even if the following requests have different tokens. This can cause a short memory leak but it won't grow per each request but per different operation until the cache evicts DocumentNode by LRU mechanism." + }, + { + "lang": "es", + "value": "GraphQL Mesh es un framework de trabajo y una puerta de enlace de GraphQL Federation para GraphQL Federation y subgrafos que no son de GraphQL Federation, servicios que no son de GraphQL, como REST y gRPC, y tambi\u00e9n bases de datos como MongoDB, MySQL y PostgreSQL. Cuando un usuario realiza una transformaci\u00f3n en el nivel superusuario o en una \u00fanica fuente con transformaciones, y el cliente env\u00eda la misma consulta con diferentes variables, las variables iniciales se utilizan en todas las solicitudes siguientes hasta que la memoria cach\u00e9 expulsa a DocumentNode. Si se env\u00eda un token a trav\u00e9s de variables, las solicitudes siguientes actuar\u00e1n como si se enviara el mismo token, incluso si las solicitudes siguientes tienen tokens diferentes. Esto puede provocar una breve p\u00e9rdida de memoria, pero no aumentar\u00e1 con cada solicitud, sino con cada operaci\u00f3n diferente hasta que la memoria cach\u00e9 expulse a DocumentNode mediante el mecanismo LRU." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27098.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27098.json index c36328f26d6..7ab6852eda6 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27098.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. Missing check vulnerability in the static file handler allows any client to access the files in the server's file system. When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`. Users have two options to fix vulnerability; 1. Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18` 2. Remove `staticFiles` option from the configuration, and use other solutions to serve static files." + }, + { + "lang": "es", + "value": "GraphQL Mesh es un framework de trabajo y puerta de enlace de GraphQL Federation tanto para GraphQL Federation como para subgrafos que no son de GraphQL Federation, servicios que no son de GraphQL, como REST y gRPC, y tambi\u00e9n bases de datos como MongoDB, MySQL y PostgreSQL. La vulnerabilidad de falta de verificaci\u00f3n en el controlador de archivos est\u00e1ticos permite que cualquier cliente acceda a los archivos en el sistema de archivos del servidor. Cuando se configura `staticFiles` en la configuraci\u00f3n de `serve` en el archivo de configuraci\u00f3n, el siguiente controlador no verifica si `absolutePath` todav\u00eda est\u00e1 bajo el directorio proporcionado como `staticFiles`. Los usuarios tienen dos opciones para corregir la vulnerabilidad; 1. Actualizar `@graphql-mesh/cli` a una versi\u00f3n superior a `0.82.21`, y si usa `@graphql-mesh/http`, actualizarlo a una versi\u00f3n superior a `0.3.18` 2. Eliminar la opci\u00f3n `staticFiles` de la configuraci\u00f3n y usar otras soluciones para servir archivos est\u00e1ticos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27100.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27100.json index b44a5c66e04..8068414c89b 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27100.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27100.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been patched in version 1.50.0. Users on versions 1.49.1 and below are affected. Users are advised to upgrade. Users unable to upgrade should either set the environment variable `LAKEFS_BLOCKSTORE_S3_DISABLE_PRE_SIGNED_MULTIPART` to `true` or configure the `disable_pre_signed_multipart` key to true in their config yaml." + }, + { + "lang": "es", + "value": "lakeFS es una herramienta de c\u00f3digo abierto que transforma su almacenamiento de objetos en un repositorio similar a Git. En las versiones afectadas, un usuario autenticado puede hacer que lakeFS se bloquee al agotar la memoria del servidor. Se trata de un problema de denegaci\u00f3n de servicio autenticado. Este problema se ha solucionado en la versi\u00f3n 1.50.0. Los usuarios de las versiones 1.49.1 y anteriores se ven afectados. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben configurar la variable de entorno `LAKEFS_BLOCKSTORE_S3_DISABLE_PRE_SIGNED_MULTIPART` en `true` o configurar la clave `disable_pre_signed_multipart` en true en su yaml de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json index 367c327b679..fceb35629ee 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27113.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c." + }, + { + "lang": "es", + "value": "LibXML2 antes de 2.12.10 y 2.13.x antes de 2.13.6 tiene una desreferencia de puntero nulo en XMLPATMatch en Pattern.c." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27218.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27218.json index 899242e3a2a..f388a8a79a2 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27218.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27218.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization." + }, + { + "lang": "es", + "value": "Sitecore Experience Manager (XM) y Experience Platform (XP) 10.4 antes de KB1002844 permiten la ejecuci\u00f3n del c\u00f3digo remoto a trav\u00e9s de la deserializaci\u00f3n insegura." } ], "metrics": { diff --git a/README.md b/README.md index b6913e8d9ba..0ba2e9ee6f1 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-22T23:00:20.311253+00:00 +2025-02-23T03:00:29.845877+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-02-22T01:00:04.360923+00:00 +2025-02-23T01:00:04.348606+00:00 ``` ### Total Number of included CVEs @@ -38,16 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -- [CVE-2022-28339](CVE-2022/CVE-2022-283xx/CVE-2022-28339.json) (`2025-02-22T21:15:34.723`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `672` -- [CVE-2024-38316](CVE-2024/CVE-2024-383xx/CVE-2024-38316.json) (`2025-02-22T21:15:34.937`) +- [CVE-2025-26770](CVE-2025/CVE-2025-267xx/CVE-2025-26770.json) (`2025-02-17T12:15:28.687`) +- [CVE-2025-26771](CVE-2025/CVE-2025-267xx/CVE-2025-26771.json) (`2025-02-17T12:15:28.833`) +- [CVE-2025-26772](CVE-2025/CVE-2025-267xx/CVE-2025-26772.json) (`2025-02-17T12:15:28.980`) +- [CVE-2025-26773](CVE-2025/CVE-2025-267xx/CVE-2025-26773.json) (`2025-02-17T12:15:29.123`) +- [CVE-2025-26775](CVE-2025/CVE-2025-267xx/CVE-2025-26775.json) (`2025-02-17T12:15:29.260`) +- [CVE-2025-26778](CVE-2025/CVE-2025-267xx/CVE-2025-26778.json) (`2025-02-17T12:15:29.417`) +- [CVE-2025-26779](CVE-2025/CVE-2025-267xx/CVE-2025-26779.json) (`2025-02-16T23:15:11.630`) +- [CVE-2025-26788](CVE-2025/CVE-2025-267xx/CVE-2025-26788.json) (`2025-02-15T16:15:30.090`) +- [CVE-2025-26789](CVE-2025/CVE-2025-267xx/CVE-2025-26789.json) (`2025-02-14T08:15:31.357`) +- [CVE-2025-26791](CVE-2025/CVE-2025-267xx/CVE-2025-26791.json) (`2025-02-14T16:15:37.350`) +- [CVE-2025-26793](CVE-2025/CVE-2025-267xx/CVE-2025-26793.json) (`2025-02-15T15:15:23.587`) +- [CVE-2025-26819](CVE-2025/CVE-2025-268xx/CVE-2025-26819.json) (`2025-02-15T00:15:28.510`) +- [CVE-2025-26856](CVE-2025/CVE-2025-268xx/CVE-2025-26856.json) (`2025-02-20T06:15:21.673`) +- [CVE-2025-27013](CVE-2025/CVE-2025-270xx/CVE-2025-27013.json) (`2025-02-18T20:15:33.880`) +- [CVE-2025-27016](CVE-2025/CVE-2025-270xx/CVE-2025-27016.json) (`2025-02-18T20:15:34.013`) +- [CVE-2025-27089](CVE-2025/CVE-2025-270xx/CVE-2025-27089.json) (`2025-02-19T17:15:15.800`) +- [CVE-2025-27090](CVE-2025/CVE-2025-270xx/CVE-2025-27090.json) (`2025-02-19T22:15:24.247`) +- [CVE-2025-27091](CVE-2025/CVE-2025-270xx/CVE-2025-27091.json) (`2025-02-20T18:15:26.850`) +- [CVE-2025-27092](CVE-2025/CVE-2025-270xx/CVE-2025-27092.json) (`2025-02-19T23:15:15.957`) +- [CVE-2025-27096](CVE-2025/CVE-2025-270xx/CVE-2025-27096.json) (`2025-02-20T19:15:12.157`) +- [CVE-2025-27097](CVE-2025/CVE-2025-270xx/CVE-2025-27097.json) (`2025-02-20T21:15:26.227`) +- [CVE-2025-27098](CVE-2025/CVE-2025-270xx/CVE-2025-27098.json) (`2025-02-20T21:15:26.370`) +- [CVE-2025-27100](CVE-2025/CVE-2025-271xx/CVE-2025-27100.json) (`2025-02-21T00:15:09.250`) +- [CVE-2025-27113](CVE-2025/CVE-2025-271xx/CVE-2025-27113.json) (`2025-02-18T23:15:10.960`) +- [CVE-2025-27218](CVE-2025/CVE-2025-272xx/CVE-2025-27218.json) (`2025-02-20T21:15:26.510`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f90f8d14c0d..9d09511d9da 100644 --- a/_state.csv +++ b/_state.csv @@ -85029,7 +85029,7 @@ CVE-2016-1642,0,0,66841ee498ca853ea6b5936c383c57d7698ce1fabf9c8ee7451137702466df CVE-2016-1643,0,0,42a0f14881456f59b972cc3a93852e36631b4c9be928ccf9872f9dd28f88d14f,2024-11-21T02:46:48.240000 CVE-2016-1644,0,0,b3b28a4b3543f909beb5109e758edb8e660120ad9a32629ead0d455446752dab,2024-11-21T02:46:48.350000 CVE-2016-1645,0,0,c6fd969932556e60d0bd2093779d4a9531ece63c642981335df9f0ae9ef57939,2024-11-21T02:46:48.453000 -CVE-2016-1646,0,0,04e8bec90a688e6705f7b467bf1a8708428b7db1a814a6b3b577e08bdfd42493,2025-01-29T18:15:26.670000 +CVE-2016-1646,0,1,f4ca24264b7073d4bd045011d19aae5c779c30e0aa2652887d376f416b549546,2025-01-29T18:15:26.670000 CVE-2016-1647,0,0,e08338c6621bdf3b997998680f254b4dd517410fe6cc2425120e41567d57f615,2024-11-21T02:46:48.697000 CVE-2016-1648,0,0,774476717a95c723bbddd1c1af5822e5c17b3d5d970f0feb63f42e149e060d29,2024-11-21T02:46:48.807000 CVE-2016-1649,0,0,3906b2c16ac489a143a7354ad8ab0a053bc66d60da97153cc6f9deacbf4ffa8b,2024-11-21T02:46:48.917000 @@ -106956,7 +106956,7 @@ CVE-2017-6849,0,0,c87a3d14034618258dcaa1d38546542b91edb7da2cf34fe76a2481d208cb7b CVE-2017-6850,0,0,ecdf301b79b09e8ddbeca44bb35325e49781ce82d77bcec81ba07775afdd69b8,2024-11-21T03:30:40.730000 CVE-2017-6851,0,0,a53e3803f720f8b430644b0fe96cfb6a6dc10d34766fa4003bc8f3fe159f9ea1,2024-11-21T03:30:40.883000 CVE-2017-6852,0,0,99a1fb15db442be975b34d7b40bd97bd3a7d4f39ea7f5795df52204fd0e411e6,2024-11-21T03:30:41.033000 -CVE-2017-6862,0,0,ab4da5e7a95b45c3ab58e147fc0739f382af7204f118e76a69233eaaeff3c739,2025-02-07T14:15:43.297000 +CVE-2017-6862,0,1,0852f69bfa59749e305c3e1c36420b4a9b4e8398baaecb704cd4c47e9415a6f8,2025-02-07T14:15:43.297000 CVE-2017-6864,0,0,17dcd3a7c1bd7b1c45121ae1c99ac6e7c4158aec469add0c6096632ec9e8e6d5,2024-11-21T03:30:41.317000 CVE-2017-6865,0,0,996a39dbcd58e23a9bba2c0b62d1614d77e7acdfe49f45b27aa51c1bd61f4d99,2024-11-21T03:30:41.443000 CVE-2017-6866,0,0,d052d39abcfd2e686b21beb68ba70f23eb207cc7c304c204d614557d08f37bcf,2024-11-21T03:30:41.580000 @@ -117696,7 +117696,7 @@ CVE-2018-17476,0,0,b82e2586d31ff96e7ed50d9b32856cbcf064f3fc9c20e2d0340fb82cfd8cb CVE-2018-17477,0,0,62c76d413d0f58ae5f5b2bee9a0114cda8658fe7ab93ec9845c2b5dba5ee3fa3,2024-11-21T03:54:30.373000 CVE-2018-17478,0,0,57f313c3ffbf31c83ffe86b2f8a6c7aae3a147584a1a7cad9f105ca5e1111d8d,2024-11-21T03:54:30.493000 CVE-2018-17479,0,0,c76681d8118fafc2babcee23dcfa90a9c1484876a611e662828819ad714ffe25,2024-11-21T03:54:30.610000 -CVE-2018-17480,0,0,fd14111f86ee6f3bf8b25c986861acc07a0fff3f56a306bf42d9f8efd8bbd25e,2025-01-29T18:15:30.320000 +CVE-2018-17480,0,1,e0f5002a70c4e8eb2e6fd859a4c6b7b91cc53a4c875e3992c6b50281217cf412,2025-01-29T18:15:30.320000 CVE-2018-17481,0,0,9741e539125e44a47705c78676f45007a9687377dca966576cd1dbdcb1fc73bc,2024-11-21T03:54:30.877000 CVE-2018-17482,0,0,499d51e536f5d530705788d87899b5e2e8ba06842bd8f6d2e456e0c8448fa49f,2024-11-21T03:54:31.010000 CVE-2018-17483,0,0,a70a6e7d0433cb2df7f68c5a06051d6c4e07fa9f804e81f0166a2b0eb1829002,2024-11-21T03:54:31.133000 @@ -134380,7 +134380,7 @@ CVE-2019-16516,0,0,d30583ecc33ac622b8bef687c972d231e6e7a88cfb12a2e2eb5e602a80e12 CVE-2019-16517,0,0,06e1e2d9a09c82ac5e37c416ffdb091067576da11213abe67a353352608be8d0,2024-11-21T04:30:44.773000 CVE-2019-16518,0,0,371ff8cd1814b34e4ee5f74c84ea4bc85e40aa0b4dfff5c305e6a526ef4d55bd,2024-11-21T04:30:44.913000 CVE-2019-16519,0,0,e0e03160c7a07f50bc7ebffea82797083edc2d36c364829cc3c57b96868e1bae,2024-11-21T04:30:45.043000 -CVE-2019-1652,0,0,900a2341011460e050cb303cb559e878f1799f9566a1f07eba6f9d1b039ace4b,2024-11-21T04:37:01.077000 +CVE-2019-1652,0,1,52d8cac1adff3ed5816ac2b62052cdc4a784f08dec252ccd5b63568885419d5e,2024-11-21T04:37:01.077000 CVE-2019-16520,0,0,8dba449bb9571e640f531f9d6a74aab5838cdc579f2092375f63ab7671df12a0,2024-11-21T04:30:45.180000 CVE-2019-16521,0,0,b9665867e96d541e593baf6f0269bffc6571e5ebeef46426432c63848794b77a,2024-11-21T04:30:45.330000 CVE-2019-16522,0,0,b2fe50efec30dbae822dcb51e3e840a6b9d4a94d74a867b679e8011e2bb31f87,2024-11-21T04:30:45.480000 @@ -147857,7 +147857,7 @@ CVE-2020-12802,0,0,395d69f197a3ced3455109e5bd05746be48c447f66319d54c30e04abf5d16 CVE-2020-12803,0,0,37af94dbae7cd76b1e10c001886b0726f1c52c6df9e5edadf1db6c3628d0b1c7,2024-11-21T05:00:19.277000 CVE-2020-1281,0,0,5b630652f79a78b4c5d028fc3aacc60e3ead12a03695dc3d5b0b00f09a84e9dc,2024-11-21T05:10:09.350000 CVE-2020-12811,0,0,dc952fbead7c0a414715b956b577ba130da8f1aec2890e1431a81dfc08512fab,2024-11-21T05:00:19.410000 -CVE-2020-12812,0,0,118f0e1170ee27167f20ed94ae9f7fc0659097471f001848278f20811bbd3bf1,2025-02-04T20:15:36.260000 +CVE-2020-12812,0,1,ea1d245267bb54900e015bcc5486740af69de734727b2af7b3f96776414fd1d1,2025-02-04T20:15:36.260000 CVE-2020-12814,0,0,67560e8bab0e4919f7b69453065b8a11372c957cb00fed4734deebc86cd6c533,2024-11-21T05:00:19.660000 CVE-2020-12815,0,0,df32f1c62003cdadbb0afc24ca75df39ca4dc0804ab8b97162715dc4a5294a28,2024-11-21T05:00:19.800000 CVE-2020-12816,0,0,48c51f0235980afbcbab50ea2cb90c8fe4004526e9c3a06265fc9b2c75882eaf,2024-11-21T05:00:19.927000 @@ -169029,11 +169029,11 @@ CVE-2021-22499,0,0,9773921fb527ff3faefe67503447a688312356405bea14fe49b01c4adea2c CVE-2021-2250,0,0,02e7143422d11b9d257071d54e49944945e5d2bc3e0da7730679505021efd656,2024-11-21T06:02:43.590000 CVE-2021-22500,0,0,d45eaf83292bac2c1e4765ee29adaa0cd554d96cd55907da1e11f572fadaa60f,2024-11-21T05:50:14.093000 CVE-2021-22501,0,0,0dad278ccbb66decb7c16f5d1550175c0c299659e0293f55e07a25c6edc4fb60,2024-12-19T17:15:06.527000 -CVE-2021-22502,0,0,dd8ec2c0546cc78f34ae5f9b33b2dfef8dc91906ff0e2ddb066e3ec6c83dbde9,2025-02-06T21:15:16.477000 +CVE-2021-22502,0,1,868d19d0757d8b5b0f7b1abe2694ea07be4f383c67ad2a3be168e8cd600b77b5,2025-02-06T21:15:16.477000 CVE-2021-22503,0,0,599fd008966d76ce0dd0835db97b602770678be69077920ee3b77692b7561248,2024-09-19T14:25:42.487000 CVE-2021-22504,0,0,51ae3a4d3dd08bf23f364b37486c69f394fa86af9d5b6702868dc96271397db8,2024-11-21T05:50:14.387000 CVE-2021-22505,0,0,0e4923241084ca5d45638602e628674f93afaba61e286b7edf9998da7ee27dbe,2024-11-21T05:50:14.493000 -CVE-2021-22506,0,0,d54d42c3e63fb80c87f52a37fc0f3f213535d7d9141e8c38530a910506b138e5,2025-02-06T21:15:16.713000 +CVE-2021-22506,0,1,0a5be8c009a414d4b7c0aac03edeb9d625efad299b369c65e521576a4afb6c3e,2025-02-06T21:15:16.713000 CVE-2021-22507,0,0,1d7bd262e6dbb0de97ec82502d94488dcf9065699da10958261e302a0c568c29,2024-11-21T05:50:14.720000 CVE-2021-22508,0,0,9332969d62773548dc9fb24732fc05fd88f90dad5b26b07ab4a08b73ecf3aa05,2024-11-21T05:50:14.830000 CVE-2021-22509,0,0,6bd8ded7fb996a1eaf5e2c605ed502df1961030bc225694167e85491bd3e1b5d,2024-09-13T18:05:11.483000 @@ -180572,7 +180572,7 @@ CVE-2021-3797,0,0,3590ccc3191e2443aa904ab7148349c901e0e747927462bce890749221ee59 CVE-2021-37970,0,0,c0c056a237b910ce0a2b98bc1f0a90deee2f6b7531b4ed711278e73bcf99c30c,2024-11-21T06:16:09.500000 CVE-2021-37971,0,0,6f98832cea8c6c41a2789df18ed7da8b96043e8ad22001c09eeddd714eb83e85,2024-11-21T06:16:09.643000 CVE-2021-37972,0,0,683e1a1fefcd3e6b35217c21fee5a5db7a833faf0db4a4cea8afec0b89d7f32c,2024-11-21T06:16:09.790000 -CVE-2021-37973,0,0,743719dc94941c0357e14c84302b60c64b1c9baa604633a5edeaa1f72511ddde,2025-02-03T14:15:32.667000 +CVE-2021-37973,0,1,f6e3eb5a52902d515f80eab88d06b903882cf71b462d47ec910b5677092515b5,2025-02-03T14:15:32.667000 CVE-2021-37974,0,0,931558bac71f677090ea0b1907b8540ee5ebcd09055b5e5c0cdab44c71c9cd9c,2024-11-21T06:16:10.087000 CVE-2021-37975,0,0,574c7731ec3c645981816344462d7b8e155d6f2955a8879bf1219a53ab4d177c,2025-02-19T19:37:44.870000 CVE-2021-37976,0,0,dd5a7fa4d6b16e7e14ff3b5357015c05846da841d51b43f563c37221ca591a09,2025-02-20T18:05:54.830000 @@ -183028,7 +183028,7 @@ CVE-2021-41016,0,0,cad97df81aa4e8fc7a4b89f6b565f32f9714fcc8d7c9704f240db924b56d7 CVE-2021-41017,0,0,13d83da684a342a3d4118beeae167f68c5e1658577a3e814d039011058a26b0b,2024-11-21T06:25:16.307000 CVE-2021-41018,0,0,d42b54fcc556b35780be97477d50d3ed8a0b6cff12bbad42035bb50e6a936e72,2024-11-21T06:25:16.467000 CVE-2021-41019,0,0,8df706dad89a2de34e64a330a83d026482cfd33efc57e8c8f5277fe3a811478d,2024-11-21T06:25:16.613000 -CVE-2021-4102,0,0,387cba1cef4ae87c5a0ca1f41482be0671c19cc362bb1701330a73975ec6f96a,2025-01-29T17:15:15.653000 +CVE-2021-4102,0,1,b70ba4d9e2f360990cd62d1f38bc8764fba1b4ae5a85ba86da1609d070fc17ae,2025-01-29T17:15:15.653000 CVE-2021-41020,0,0,1db9cebd6dad263a5b4ddd67577da6a80b057d9a5aa10819d497a797239f9c06,2024-11-21T06:25:16.773000 CVE-2021-41021,0,0,d142a1a4fa2798d3359295557aa6bdde65bb04eed39b4bba6600d2e11a1cd4f4,2024-11-21T06:25:16.950000 CVE-2021-41022,0,0,78afac684054d3daa24c2c14f5b7b7b6211e3ad06d1df923f44be0bb7a91732c,2024-11-21T06:25:17.117000 @@ -185945,7 +185945,7 @@ CVE-2021-45040,0,0,3dd07265706e4de61364c6291ffa84304260bf3008f0d605fe153e435eb07 CVE-2021-45041,0,0,44c026922470d1db402ec2344ee4ed1df8b5b3c7ffa174b23058e284f11efb19,2024-11-21T06:31:50.993000 CVE-2021-45042,0,0,30a921bb9a7e69aa18089b9a9376ee639bf32f6beb6f661dd848b5453d225981,2024-11-21T06:31:51.180000 CVE-2021-45043,0,0,aa067c47f0bbc3d89eb352efb6935597a5e1f68f79cf3be6d41504cf150338ea,2024-11-21T06:31:51.330000 -CVE-2021-45046,0,0,652f563827d18f079bb5833ff69039956fd98684aa5a7bcc117e0f00810a3e7b,2025-02-04T20:15:45.010000 +CVE-2021-45046,0,1,0c6879b4511c0b22822219474eca7a735800539fa1833cb17629895851d49815,2025-02-04T20:15:45.010000 CVE-2021-45051,0,0,1737001b174d0edac7520596a663c3abb42cf487dc2700845d6beed2e827b7b0,2024-11-21T06:31:51.750000 CVE-2021-45052,0,0,f78b8629b1faae4633929e3c9c2864af6d3b5cd60c3d3b1b6c554f0bf53cfb24,2024-11-21T06:31:51.880000 CVE-2021-45053,0,0,b8dceb05f9425aa41892471fd8dbdcb242109d72aebab0cf174e11ef9db5c70a,2024-11-21T06:31:52.003000 @@ -187020,7 +187020,7 @@ CVE-2021-46678,0,0,04bb01ddefd6b08ae34da850f28969bf1fd48b6ec6f7ac9928ea2d26aef99 CVE-2021-46679,0,0,e71ccd076a6ae7e0f6f587f1d263b42972b07326261ba8f60376d56ebf30b94b,2024-11-21T06:34:35.073000 CVE-2021-46680,0,0,743c5ff723ecf0faa233ca15a34a6d03c1d1ce1540a27b119b5f12de1b94ccae,2024-11-21T06:34:35.200000 CVE-2021-46681,0,0,7d17d4f941995ec733f3b447e7865ce5f8feb0f0c38311126a31d57e8febe34b,2024-11-21T06:34:35.337000 -CVE-2021-46686,0,0,f815848c5845216b94100b436fa391dd31ce22b951af901af7e8e4deafd852c3,2025-02-18T00:15:20.757000 +CVE-2021-46686,0,1,d10cecbe1f02ae0c4bcbd2403634670ec255b33607e2cdbda047ba698ef19e23,2025-02-18T00:15:20.757000 CVE-2021-46687,0,0,ee16dc4b19486f597f459c21f48e3fa2e43e5d53ed3dbefa2391e5b8ee9a9f43,2024-11-21T06:34:35.470000 CVE-2021-46699,0,0,4a9b5e6bcc6fd69f85508f74afc6d71d96f5587d15db13582c904bb2016757d6,2024-11-21T06:34:35.600000 CVE-2021-46700,0,0,367bfb2f2e894c3a01abf1666b85c8afa9f70ff0229704db7f6d44e2cda699d5,2024-11-21T06:34:35.710000 @@ -189131,7 +189131,7 @@ CVE-2022-1359,0,0,1ede0bfa1b64a4cc752b49831f5b57f549a7d5ddf0329d8f638a67a388b0e5 CVE-2022-1360,0,0,a76792511de7b35ebb1c159e4ed1ac145e7c863dd161f2da3539dde890da958e,2024-11-21T06:40:34.273000 CVE-2022-1361,0,0,5b3fbebad0e53121dd315fc9d680ef1a984f833ca16e9482beccbee8f03ac8af,2024-11-21T06:40:34.417000 CVE-2022-1362,0,0,6241d6b9b37812aecfc97e64ff3d0ef2db6b580a7963710bffacbb377297f857,2024-11-21T06:40:34.550000 -CVE-2022-1364,0,0,776c52b08a52e3467991b9a8c75cb9430130e8c62abb4019bf96b0575ac7ad4e,2025-01-29T17:15:15.880000 +CVE-2022-1364,0,1,ea3008792c81a2bd9b38a3ac511ce6058f706ae2c9ec368c1e3e83cd7e30dade,2025-01-29T17:15:15.880000 CVE-2022-1365,0,0,278f0ef1937b76e7187ab9a0993e79d30994f15336bd4c4470633dc173c9f13d,2024-11-21T06:40:34.823000 CVE-2022-1366,0,0,e77083edf7df25b91622f78e90512f4f36d7a0b060fb99b06599ab507907a34a,2024-11-21T06:40:34.980000 CVE-2022-1367,0,0,3885f84534407d26751bc1e6b266ecb3eb94a00ce0b3b9213dbd85e74aca6069,2024-11-21T06:40:35.120000 @@ -192578,7 +192578,7 @@ CVE-2022-22943,0,0,9720f4269abe961adef4aa98404ffed2482d4cdd530e2104566ba6ae245a1 CVE-2022-22944,0,0,5833e6ee6316b9454f50e24368add9a1428bbeb07b1b5a1dd2947aa1a3e4a799,2024-11-21T06:47:39.323000 CVE-2022-22945,0,0,ca7c2709c7dc82fdf6f918d1d315a10509796f7edaed5819125df268f43154d1,2024-11-21T06:47:39.440000 CVE-2022-22946,0,0,cae41e2ddfdd8440cd1802af462967f5473871688f7968ba21776bbfdf2350a4,2024-11-21T06:47:39.557000 -CVE-2022-22947,0,0,15b18a6f6e115440deab2df125a09da4fad5e3837bd1a6d64b93ff76d3455095,2025-01-29T18:15:43.473000 +CVE-2022-22947,0,1,38bd5e8348b63d41c4084a180417ba129ffd15e64c70e0c9a16a33c93bb0f987,2025-01-29T18:15:43.473000 CVE-2022-22948,0,0,086ea4e5931e2341dc37db1cc6afe5828a9eb360d4524cb62c8de2adecf7c843,2025-02-10T19:01:58.950000 CVE-2022-2295,0,0,99fea1f748b9dbdc421ed9655a8c2fc1644ed95a35ee4d04823ab7a07e7ee864,2024-11-21T07:00:42.710000 CVE-2022-22950,0,0,88494e9ffc065d5fd395f35de4b43f8a972435dcc785c9f163a7e02c9d7da432,2024-11-21T06:47:40.157000 @@ -195329,7 +195329,7 @@ CVE-2022-2608,0,0,130ed17b41fb3edfce85a6906048847282725c1a1fd5132b13ed6bfa2531d1 CVE-2022-26080,0,0,774435a6ff00d3b839c9abcb9d4cd56ee8d68edba2ed5ea393a07b08f62639c6,2024-11-21T06:53:23.740000 CVE-2022-26081,0,0,1f58a15820f929b6c69663a78551b161b31f46347e4b32501536b18db1d468d5,2024-11-21T06:53:23.880000 CVE-2022-26082,0,0,aee53cfe434e507f59b594101aa5704748e2f6e43aa6b927165c3eeb1b1e6caf,2024-11-21T06:53:23.993000 -CVE-2022-26083,0,0,91237f4fe1b3373fe800df866b01cc52042b911e84d525eb85368b9aeb2391d6,2025-02-14T21:15:11.947000 +CVE-2022-26083,0,1,d498a963ab644b2cbd385c8d6e2eeb866176fccfc5c9cf6c5ee6b0d5bac96db1,2025-02-14T21:15:11.947000 CVE-2022-26085,0,0,48e561ce85d855f2536359faeac91894f88fc995988eaa1bb05b30cbd394ba0b,2024-11-21T06:53:24.117000 CVE-2022-26086,0,0,66554bd8d1164f28a882211935d26670b990bb6107d0b44697c99fa82ad08fa6,2025-02-05T21:15:14.867000 CVE-2022-26087,0,0,d75a3dc7bd47d8348c26964720447627e1816a071a363e36eafcdc2f0bd8447c,2023-11-07T03:44:55.520000 @@ -197127,7 +197127,7 @@ CVE-2022-28329,0,0,8dd67199cf8e5470e33e762e69db0b9f99b4c9e7154908e638a4dcc68ae6a CVE-2022-2833,0,0,193f5868872238baaa6701877eb950244915da7dfa825a317ed0b2e87d7e3949,2024-11-21T07:01:46.513000 CVE-2022-28330,0,0,720a221408c453658519e124c2081468d291cb226b3e5f4eb9303d03ddf0cf68,2024-11-21T06:57:10.600000 CVE-2022-28331,0,0,d0840e228f60d68274c3bb3d356bbd52f9a100d1e5dbaf3d4dff0134f5fa3eb3,2024-11-21T06:57:10.740000 -CVE-2022-28339,1,1,cf9ca92b986b897fcfc2c95014377d204c3d29b4c9dcbef4086f72c1826aab97,2025-02-22T21:15:34.723000 +CVE-2022-28339,0,0,cf9ca92b986b897fcfc2c95014377d204c3d29b4c9dcbef4086f72c1826aab97,2025-02-22T21:15:34.723000 CVE-2022-2834,0,0,3df7f8adaa0590ce6a82e2d20eab1cb943b1cf590c7ccf90c6a65bdadff741d7,2024-11-21T07:01:46.617000 CVE-2022-28345,0,0,9f6c32c8c04cb15129dacb710db572689285b6df84aeb36f708255746f133894,2024-11-21T06:57:10.860000 CVE-2022-28346,0,0,b18e778a422724f4e788d4c0dceda5a1a5c607916e6571a048ed72bec9c00529,2024-11-21T06:57:11.007000 @@ -197395,7 +197395,7 @@ CVE-2022-2869,0,0,a6c41e2e21e8e9f4dc93eb0145cd5fd437c35477a6c25e9b79b4ec21715ae9 CVE-2022-28690,0,0,4e56822b4ca0b82e0ba605af45b9bee55966330e5871f1dc9b7083b71a61e0d7,2024-11-21T06:57:45.003000 CVE-2022-28691,0,0,5fecf1d184d89d5d89941ca21dbbcb13c444ce70430f5b57dc45b8a08af6ce63,2024-11-21T06:57:45.113000 CVE-2022-28692,0,0,6b7be2c580035f44de53f8c8f3e3983a82724d005e1b013a223f9722315c614b,2024-11-21T06:57:45.243000 -CVE-2022-28693,0,0,2f21a4bd812534b33ba2511c0ebb9b3e03e5d42bd3ecec536cd5b29ad6ac4397,2025-02-14T21:15:13.263000 +CVE-2022-28693,0,1,8bcbd041a190e82d88571b850fc485b027ce446fbdf468e6c1252a3564722f15,2025-02-14T21:15:13.263000 CVE-2022-28695,0,0,7e170e9dd530b02555c1b6364c000bcade26f2336ea233ec44ef6fcf0450d766,2024-11-21T06:57:45.350000 CVE-2022-28696,0,0,3cd57b3a771a52acd3b70a7ccc0f9724268acddaa62a8188ff23b87efea36f4c,2024-11-21T06:57:45.463000 CVE-2022-28697,0,0,ff9d96548ba508768434f38490cfad7bbbd5a04514dc527cf0994605c1194e2e,2024-11-21T06:57:45.567000 @@ -199139,7 +199139,7 @@ CVE-2022-30746,0,0,c7e7a88b7eaeb284b9d95575c2b962f866dbb3935fb2bb0dfe8f8ebe4f5ec CVE-2022-30747,0,0,03dd23137a267ee330474b14833bc16c231f59e950725fa5de7196c64a53291f,2024-11-21T07:03:18.060000 CVE-2022-30748,0,0,89a3a2345f200905db84ec209c3362b205082d963beffaace9a42e5e913372b5,2024-11-21T07:03:18.177000 CVE-2022-30749,0,0,594470ce17cbfaf7e3d662f3ab944ab6113ec000c1a4dba09bb2d80cac3aad49,2024-11-21T07:03:18.290000 -CVE-2022-3075,0,0,73d9369c37ecd79d1643ac386e4a3712dfe112e505ecec6b25302950005f8034,2025-02-03T14:15:33.320000 +CVE-2022-3075,0,1,e83fd88f413bf6574f9cceb68493d8c6e6bf0a0165a9ca4b39c65ceb430db758,2025-02-03T14:15:33.320000 CVE-2022-30750,0,0,7727c4a050fab50e2cc3f857163cd21ef36a7edf7a466c191862ff0fddc4fc4e,2024-11-21T07:03:18.403000 CVE-2022-30751,0,0,d9514ed381aecdb3424b6ec22eb6886ea1e03fbf7af95b81f561d00486b4b5e2,2024-11-21T07:03:18.530000 CVE-2022-30752,0,0,3894c8352471b9e3ebe637c46e6b31bb88ee7fca58dcf7c9d863ec57831c9765,2024-11-21T07:03:18.653000 @@ -199933,7 +199933,7 @@ CVE-2022-31662,0,0,f86ded67d5fb85285923add63ec53ab64b03be91852462b026ea674c6933f CVE-2022-31663,0,0,dde7dc50134e43e50b492f34bbcd154bae1b21ff33563bcdd0e1aad2d5eeee75,2024-11-21T07:05:04.837000 CVE-2022-31664,0,0,ded36edb3bab61f5f784da1c42c7c3c50d20112aa94d0149593c54f33e1571bd,2024-11-21T07:05:04.980000 CVE-2022-31665,0,0,5fa82745929aa2ea0e26d3d569922c918c4463cb90e47ce123d5fd49bd5ae41e,2024-11-21T07:05:05.130000 -CVE-2022-31666,0,0,b309559eb7d9cb5f8a57efe9608138b0ea4d587f544040fd7c59702a2bfb9837,2024-11-15T13:58:08.913000 +CVE-2022-31666,0,1,a3e5bbf2921927693267d5c52ec78badf178f6ac7b0c896e9d7b7207ef418db8,2024-11-15T13:58:08.913000 CVE-2022-31667,0,0,2d9cf1b6a64702334f48edbd30e728f544dbd57e77d75817f2a3c30aaec63b35,2024-11-19T15:25:29.643000 CVE-2022-31668,0,0,4672335268c742200885ec6513e4bfd0b706da4d113675daaa4b0b91ed4121ee,2024-11-19T15:25:25.797000 CVE-2022-31669,0,0,9a2115f65038c781dad5a2297c6fa2f609eb37840d16f0a63144ddf558baaecb,2024-11-19T15:20:01.913000 @@ -204431,7 +204431,7 @@ CVE-2022-37208,0,0,470f87d97669205c33ca7f6e7eaca56b9a8c38b846dcdc90ba8f444db5876 CVE-2022-37209,0,0,52c0dfaa7577479980b8877dc73c55c94fb57cffd5a795ff3c15186218d8ed94,2024-11-21T07:14:37.280000 CVE-2022-3721,0,0,ef27daf131c0ce1769e63ded90ec4f920769462bca2531e2972075401bdeb9b0,2024-11-21T07:20:06.387000 CVE-2022-37223,0,0,b91a7fe9c2b1f93e287eecfe3543d434e1acc1810e511319e4dd1bb708da2112,2024-11-21T07:14:37.430000 -CVE-2022-3723,0,0,5fbdb58b18b555d7bb48ad381c0f33efa342886686cddd6af97c11b416a6535d,2025-02-03T14:15:33.637000 +CVE-2022-3723,0,1,e40d8d0fa4e3b6892286db31bd2f632fbbc604b9310ea4ec4f35d254726da3a7,2025-02-03T14:15:33.637000 CVE-2022-37232,0,0,a7a656594ca018b6eeef345b2ecbc3158e4652aa7e8399b8d814f51c0ce20659,2024-11-21T07:14:37.573000 CVE-2022-37234,0,0,17cc763dc797d3a6162da15d8850dc676e42b955a9a39ee17b2c06c5b16900b3,2024-11-21T07:14:37.727000 CVE-2022-37235,0,0,251cc36b350fd6109aad547b7e03748cea898716d1f278fb274f3199d170caf3,2024-11-21T07:14:37.883000 @@ -207453,7 +207453,7 @@ CVE-2022-41324,0,0,ed875843e60113cb17a1ce679f35ddda62b53568245a746ea86586c33e7f1 CVE-2022-41325,0,0,baa1678c3f007b2d7b88f8e64740ab3751b2557e9b7de1eff53b318bc65c5b4f,2024-11-21T07:23:03.263000 CVE-2022-41326,0,0,31338c9cf1331d33286951c001073bf9a48f88f16c308665ab9ca9fbe21b8e12,2024-11-21T07:23:03.433000 CVE-2022-41327,0,0,dcb7de65540a5f5035a41930d6615f75291414b7c854058707c94a45bef64fb5,2024-11-21T07:23:03.590000 -CVE-2022-41328,0,0,a68f94a942c5f6494d7404c02836686f434ef27ba4d63cb57b4b1a7c3955c2be,2024-11-21T07:23:03.750000 +CVE-2022-41328,0,1,709ab5f14828a2033981b3310c9ed6b05d261b34f810ba656b03d820c589eb8d,2024-11-21T07:23:03.750000 CVE-2022-41329,0,0,1b16c7187db0e7d1a72a4edf56e92688062cfaeada5519fbf5963836dfe109a5,2024-11-21T07:23:03.940000 CVE-2022-4133,0,0,d2373aa49e74a43718776f2d07903e30b107acccdd6edec5f57d5639161f7859,2023-11-07T03:57:01.190000 CVE-2022-41330,0,0,16e9744ca1f10cdf4787cc523180d95d39834745c4bd072d72c3a8e98c5b9b38,2024-11-21T07:23:04.087000 @@ -208430,7 +208430,7 @@ CVE-2022-42471,0,0,60b7bf96b09df6ccacb62bc950716a24d5cb080a7b88192876de85dbb17c8 CVE-2022-42472,0,0,1a66230bfbb99d12ba85a37920bd3d9a5216ee44c4f47d93a53d54df7183ba83,2024-11-21T07:25:02.230000 CVE-2022-42473,0,0,4f60c9b8f0167ee1c6e0e8a847bba60c0510adcc1d19b941727f2a1ea0118fe4,2024-11-21T07:25:02.403000 CVE-2022-42474,0,0,023494f1ce00b3ef8ebb55528df2db2632f35454d6178550c01d80daf9929a61,2024-11-21T07:25:02.533000 -CVE-2022-42475,0,0,92d403054ff5391ae35035a5391cfce2c756870a67bda204f70e20f50be4403f,2024-11-21T07:25:02.680000 +CVE-2022-42475,0,1,2042363de6b99aa603e76b9cea3523febad5a86cd87da9aaaddccd0fe593d057,2024-11-21T07:25:02.680000 CVE-2022-42476,0,0,bafb54a6bd4d07c50e7df8e218d79c354592894417b9699ca8ffc720773c9740,2024-11-21T07:25:02.870000 CVE-2022-42477,0,0,53a4256a4d9e314b3cbeeb05dbe1ca82f0ebe8308adba2723e8ca37d24131678,2024-11-21T07:25:03.030000 CVE-2022-42478,0,0,7276482d6f77e2becc2ce1523af6a1701731782f5b28d0fe1297c1e5a2ce8f71,2024-11-21T07:25:03.170000 @@ -226197,7 +226197,7 @@ CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6 CVE-2023-33518,0,0,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000 CVE-2023-3352,0,0,ca8ce10d91c2afb8d2b579cfae6df369db0748f6d1892a3e858fbf033cc8e8c8,2024-11-21T08:17:04.957000 CVE-2023-33524,0,0,00e39ca7564820f7b55be181ca61600cd202d85de1a33f9718e465ff48d596ca,2025-01-08T19:15:30.063000 -CVE-2023-33528,0,0,f9fa69afd45a1f617c3d1403ded5098c81af0e479a18344ed6622bd5b87b3971,2024-11-21T08:05:40.480000 +CVE-2023-33528,0,1,b49306a676e1db34200ab7a2c530fe92cb729eb1747c750462c6bd6a27c292e1,2024-11-21T08:05:40.480000 CVE-2023-3353,0,0,73f13e6c85e8b6a63fa0551d3ac8601dd5e6abaf30561f39657303dcaa775484,2024-06-20T14:15:10.650000 CVE-2023-33530,0,0,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af68d,2025-01-08T16:15:30.037000 CVE-2023-33532,0,0,109d64130a4769ac20cd8a57448213d04ce1cb12fc0189129cfa30fade0a6a41,2025-01-08T16:15:30.250000 @@ -226952,11 +226952,11 @@ CVE-2023-34398,0,0,34e3794baffbd143e99f7886e0a6a7587a2b1a10d06b10d405f14b0486e3f CVE-2023-34399,0,0,5bb4fa21fe1dfabbd46b052daf11a7780561a7e121380f1baa494272f98d714c,2025-02-18T18:15:14.933000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 CVE-2023-34400,0,0,6dda43fc54d4c044a74ef9a113750681ad42a24e16fdf370e87b37643ae87b42,2025-02-18T18:15:15.043000 -CVE-2023-34401,0,0,a56ec84af0fc63a7e1b026ee8045ffc0b54afd7dbac33da84057cec72673c587,2025-02-13T23:15:08.867000 +CVE-2023-34401,0,1,eacfcb5f132e76aa9f14bfbd13de4047d803d770b470956b2ca4c864334baadb,2025-02-13T23:15:08.867000 CVE-2023-34402,0,0,c78a2dbf7fa8393f8c25b5b8b21eaeb697d4d71524fdbb2a5c375603e6120769,2025-02-18T18:15:15.163000 -CVE-2023-34403,0,0,eb0dca1a5f6454558c31d75b6ed692ae490c22c970720bd85806096597d47c16,2025-02-13T23:15:09.440000 -CVE-2023-34404,0,0,335287281ac129a1025cb1021db0841bd6f7c8376ff5d231f9f4540744b0246e,2025-02-13T23:15:09.553000 -CVE-2023-34406,0,0,36bc16e478a055fb4fedf2e4d8547169137b2607058a49615980dca05a514b16,2025-02-13T23:15:09.633000 +CVE-2023-34403,0,1,63516f230c7d148e367a731cf5d896a22932237b6e793743b18e743da25771d3,2025-02-13T23:15:09.440000 +CVE-2023-34404,0,1,498528b7febe0bd334c6b8dea9fff524219b210133f12ed5bee0e6b42f9eb078,2025-02-13T23:15:09.553000 +CVE-2023-34406,0,1,44da4367214b0ef5b0d5735eda11bbe9ab65534e1a1ed3c8d4026d80223b1a91,2025-02-13T23:15:09.633000 CVE-2023-34407,0,0,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000 CVE-2023-34408,0,0,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000 CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000 @@ -228598,7 +228598,7 @@ CVE-2023-36840,0,0,76c76384ad90d19795c6cf45c9767a6a9180adcc6efd7cf55165f4bd79c45 CVE-2023-36841,0,0,a1fc0a0b13e0ee3d0d61001b90eb0427c7439bb806be4ff039b3472f43d4170e,2024-11-21T08:10:43.433000 CVE-2023-36842,0,0,88bf7bb1a6302a96544abfeea0f3510e84b6ac4a28e7e918042ef4d92b938df9,2024-11-21T08:10:43.597000 CVE-2023-36843,0,0,cbbdfea83c6a7fd5ed1cdf52988f66762e4a2b24f0260a680b1fa2a1f4950fa6,2024-11-21T08:10:43.800000 -CVE-2023-36844,0,0,897e235268f506c6418333664dd7b1ab207c81f1775ffaad6410e1acb268b7c1,2025-02-13T17:16:43.377000 +CVE-2023-36844,0,1,8a1b49361ef69d52224220c95cfee4da912e1d9bf89ff71585842df8016fcccd,2025-02-13T17:16:43.377000 CVE-2023-36845,0,0,4c9c0ba3f4e74883a1dcba2d5029a75aefe60811d3dbfebbbb7078d2457250fc,2025-02-13T17:16:43.583000 CVE-2023-36846,0,0,31e0f5cfc64218783c631dcb6ea01294e0b629b622e66caa6ecd46f40b776415,2025-01-27T21:39:36.497000 CVE-2023-36847,0,0,abf946e66b75d4fe6a8324763c422edcfca5bfa6d043c289b569ca20068fadc7,2025-01-27T21:40:15.840000 @@ -231194,7 +231194,7 @@ CVE-2023-40040,0,0,3f0f5b5a49b077592c19d66c28b8663ac6b131e5e630485bb5cc47d1f9472 CVE-2023-40041,0,0,0f11e9858a34d472a1c0a2761368dcab1b86c026e37567cc77e2eef57d8136b3,2024-11-21T08:18:34.917000 CVE-2023-40042,0,0,02cc6b6d7f0f8d99b35b97fc4aaa74da4d879c8ea2d2a813def81e280356d977,2024-11-21T08:18:35.063000 CVE-2023-40043,0,0,e6e3b1652d04e45dd01a00b692714fc2d7fc4320e17fc563f04510f03243ddd0,2024-11-21T08:18:35.230000 -CVE-2023-40044,0,0,365de1c9d8fb85d4818e9bb9d0fdb345e305a509b23998dfb95bd5a358bf1c95,2025-02-13T17:17:00.470000 +CVE-2023-40044,0,1,9d663ae3fd4d75c75bf60c6f336631e3906a4c3f7f632632135d8ec89f654915,2025-02-13T17:17:00.470000 CVE-2023-40045,0,0,43781d4d06011b7cb9a008f4a0a4b20ebfbf9da03c65a9c98cfad9979bfbd212,2024-11-21T08:18:35.550000 CVE-2023-40046,0,0,9dca0c7c22c2cba01540a6032b47009c83c32bed6d9548f249a8c2fb7b691bbb,2024-11-21T08:18:35.697000 CVE-2023-40047,0,0,163df9c00ca68663e2cc908fd250aa16e79170a6ad54237c242891bee26589e1,2024-11-21T08:18:35.837000 @@ -232916,7 +232916,7 @@ CVE-2023-42106,0,0,447b9ae9affd3d0c9de283ba5b34b328b5720b3ab58d3f53e9737107e014d CVE-2023-42107,0,0,4c6b9e07bb342649063cc5347eca19bb657c8c9fd1d77cb5e4432722215e6dd7,2024-11-21T08:22:17.340000 CVE-2023-42108,0,0,27fddc624a1c5c9018d3d720e5576e631e6a6a8278b5615ec396b1c70bc9e8b9,2024-11-21T08:22:17.460000 CVE-2023-42109,0,0,0ca557e538c7c48ab18ac8bf8c46c110b9da67b5fbbbb7b22c216feaa0e6ddab,2024-11-21T08:22:17.597000 -CVE-2023-4211,0,0,a669ae8cecfbcde690be841abd2ce4f7815bcbef6d8a97c6f615c5032b9ada81,2025-02-04T15:15:17.480000 +CVE-2023-4211,0,1,b57baa61295b60c90672581b281f09215d0f0771570e0c01435e49359758b1bb,2025-02-04T15:15:17.480000 CVE-2023-42110,0,0,28576136c00cb00997c7a4562e8bc812f565322c6205ab39454fc89564f27098,2024-11-21T08:22:17.723000 CVE-2023-42111,0,0,411e4403445247c72b5192b2c32e45d4c38257ebe22f73e5a39910fa8feadc3d,2024-11-21T08:22:17.847000 CVE-2023-42112,0,0,4c5f6ea3f5a116489efba7e1d9025c3ea82db9123ac6e4046e9eeb7dd1a74684,2024-11-21T08:22:17.967000 @@ -236423,7 +236423,7 @@ CVE-2023-47152,0,0,bcba57c6075b792d7c6cdc81b94418e9d986179abba79b9d2e8692a11a4bb CVE-2023-47158,0,0,15f414bea2d2a1a9e4cade4c1576622ce6f6cb87ae101e48296a2d9c0094ad10,2024-11-21T08:29:52.553000 CVE-2023-47159,0,0,1974aef045b7c69999a2b610de9b1637e7e2217cca2c13b57a37d4f3a5f30f46,2025-01-27T16:15:29.593000 CVE-2023-4716,0,0,181493a0bc47d8b6179e4d7c992bfdb6e0ed0566be00ad76cc7e801ee98290ea,2024-11-21T08:35:49.137000 -CVE-2023-47160,0,0,4c07ec094f3282f48c91f5206bf2fbe38e351976fa46d36b17b0fe94787ccab8,2025-02-19T17:15:13.983000 +CVE-2023-47160,0,1,3df6393a85849ecdde16f90171c1751ba0d211ec015a3ca76ed30e3a9d2d25cb,2025-02-19T17:15:13.983000 CVE-2023-47161,0,0,daeccb22b0ce16ed468a02cafa5602752c58c890bfe9c6e91d73aa4a0cf9b4c8,2024-11-21T08:29:52.717000 CVE-2023-47162,0,0,9399a8bd268b1083de4daf0bf90d8f0edb5f56b653ea68cb53c8ecf2c4beeb7e,2024-11-21T08:29:52.850000 CVE-2023-47163,0,0,f5adca02eaea8bc24cd08d7d4c73225678acd5cba7f9025b5e237a60252e4f89,2024-11-21T08:29:52.983000 @@ -239305,44 +239305,44 @@ CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 CVE-2023-51293,0,0,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000 CVE-2023-51296,0,0,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000 -CVE-2023-51297,0,0,82a03c125c89e9c5feb7167bc5c79f32a86cc86d30fa01646e6efbdc926b03eb,2025-02-19T20:15:34.770000 -CVE-2023-51298,0,0,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000 +CVE-2023-51297,0,1,acff897e577b2d03a65c1912648b7decba3796964f053530cda566abb953e3a9,2025-02-19T20:15:34.770000 +CVE-2023-51298,0,1,9df17803d22911c4b2cfba32412f0f1ee1a3188083a0471b763bd3f6b763bcc2,2025-02-20T15:15:10.473000 CVE-2023-51299,0,0,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000 CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000 CVE-2023-51300,0,0,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000 CVE-2023-51301,0,0,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000 -CVE-2023-51302,0,0,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000 +CVE-2023-51302,0,1,a37adf1e25168610cc3c4435fc168165b59aed5ed760099a11bb110db8bf9a44,2025-02-20T15:15:11.173000 CVE-2023-51303,0,0,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000 CVE-2023-51305,0,0,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000 -CVE-2023-51306,0,0,4ee512037b5a17f44d41cb85824b3aa21cbf2013fd9687b1c54a56b2512be0e8,2025-02-20T18:15:21.527000 +CVE-2023-51306,0,1,bf56d72b2968d07337a717b87e0e9bb6ea11e4161b23dc8b162e7528fcce761b,2025-02-20T18:15:21.527000 CVE-2023-51308,0,0,4bcbdb7b793145ac3b10d8145b7d5335bf14b807b86268829f166f3300b36c04,2025-02-21T16:15:31.997000 -CVE-2023-51309,0,0,e8a267fb846fdf7ab7dcb6178679f00727db2db3808c8e0a0d4d14c04ce996de,2025-02-20T18:15:22.890000 +CVE-2023-51309,0,1,eba924e04dc2770a8dd8e0f8bbcd99c1bf251381ab5a93a32f4f375a20690884,2025-02-20T18:15:22.890000 CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000 -CVE-2023-51310,0,0,f4d071c477d5fdc5cab7b5b3fa4720e6ca8a83f4159e2d11461587a7973502bb,2025-02-20T18:15:23.090000 -CVE-2023-51311,0,0,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000 -CVE-2023-51312,0,0,af0e37187ed278587c858c2f07fd240cea5d64346e1f10c5fb7311e4a0e68208,2025-02-20T18:15:23.293000 +CVE-2023-51310,0,1,5ff44a8e60152b5a8222d23ace8728692bc50a1391618a6bf228fd8cf2f1cfa9,2025-02-20T18:15:23.090000 +CVE-2023-51311,0,1,070fe6853ff1174096aa667cba2c6c2f861d527169573001b9ee65734daa63e8,2025-02-20T15:15:12.170000 +CVE-2023-51312,0,1,c5f1cf5674b7e294a5b5a557c49039d98e1261a1424602ca885450a6ed4c5035,2025-02-20T18:15:23.293000 CVE-2023-51313,0,0,6a2045e17d1649f3a297166f69c1bb87652b9a1ee94412aac61dddb35d0383d3,2025-02-21T18:15:15.350000 CVE-2023-51314,0,0,ed0c0946f48ea9e4165925b66798a07395b88ccd084d7b53e90b457b808050fa,2025-02-21T18:15:15.567000 -CVE-2023-51315,0,0,93388a032dcef67ad051bc5698be424af785a597baf012fcfffa6e19240ae44a,2025-02-20T18:15:23.490000 +CVE-2023-51315,0,1,10208c7771aec3e3590460ca7b41c13a7c95e913c3040040c2fe8b9d903a605d,2025-02-20T18:15:23.490000 CVE-2023-51316,0,0,3e42aca365f3744587d02d82a83a1d315ee807d1f89c97fb204c4d1d04bc3c59,2025-02-21T18:15:15.783000 CVE-2023-51317,0,0,1831b43cac7b27a62ca3b9ed2620a623b890f06db7187a182094c2094bc4ea34,2025-02-21T20:15:33.510000 -CVE-2023-51318,0,0,e156ff65231831e807af792d62b39f920a1b080c98fa76e62945fdf2d761f0ab,2025-02-20T18:15:23.683000 -CVE-2023-51319,0,0,e0b9a5510eaef731e2564d7aeac202daae6076fe5bd9b7dfe04466db07bd2e3a,2025-02-20T20:15:45.180000 +CVE-2023-51318,0,1,2196273d34e90afca8a7f2a915952c9c46318bf27e7e0535c055dc8a3da4f3f8,2025-02-20T18:15:23.683000 +CVE-2023-51319,0,1,7421ad1964881d50a5d542da55a962686154eb681a8661de61f9fbe2bd9e531c,2025-02-20T20:15:45.180000 CVE-2023-5132,0,0,3a50c79f3182856bf1a8f272b84346a7ecfc5aa8bca0e713ce49774805195cc4,2024-11-21T08:41:07.540000 CVE-2023-51320,0,0,ce44210e40b6ee7e2808bc3db692d2da0ba4d787a7280385cb9f07e9999a74dc,2025-02-21T20:15:33.667000 CVE-2023-51321,0,0,ee0e6428baf3a3fa2fd7de9ce4edf13fa08fb0e14daf3fcc8ed05cef6da34eb7,2025-02-21T21:15:12.717000 CVE-2023-51323,0,0,27c1e252e926e4e7139dcbde47de4dc6887d538bcebbb3003be9f799abe3b8aa,2025-02-21T21:15:12.863000 CVE-2023-51324,0,0,91a97dd81486190b20fdd06c31aa4751ed03e1555c2300a8e3a786eb7a0d9a80,2025-02-21T21:15:12.993000 -CVE-2023-51325,0,0,667a2d572d3e56010ed0cee43300ab295ca00f6d7d9ec057ce9b3e1df3c304f6,2025-02-20T18:15:23.877000 +CVE-2023-51325,0,1,21b753f662e367d2f3820dda91f5b5d69157d1329b1e7e7df69bdf569a6ebbda,2025-02-20T18:15:23.877000 CVE-2023-51326,0,0,a08f8efd799d68be7834b11b0be8330c9509c5f1b1f9c6f14663eb193d099573,2025-02-21T21:15:13.133000 CVE-2023-51327,0,0,6e209b120832fe4409b17c2ff4fc6cda5660cc7257dd8b790345f7de2be13832,2025-02-21T21:15:13.280000 CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d09f,2024-11-21T08:41:07.690000 -CVE-2023-51330,0,0,e664e43a7af31a50c03fc87cdd3e67b4189e6bd4271a563ec9e5266a551a0790,2025-02-20T17:15:11.087000 +CVE-2023-51330,0,1,cc881f2549c77a75e89674d7a70029983ff142f1e29963497c532f72baa3fb08,2025-02-20T17:15:11.087000 CVE-2023-51331,0,0,b09e7644ce57e9ee5e9fd07aaf585995f44c55588adfdfed5d264899cbe3593e,2025-02-21T21:15:13.443000 -CVE-2023-51332,0,0,c151beca79a66bf098a3a0f0f346ef429ee573baee252e050cd52d6e34e7708e,2025-02-20T17:15:11.253000 +CVE-2023-51332,0,1,fb80ade1b2d09f89ce9f706d1c5452790fc222c22ebd9e165ab9dd583957808c,2025-02-20T17:15:11.253000 CVE-2023-51333,0,0,a09c6ab2d788c3bf55389b6afd72f449e60fc62e8a4f78285a131dcecca4a800,2025-02-21T22:15:11.257000 -CVE-2023-51334,0,0,390f11f4962ffcca5416cf65b9ab65489ef3aa2b4772d804556ef405de053b4a,2025-02-20T20:15:45.337000 -CVE-2023-51335,0,0,dd33a6344436fa665172187aac9f004f93282c327a2db992d84e7a2bdf0ebd2f,2025-02-20T20:15:45.490000 +CVE-2023-51334,0,1,13cd3809664ab83bdcd92a2c87f37d80c6caa56a1d78a87c690c65ba6c561595,2025-02-20T20:15:45.337000 +CVE-2023-51335,0,1,d7979861358cf269f2d5f747b0e4d0197aa644748201a5937027dec0bbba2ae5,2025-02-20T20:15:45.490000 CVE-2023-51336,0,0,031a00ef13db42dadcd4ff23795a6e8c3e20d7585e57e50be24c7374d2b4ea44,2025-02-21T22:15:11.413000 CVE-2023-51337,0,0,17b45538ace815357e12f10acd4215428490feea57605f42d1d80f38f3e2187a,2025-02-21T22:15:11.570000 CVE-2023-51338,0,0,33e521f6192027ff3d5d9f59cefcc4dff91cbfff8a7bc13c87aab7339400989d,2025-02-21T22:15:11.730000 @@ -240977,7 +240977,7 @@ CVE-2023-5498,0,0,c78b341c7aa8bd4a1277de8a6275c637b1c9dc55a6d7a34a50e4f3674c92e7 CVE-2023-5499,0,0,1a05c6568dc551af6b98e86eee508daf00e71656ee26caecd88263126e4699b2,2024-11-21T08:41:54.103000 CVE-2023-5500,0,0,ef2480bd923220576452443e1bf33ee7f65d0d1bf1491e0a8209431234c3f941,2024-11-21T08:41:54.223000 CVE-2023-5504,0,0,4a57113d7f9f98b585391c92ddd23f98b4594b033cfffed355c9c8b207500b83,2024-11-21T08:41:54.337000 -CVE-2023-5505,0,0,a026996a5c1b8d0edad72c5597013efca3d8949a5ad6a4cc4621cf02cb3dc466,2024-08-19T13:00:23.117000 +CVE-2023-5505,0,1,a6af57b9fc0bd8f28d658fcfbf8bf7dd60c7202966fc3b02d2cae1b89067ece0,2024-08-19T13:00:23.117000 CVE-2023-5506,0,0,f4c5af1e333e37ef91891b27e1fe18eaa0cf5284bbd902d8441bd2e8dfab93a2,2024-11-21T08:41:54.530000 CVE-2023-5507,0,0,3c3567b71813c06db4c05d616494b710142826bbe54deed63de68a9b1fe1d200,2024-11-21T08:41:54.647000 CVE-2023-5508,0,0,30a1560ea220b470f4aaa2f22ac3c9eed2374563ee4e0c05e5aae5d10bfbeeda,2025-02-11T02:15:32.520000 @@ -242151,7 +242151,7 @@ CVE-2023-6802,0,0,1e083e4d68e0d5513b9bcf183daaffbab598751084b9dfff4f44ba7ddefdc9 CVE-2023-6803,0,0,d37de4fa1c5545a37ea3d5834e27de02338beffad2ed81bf500377d71d1519fe,2024-11-21T08:44:35.360000 CVE-2023-6804,0,0,9ce225d0c63b043c309e0a070a1427eb1c1b97c0925a7d3b5346b218f6862911,2024-11-21T08:44:35.493000 CVE-2023-6805,0,0,ede513e00345a37b41274986529c6b10da05c4a5b83273c58c20fbb50b602e31,2025-01-14T20:36:23.243000 -CVE-2023-6806,0,0,9a26d403f4d4383cbf97488770c0c67e75a4a61d219eb68d8d0d878f9baa70b4,2024-11-21T08:44:35.743000 +CVE-2023-6806,0,1,9481a83fc88f99d5c56bd5e5e506b89b5f375d48a6ed5a81cb9573a79ba436a3,2024-11-21T08:44:35.743000 CVE-2023-6807,0,0,28876ef72ac1582ed427fbae4269621b87b9e8bc060057ead9a9d96f323e1a83,2024-11-21T08:44:35.860000 CVE-2023-6808,0,0,5134cef93a37c51417a7640f91d5ffede6af946721e7812e11e5b70f8dc18397,2024-11-21T08:44:35.993000 CVE-2023-6809,0,0,c25c5beb13b443275b0ea6f1fe14b318bd73ee842ddc07ae129b77e14b4fe2f5,2025-01-21T18:58:53.437000 @@ -242357,7 +242357,7 @@ CVE-2023-7020,0,0,197fd2fa8d1d4a18a6a4294ec49a94d748ef7ab3b8641e1f8788b50c52350f CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000 CVE-2023-7022,0,0,856fd34983e00eb10af7bbfa2b247782306c3cd9e203e98bbb5f4bce3117af9c,2024-11-21T08:45:03.637000 CVE-2023-7023,0,0,4e802c403a190e5bf3fbdeb4ce4568b9f0ede0742b2ccbd390feda6a6eb357cf,2024-11-21T08:45:03.803000 -CVE-2023-7024,0,0,79a30afe3007ff3b2540b6e89d5923ecfad9ffdd4fca27a2f59c45d361c6405e,2025-02-03T14:15:37.920000 +CVE-2023-7024,0,1,efcf5c42823cc7fa3a82e0c71c9d5f8cea75ae94169a093f7a8797406932fa24,2025-02-03T14:15:37.920000 CVE-2023-7025,0,0,145c0a7dc7eb75d64af8eb05c1d2d3dac33609c0032da4138aea95c3c490716a,2024-11-21T08:45:04.097000 CVE-2023-7026,0,0,98716ce8e87964958034bedfc875bd5c13b34d49f4803350e191e9f77d9640fe,2024-11-21T08:45:04.243000 CVE-2023-7027,0,0,1831de41a592a60eace373737109c08997b01ea4f32d34c6623fc7de027bd240,2024-11-21T08:45:04.383000 @@ -243870,8 +243870,8 @@ CVE-2024-10400,0,0,3149449a1f655d421717c12bd7c1ce4f050cb418efa23b02eb5dc871bacff CVE-2024-10401,0,0,98699d6fa898cdfb3f15470619245cee1d067345348d71b83edf212f320fd87d,2025-01-16T02:15:26.770000 CVE-2024-10402,0,0,707aa51bfb00542fa09e86114646bc6794da9070602c556284ae04ba6ce3467b,2025-02-05T15:02:16.723000 CVE-2024-10403,0,0,a7572191e8102ed6d59e64918362af5517a9fa6fa7640d8839b0f51d80dd26d0,2025-02-04T15:28:04.053000 -CVE-2024-10404,0,0,08f35896a4e26a8e268d7ac34a9afd8dd97e47266f80e6d06d99a2e226505a70,2025-02-14T04:15:07.857000 -CVE-2024-10405,0,0,1dbfa32d1f1f08a667921aea7a5691ba8030c6758a2e6baaa6c84a57998919b5,2025-02-15T00:15:13.023000 +CVE-2024-10404,0,1,3486af9c78c5a6a14ed1b9e23747d2d312f7e422f86485c507fb7421ad667a7b,2025-02-14T04:15:07.857000 +CVE-2024-10405,0,1,908ea09c0cec5fd258860a3b77c460499d4de8ec5785b8b50cda8ee7ed5877dd,2025-02-15T00:15:13.023000 CVE-2024-10406,0,0,3ea80fa9309bbe01bfc18fc28a58ebc2cd4384a2976470d5a0c7d74740e10fea,2024-10-29T20:48:36.967000 CVE-2024-10407,0,0,c0767597cc1c9f2445774d0945d82cd1deb05bfba27e932afc95a08efb60df7c,2024-10-29T20:47:53.667000 CVE-2024-10408,0,0,bdf278858219e19c5b454fd4cbba3d2031672da6a8bc18e5cf1bab48edd4d3ed,2024-10-29T20:44:07.630000 @@ -244036,7 +244036,7 @@ CVE-2024-10578,0,0,66b31bc67aa640c7022b6e2ee0c03a146109396c96bb5c10ab825d27d5228 CVE-2024-10579,0,0,0ae238994e7d51b528cae9d23ed2fa2f0db4469de9914be8d05ed1f76a7dac58,2024-11-26T11:21:58.330000 CVE-2024-1058,0,0,a4bfa26fce255a08c4a0bcd9ca820b184d439ad79e86816be9e12748d1d66b41,2025-01-19T02:44:46.970000 CVE-2024-10580,0,0,7cbec3926b1e0a5918766b8a0adb238fb5e9aded2f47a47f3fe18631e2f40ea4,2024-11-27T07:15:07.920000 -CVE-2024-10581,0,0,6b8ded2f1039861738643b6432a9c6272cb84b4b27b58e7985bc8b41a469309e,2025-02-15T12:15:28.900000 +CVE-2024-10581,0,1,de643d82859e1f7c1827a971f6b72a70b9d3b5fa18cbe80f53deb21fcb0b56e7,2025-02-15T12:15:28.900000 CVE-2024-10582,0,0,081ced1e3bee3a0a102c94bdff81bc48301372e830a54bd85e35429dcce93b3b,2024-11-19T21:17:53.003000 CVE-2024-10583,0,0,2dd8fa86d783214098b78ecf15207bb297f91c4a4766bbf054ba7ce346e63980,2024-12-12T07:15:05.570000 CVE-2024-10584,0,0,884bde099e6baaab8d72bf2690b23c625dcbcb424035217f134401aa3c174ba2,2024-12-24T11:15:05.670000 @@ -244705,7 +244705,7 @@ CVE-2024-11331,0,0,687d03f55922d90d247fc3f94ca3f96e9c39bed85fd707b3c5cab0e8ddca9 CVE-2024-11332,0,0,36669df4e93715465b64ec1799e55f470058053e193a811269619d8d50b4e0c9,2024-11-23T05:15:06.520000 CVE-2024-11333,0,0,00c71a7929b275d875b9539b6f0a2f4cc66b516eced93f3c2cfad9bb181a4a5b,2024-11-28T09:15:04.170000 CVE-2024-11334,0,0,f7fc893b8a37cca506fd20fe68edd8509ed855f99666ff9db346702f3632cf66,2024-11-26T17:33:49.477000 -CVE-2024-11335,0,0,c9a537eb5a65cbbf5d82aa6246b658830e47a60579bc2ab61bbd4bb743696d93,2025-02-19T08:15:10.870000 +CVE-2024-11335,0,1,1e90a5378a3667a41b5c289be8c43c1ac40392f0a7424331e231dd119d291d16,2025-02-19T08:15:10.870000 CVE-2024-11336,0,0,f6d676d5a427fada73f852223dfd1f8d78278266b2c8c37478ab18b05a16f6ad,2024-12-06T09:15:06.323000 CVE-2024-11337,0,0,b01b2d91cb611a25f6f6c6a23755d6fd83423220b4845fa1731e3136f57cb3af,2025-01-07T05:15:11.320000 CVE-2024-11338,0,0,16b8e4df470f18ecee94a466e04ad75959cffb7412dbd289584a85008e652ba5,2025-01-07T05:15:11.520000 @@ -244948,7 +244948,7 @@ CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c205558 CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000 -CVE-2024-11582,0,0,f9ff8eb2d12ec0bbd7818a1709287484b4780b4422c883d3ad5ed537bbf3d553,2025-02-19T04:15:10.200000 +CVE-2024-11582,0,1,0898213c03765f0fc27e0f9faba2da16261a2881bbff78942466c593029e875a,2025-02-19T04:15:10.200000 CVE-2024-11583,0,0,0b07441a5ea7c52db00cfe826d700b0c0eb6984d5bc925e0a246fd9c511bc36e,2025-01-31T20:03:24.500000 CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000 CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000 @@ -245120,7 +245120,7 @@ CVE-2024-1175,0,0,f997875411f4ee3836569f05e6ded063f5984d7986ed98f909a5423e1a302c CVE-2024-11750,0,0,7ad8eba5e612b45089b0006a10c8f5004dc37025f0797564ad303213ba0cd10f,2024-12-12T05:15:09.577000 CVE-2024-11751,0,0,cbc44290cddf15ae35c92a8e4b75351046563158eb1fedf91f48e5c8b200a32b,2024-12-14T05:15:06.923000 CVE-2024-11752,0,0,c48a168f2b3a172a5086d93afa4f6d610d49141a00f07210bee49dcaa523a5b5,2024-12-14T06:15:19.210000 -CVE-2024-11753,0,0,56d8aa7869baf0adff365edb20566cdfdd96fa8e09d061e53bdef58fa211c9c4,2025-02-19T08:15:12.593000 +CVE-2024-11753,0,1,05f3bdf8a3cbaa08594a0c418fb7a0493a467e81dfc6f65a10b416116adf744c,2025-02-19T08:15:12.593000 CVE-2024-11754,0,0,115157a8a0f024c3ba84de7edd359cbde1e25041eace45096f12b0e339d7e447,2024-12-13T09:15:05.630000 CVE-2024-11755,0,0,c883abaefa6170cee64d3b62a0d846726e75234488258495594582792094520e,2024-12-14T05:15:07.100000 CVE-2024-11756,0,0,1b15032d5138c63a9bc74c14a17064d85dfaaa7feb6ae78db162c60925186a36,2025-01-07T06:15:14.943000 @@ -245146,7 +245146,7 @@ CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9dd8,2024-12-20T07:15:10.597000 CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000 CVE-2024-11777,0,0,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2023,2025-01-07T04:15:07.200000 -CVE-2024-11778,0,0,8e00158d62d41b7afea6cce05c05c100d3a15f9d8feede829c202a96b984c9f0,2025-02-19T08:15:13.027000 +CVE-2024-11778,0,1,ed546f5ae360e455508e4e386fdc82d78b9472397f9ba2e46d09300dfc1f6bfe,2025-02-19T08:15:13.027000 CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000 CVE-2024-1178,0,0,8ab0a2a01e80408842a29a813ae0f71a9342bc7b3eeef6127c8bbe6845a6d705,2025-01-08T17:16:27.800000 CVE-2024-11780,0,0,c6444630583b2209a32c825c71dee702f00b48010f91cb4fad7b61435fdcfa0e,2025-02-01T04:15:29.523000 @@ -245403,7 +245403,7 @@ CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4 CVE-2024-12049,0,0,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000 CVE-2024-1205,0,0,7a555763b4ee56426377ab020ddc9dc79c7bd15b9be6f5edc39ecd5779b4ad33,2024-11-21T08:50:02.210000 CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000 -CVE-2024-12054,0,0,4ba12ec29f03e1b31732298e7df713c42f5671645c234efaa4d4cee36bba5e97,2025-02-13T23:15:09.823000 +CVE-2024-12054,0,1,a15646b75c341fa501ca79522e217ea8f801482634dc66482e638a1ffa553294,2025-02-13T23:15:09.823000 CVE-2024-12056,0,0,d7fbaa89c201679c30b80d6484a6860abf01d1ecc41424a8e0b08b504062cb8c,2024-12-04T15:15:09.700000 CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043848,2024-12-09T19:15:12.750000 CVE-2024-12058,0,0,30c22f7be7c3f1b207f93ab8480a170bfa1d3a5ae9ab44b79f749c82b604db70,2025-02-11T16:15:38.663000 @@ -245415,7 +245415,7 @@ CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611 CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000 CVE-2024-12066,0,0,b8b74ff74daf8006195a72a7866cbbcaf66d537ba02c482e9dfaf1c6e82963a9,2024-12-21T07:15:08.907000 CVE-2024-12067,0,0,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61bb9,2025-01-09T11:15:11.647000 -CVE-2024-12069,0,0,f7d8e988d9bd3f09c5fc11f1ebad6e028a23de2908e1ac7dd9b4c68efe76b728,2025-02-19T08:15:13.470000 +CVE-2024-12069,0,1,2738a007f16514b5981f5eebe6af643e972661f34796d764447def8483e599a1,2025-02-19T08:15:13.470000 CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000 CVE-2024-12071,0,0,7773df08bf117af1ddaaee700084b2910f6a68d7f25642ff336de1e992525428,2025-01-18T04:15:06.690000 CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000 @@ -245561,8 +245561,8 @@ CVE-2024-12228,0,0,cba3b66c66f8b74b7da0219a0273d1dd0c005a65d0aca4a38c9a6589b5498 CVE-2024-12229,0,0,aa44844c8d830c107b3760370b58cb504158d7d7c510be09891b02a376b9c9ac,2024-12-10T23:19:31.487000 CVE-2024-1223,0,0,739205ffbc770776429ffa885febd5c53b056ba03ea4ca85b5e537144b0cfba0,2025-01-23T20:29:14.543000 CVE-2024-12230,0,0,973683b5e69b27d9daf3cfc7eb4a458b4dc39d62d7edd5222b7b5e4c000bda78,2024-12-10T23:19:46.887000 -CVE-2024-12231,0,0,1c5d27df052a63c9cd31754cc41d55c94a4eb228ca97ed9955b883d74a1777c1,2024-12-05T16:15:24.933000 -CVE-2024-12232,0,0,77e6bcdf869c1b2c2ff00e17ec72efc5854b4ce8067c2c9fccf0d3cc1c2d372e,2024-12-05T16:15:25.090000 +CVE-2024-12231,0,1,b98e5017536de072354aa1191f3b1fbac01be0a38cf9473a7728baf12852086e,2024-12-05T16:15:24.933000 +CVE-2024-12232,0,1,794a6a90852ca0b5588ddb258177ae568361c02f722d328355c112cd0bc23c6f,2024-12-05T16:15:25.090000 CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a558942d,2024-12-10T23:24:57.237000 CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000 CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000 @@ -245611,7 +245611,7 @@ CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 -CVE-2024-12284,0,0,8105e847f30e5e18a5e2ac3f0f30ef3b972e330c07192b2b479ebcaea47b8c74,2025-02-20T00:15:19.360000 +CVE-2024-12284,0,1,1ff12d55ee7db1b29236b8e819d5562b98f26e192b2b2a729e8bcba7149fb685,2025-02-20T00:15:19.360000 CVE-2024-12285,0,0,a4a2b41992c880fc476ecd11de1a7b15521385b3ddf2ced01c35545193640e43,2025-01-09T11:15:12.883000 CVE-2024-12286,0,0,a2cf97a2f897256d80732f72cb83c0245f2eb4e867cc795bfeda6550048be20a,2024-12-10T18:15:27.150000 CVE-2024-12287,0,0,3bd2321de0e3063fd87782574573766f363076382fc77605ade9039fc3997618,2024-12-18T07:15:07.040000 @@ -245662,7 +245662,7 @@ CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9 CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000 CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000 CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000 -CVE-2024-12339,0,0,be52c2d0084e1b737e32b52a9a6a5d871bb4fa98b0d35a295c3be3dad2db1689,2025-02-19T08:15:13.907000 +CVE-2024-12339,0,1,246930154e1a70e28d2b292bf044f48d2228ae036b03860d9fb97cdd194f43c8,2025-02-19T08:15:13.907000 CVE-2024-1234,0,0,1d2032d774427adab4981e078c05751946e3432eadc2f7e196ff1cacacccf797,2025-01-23T19:50:50.457000 CVE-2024-12340,0,0,e64d9154ce721e0cef963ec962023bf662e8b1885905905ffc386c61964f035d,2024-12-18T10:15:07.827000 CVE-2024-12341,0,0,73d0614d7c98b23e49242f0be40422e4e73b095a6a96061a926bb2fee6b56681,2024-12-12T04:15:07.660000 @@ -245681,7 +245681,7 @@ CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000 CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000 CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000 -CVE-2024-12356,0,0,47f76c9ed5ff94ac227aa2822ba21f3a55581c6b79b266287bc2053f23d3f41a,2025-02-17T21:15:10.327000 +CVE-2024-12356,0,1,c1d5f9ca3b1db608934567f6ec2906e3a5ff623eb5cc1845b11e1acaaac787fa,2025-02-17T21:15:10.327000 CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000 CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000 CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000 @@ -245833,10 +245833,10 @@ CVE-2024-12519,0,0,8512ecfe11d3f5f606f5fdf06fefea6ed5c0603f03aafcb3163b8596fbd0b CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000 CVE-2024-12520,0,0,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04bac,2025-01-11T08:15:25.720000 CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000 -CVE-2024-12522,0,0,ed1fb5baf064c0028580073ee6b976f9886f98b4d500acd8b695b42a96f92e6f,2025-02-19T08:15:14.323000 +CVE-2024-12522,0,1,9a29eaa26b8e72f060e0541b1bd56e919175e1dea7b36022bab30609cf3ac5c0,2025-02-19T08:15:14.323000 CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000 CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000 -CVE-2024-12525,0,0,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000 +CVE-2024-12525,0,1,8d7aff7af394ec329581a71a35e06822842b22e6255f422628782ef9b20d38c1,2025-02-18T05:15:10.813000 CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000 CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000 CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000 @@ -245867,7 +245867,7 @@ CVE-2024-12558,0,0,ff1dd3178bf5e061322cf2e1a359f721c0d270a183cd44116b64f362a8103 CVE-2024-12559,0,0,57ab0e0bbf049179f4bb043a31125569183e3823c6e0814b5b25df137c49ef14,2025-01-07T04:15:09.433000 CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000 CVE-2024-12560,0,0,d33290fc3e54f51dd78cb0afaf9a18e8538f72db9dd0f598ab5a68b55bfe89a1,2024-12-19T07:15:13.507000 -CVE-2024-12562,0,0,300b410d9ed70f892ed85ef1723a3639dcde17b9d28bc00c11d64fc41f79a315,2025-02-15T10:15:08.197000 +CVE-2024-12562,0,1,0f26ba825be8b3a94947e4f5ef1a19b90dcd7b44f86c05e2e077f5382e3ba61a,2025-02-15T10:15:08.197000 CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772172,2024-12-12T15:15:12.097000 CVE-2024-12566,0,0,cae64572fc707f14425318c88ef9c52b03f915c4164041e3b4f1038d90684dc9,2025-01-13T15:15:07.893000 CVE-2024-12567,0,0,13ab14fb9171447e65350d2236b20d0e0c9f3e46107536c165b19bd4c13ce858,2025-01-13T15:15:08.060000 @@ -245942,7 +245942,7 @@ CVE-2024-12647,0,0,097229fbc22a476768b6d005bd091a1df5d7c888609e99d7b0178db2af7e0 CVE-2024-12648,0,0,f7105fbfd47374a1794df860725a9911e48791c9ed50a1aba7744dbecb1d01d1,2025-01-28T01:15:08.700000 CVE-2024-12649,0,0,e7a3943e3bdcf0ae90e97fc59e152e3a3496d0b67d2aae6d30f2c730ae8aee45,2025-01-28T01:15:08.823000 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 -CVE-2024-12651,0,0,15a36852377902b723613e8f4cb245f072a6abd126bfe3d305e7a92fff99d4a4,2025-02-14T14:15:31.487000 +CVE-2024-12651,0,1,b6ea338f8c802f640d12fd791471729df08e388023e0d616e420e0058276f549,2025-02-14T14:15:31.487000 CVE-2024-12652,0,0,0d1e92fea470a9db4557cc44ce3f569d23b7c6a4d3928402e8c2b0a018031c7f,2024-12-26T04:15:05.660000 CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000 CVE-2024-12654,0,0,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000 @@ -246043,7 +246043,7 @@ CVE-2024-12787,0,0,14279a2f9574063a61ceb8ce2e1da7c6476af83dc7a21c055ac41cd47de3b CVE-2024-12788,0,0,e5b23c8d19a7a1106a3c70ec6e222009af52dadc4f4a8ee9b1597c00d1ebc18e,2025-01-10T21:25:42.317000 CVE-2024-12789,0,0,8cc3fd907634072e855557d7614296827afc8435bc47d635336cc8e8e8d4c6f9,2025-01-10T21:42:42.847000 CVE-2024-1279,0,0,ef8c7091f9efcda83f2d59c9476e682508ebf14d49bd13b894d2fd95f06a8c4e,2025-02-05T20:54:36.817000 -CVE-2024-12790,0,0,3ab6d6fd8704afa118edf15528f1756bc2e775d9f0c2c7d3659c9da7eb84d83e,2024-12-19T17:15:08.650000 +CVE-2024-12790,0,1,feb23891eb72265f73fdb2e157d018464bc352aa6670f3c8476b22179f3985ae,2024-12-19T17:15:08.650000 CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7ae26,2025-01-06T16:42:09.837000 CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000 @@ -246056,7 +246056,7 @@ CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000 -CVE-2024-12813,0,0,b81db5d427e66d191a6688e1b68cecd7e2131e5a0c88b7b320c1ca3c45597596,2025-02-18T05:15:11.287000 +CVE-2024-12813,0,1,b236228e29f37b1e45988d32f2d165d2fa227a905b1be18b89ce7ffc693fb369,2025-02-18T05:15:11.287000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7be36,2025-01-25T08:15:08.137000 CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000 @@ -246151,12 +246151,12 @@ CVE-2024-12934,0,0,7ad062db62cf48652d08604399e05e6bb1c587f673c49685b9aa414d5e338 CVE-2024-12935,0,0,246cb0571f2507038660c0e81ab4ec24b070071c999a554a789bc643b93656ef,2024-12-26T18:15:17.483000 CVE-2024-12936,0,0,e5d2746e3685c47179c98ceba36645686b2bcf170b130292c0e1cc384dd3fd5e,2024-12-26T17:15:06.487000 CVE-2024-12937,0,0,b02f4e3817e0fb9a6280a4eb3a77c4cf6f0aac28b5fe415e4a1cc8de68c81754,2024-12-26T17:15:06.873000 -CVE-2024-12938,0,0,815ad1fbb5ef85a31a9ed236c3e67b238fa902a4432946f8c612da393635402a,2024-12-26T06:15:05.987000 +CVE-2024-12938,0,1,d0086a9b4b7729d58ab90beb238866ebb03901a5dea4ef4b2e94bfcdf78600e1,2024-12-26T06:15:05.987000 CVE-2024-12939,0,0,32654b6c18509bf50ed78bbb26ce0497c338f806d93597d58632deb506209b0c,2025-02-18T18:45:17.713000 CVE-2024-1294,0,0,b71ea2285980093702250bdd703066da616a4eac45cb0506e646936d244fcc0f,2024-11-21T08:50:15.277000 -CVE-2024-12940,0,0,d7f154d179611651af13505b53d20f7105004eee3149ed750a04e34ae1addbbe,2024-12-26T07:15:11.637000 +CVE-2024-12940,0,1,e4765c0e28132b3797bebb0e4c7f6c551ebacdbee32f46e86b405f3d2d69a0b0,2024-12-26T07:15:11.637000 CVE-2024-12941,0,0,fd9696d2eb12af21d8cd287056b6ce693c42b5c4d791e1be7e6c47bc4d272f95,2024-12-26T08:15:05.117000 -CVE-2024-12942,0,0,05da77836d8709f6461adee528da409af08fffe48467fa28934d3d4386a3790f,2024-12-26T08:15:05.540000 +CVE-2024-12942,0,1,32c391b6dd2d5dacc4ebe5f2405caefe6942a699da080ddc2d92aaeb17af11dd,2024-12-26T08:15:05.540000 CVE-2024-12943,0,0,aab4ed81b8883d3d3e1186646e6b1339a43d7251fd269175f77d6e782c886941,2024-12-27T15:15:11.083000 CVE-2024-12944,0,0,c6cddf3fea227c3d5daedef3a3e9d4f24e9d3a72148cda75308098a68c1721ed,2024-12-27T15:15:11.230000 CVE-2024-12945,0,0,64c8169637894ed5ec6d7dbf35c33d95aadfaaf7a35152634b25e277e8dacede,2024-12-26T17:15:07.017000 @@ -246174,9 +246174,9 @@ CVE-2024-12955,0,0,01c00ead83fa8f9f7c160a68275906de7eedbd365dc21072a2dc6b944ca9d CVE-2024-12956,0,0,4dec445723280c9365c37949b943566ca38fb5a06bc3ebb0c2c7dccc97d497ce,2024-12-26T16:15:22.847000 CVE-2024-12957,0,0,a04d11b3f6b6d0cac994229318642c553f43366fd374b713bd5ddb5655138a76,2025-01-23T10:15:06.867000 CVE-2024-12958,0,0,2f2d1e34a44aceb03695717140ff583c6dfb2178e3abf88d23cee2fb77b7a1a6,2024-12-27T15:15:11.510000 -CVE-2024-12959,0,0,5225592e400663837fc5548274da6cb321b7f3df19f7584dc1065af38a815bb7,2024-12-26T16:15:27.643000 +CVE-2024-12959,0,1,c6e6f0ffa363c56b0e4d18334edf3dacd7ee2f09a4d9ccd3aea9bee8cd9943d2,2024-12-26T16:15:27.643000 CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066caf,2025-01-16T15:27:56.237000 -CVE-2024-12960,0,0,efd466cfc9f2f6251ddec4531038becc9445ea6af683699e7ee7017154c34377,2024-12-26T18:15:21.027000 +CVE-2024-12960,0,1,749514426b6921d259634c32c13822a54fdc69e45e5f6e2e4b411ceda2b6e3c1,2024-12-26T18:15:21.027000 CVE-2024-12961,0,0,291b46c6482f64b2afbe8eb7bd6d496579d9c717a7992cb4d0a3a6798792113c,2024-12-26T19:15:07.563000 CVE-2024-12962,0,0,2e934c0146c89d6547352a90e84606379fb66f2b613eb45f05a0f9592a42c1ca,2025-02-18T18:51:27.840000 CVE-2024-12963,0,0,57f82207620016a08e0cb80b0791f36983b5234c758838adbd8c3ad91e56b9fd,2024-12-27T17:15:07.317000 @@ -246194,7 +246194,7 @@ CVE-2024-12978,0,0,cc7b0fdc1d00be1abfc6d70979d368e4b6fe4326bf96f1dbdc3a2fa6ad847 CVE-2024-12979,0,0,8e40633878232ed2ab53a6382d6f99518b9212e94914f1a8de9029f0cf9e02b9,2025-02-18T18:50:22.963000 CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000 CVE-2024-12980,0,0,63204f4d95b678e5ba4d6111e311790259cdebe29e9311b61d38663cf6fa481a,2025-02-18T18:49:54.517000 -CVE-2024-12981,0,0,cc3a9baaa165fd598580712be925ef902feba7ee246b99e3aafc65513c39771b,2024-12-27T06:15:23.463000 +CVE-2024-12981,0,1,4ae09cd05a7d8e3113cef46ad57547d5051c39f434b2627a76f63a883b318a5a,2024-12-27T06:15:23.463000 CVE-2024-12982,0,0,893f77442fc90837f9fe8793b451cee087a15ccc8805ad197e0839b6fe5fa954,2024-12-27T16:15:23.540000 CVE-2024-12983,0,0,660e4511105a84d2089d110a972b11b03704d82ea07b70bce67e29a844922ccc,2024-12-27T16:15:23.683000 CVE-2024-12984,0,0,f0a40bfb4434122b7dd8ba661c6c69bf64d3d6f43bb0e348d606e1d5197ac3c0,2024-12-27T15:15:11.957000 @@ -246211,18 +246211,18 @@ CVE-2024-12994,0,0,40469c38a7cdf7d82b74f66d144e914af1491a6c05743fb438f587d34e35e CVE-2024-12995,0,0,9ea8b00be6b1a06f80038a74c3fc23fd754052a424e8fde2c1d49df19bd173eb,2024-12-28T14:15:22.507000 CVE-2024-12996,0,0,6c43766b1ce2636ec36981eeeba47786371be2965a0df2a813c99d297c767f66,2025-01-06T15:15:10.933000 CVE-2024-12997,0,0,71092d52f774b0f71c49030eb5b4ba5f2fdddc53fb6fa15623fde6c383daa7f1,2025-01-06T15:15:11.027000 -CVE-2024-12998,0,0,c9fe1a60911ac232c6425db703cddb229a2737ea06d6e3df0ccb294e755404bd,2024-12-28T22:15:16.893000 +CVE-2024-12998,0,1,1af04d8626de3ef3a7492e0e608a442dd1cedbdfadcf4a7ee2769399037b13b4,2024-12-28T22:15:16.893000 CVE-2024-12999,0,0,bc4873fb8c6bac2a642157f7af4befa1fc1442f567ece953de8198229e178a12,2025-02-18T19:03:01.740000 CVE-2024-1300,0,0,1449d51d635587092ee7e467b53bae80464f92cc07a6bda2595172832d29c1e4,2024-11-25T03:15:10.053000 CVE-2024-13000,0,0,95db7bfb2b9650caa98f15e4bdde119446e7b02bb11f4fc37cf744a27f07a560,2025-02-18T19:02:13.137000 CVE-2024-13001,0,0,c7a24e09bf623a7a99fd747399324077f6fdd26cd6e36b668379ef6681d7498b,2024-12-31T18:15:25.487000 CVE-2024-13002,0,0,af7fa440191927ea56c9106633c7ec27e7557cabbfdf57649e29120af371aaa9,2024-12-31T17:15:07.460000 CVE-2024-13003,0,0,2c76a33c95473721d8e709a3989f2ebda2c4a9fd2631704498642d556c29dce6,2024-12-31T17:15:07.870000 -CVE-2024-13004,0,0,6d2dcc1f5239818ee03d7ee043a7abd17a9b5c1062d722c21326ec71ed86cb0d,2024-12-29T07:15:05.643000 -CVE-2024-13005,0,0,ac9dda52f2dc91557cf8d471e9783414687cb361059bf6f65158086612fae6c8,2024-12-29T08:15:05.143000 -CVE-2024-13006,0,0,af1a02cf49c3a90d0ec7910348bc61092d31bc966eb80840ec9cbdf291cedda8,2024-12-29T08:15:06.840000 -CVE-2024-13007,0,0,ca32b617503e8f771fde7638c1cd97e0017950fa620056cf698f8dcf9607be48,2024-12-29T09:15:05.580000 -CVE-2024-13008,0,0,08e0acc08ad511d4aaf66d53e013ba4bcad724dbdcb83eaf558ce18506f6cd89,2024-12-29T10:15:05.853000 +CVE-2024-13004,0,1,adff65e47add498eeeb2ef07c3246fd9f02ad502db1d14393c17ce18bdb3e970,2024-12-29T07:15:05.643000 +CVE-2024-13005,0,1,a93d14725b8733b023cc4f0054d69d9c26a873568dd24f4d8b584a7e84f36520,2024-12-29T08:15:05.143000 +CVE-2024-13006,0,1,1356bf5bce7e08688b7d6d404600118125022b23b3dce04193c782d0f5e448c2,2024-12-29T08:15:06.840000 +CVE-2024-13007,0,1,10d390990a44f1472336c605ef629edb8bacaf268cf48b27dad404e154be2a47,2024-12-29T09:15:05.580000 +CVE-2024-13008,0,1,520d1ed2194f640c52c15b514c427d9e212e5d97006c04451c9b0b35779b31fa,2024-12-29T10:15:05.853000 CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000 CVE-2024-13010,0,0,6128af853809df81eee18f8a73cc49e9b80723ec8e3b72221c6cf24311d0db40,2025-02-10T19:15:37.283000 CVE-2024-13011,0,0,362d1d0e4eaef25be8bfac936a6d705b5bfeabc389aabfe60750090901182522,2025-02-10T19:15:37.440000 @@ -246239,7 +246239,7 @@ CVE-2024-13020,0,0,b18d1df78883ef9551ccbd20bdbcc8078b4e2c83db1c235e3e8b397ebf60c CVE-2024-13021,0,0,e401a77980fac909f19d47cc3c1c7289cfaeeaf335646b6ebb44ac1c48b5d8e7,2025-02-01T19:15:07.850000 CVE-2024-13022,0,0,90bb63d1bc90626e0499ce8896752c6e5ed50822b829721b8cf1b7b0080afd11,2024-12-29T20:15:05.980000 CVE-2024-13023,0,0,f5a89d141129acad456c68e1c2ff0519ece4d6d531f8eeee501015e55c18eb12,2025-02-18T19:07:37.823000 -CVE-2024-13024,0,0,2d443fd15bbce33c05ab26d4fb4c87b3a41715b85dfb24d19e706acdb51ba0ef,2024-12-29T21:15:06.220000 +CVE-2024-13024,0,1,b5320bc7d9924c1a7cc81ba1c74dddd41d8cc6b1b566621d91a4c45aa9244c98,2024-12-29T21:15:06.220000 CVE-2024-13025,0,0,49213aeccb84de269a6cda473f64c9cd212034f3fe128e40066ff20ce3282b78,2024-12-30T18:15:09.273000 CVE-2024-13026,0,0,2e2c8a5008d558f334a359f30ce14af2f0370049977086114b1edf6d11e61f8f,2025-01-17T20:15:27.600000 CVE-2024-13028,0,0,fa93211a2bdb9a3d16a1438985d05a65ae11871db310d3e60efe2083e10fb468,2024-12-29T23:15:06.030000 @@ -246349,10 +246349,10 @@ CVE-2024-13143,0,0,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea CVE-2024-13144,0,0,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000 CVE-2024-13145,0,0,8f9d33e26ad78b43f2820c128d400944c11f810ee68c6fe46ad1e5eafbee4338,2025-01-06T01:15:06.253000 CVE-2024-1315,0,0,ae67b7f13a317bdc1be64b4fdf580a08492423f203ba37c909a5dc9e35687d4a,2025-01-17T17:30:38.363000 -CVE-2024-13152,0,0,1623718d378ce88a22bbad626a4c6a35c6f57e2c6234ac08eff4555d55063391,2025-02-14T13:15:42.170000 +CVE-2024-13152,0,1,20d39b15541fe09be6285588087866b10b1bfafdf3570ce59d1648746f261a55,2025-02-14T13:15:42.170000 CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000 CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000 -CVE-2024-13155,0,0,abc846c187ee610be36b9327ce826db0bbe36e3bd8c2ca0e9dc519f899621278,2025-02-20T08:15:21.367000 +CVE-2024-13155,0,1,5dcf841776cfe787353f03eb14857bb4057089143cc39e1c2d4ed3f4fe8887bb,2025-02-20T08:15:21.367000 CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000 CVE-2024-13157,0,0,80e03db47d7aeaaff8ebfe5d3bb0d4e0a672091f1b6d6e0617afb0f75c61e9a3,2025-01-31T09:15:06.617000 CVE-2024-13158,0,0,d921bcc53f0c4810cb7f77f962be3471977624bd876c8c3eed3db3c6a249539e,2025-01-14T18:15:26.020000 @@ -246428,7 +246428,7 @@ CVE-2024-13227,0,0,f396acd62ff517fde269ff6e013e5c0bee9fbdf4ae486ca2fb2f74214892d CVE-2024-13229,0,0,8005008cc5eaf6f49dbd4877e33b66dc904c20bdee3b20c47739bf10cb4a210c,2025-02-13T05:15:13.930000 CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000 CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000 -CVE-2024-13231,0,0,a0a3c8be09c487da7ac229fd27d81f962d27d05f64eff04a5adbb152439dda3b,2025-02-19T09:15:08.930000 +CVE-2024-13231,0,1,6b2bf7946a3918f4f1317f58265852494615d3a82c5ba9db5c6afe2c9cc9bdb4,2025-02-19T09:15:08.930000 CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000 CVE-2024-13235,0,0,5930e006e775511d4864d991dce115a1ba6cf7f28d68b465f4870a6aae900aa3,2025-02-21T04:15:09.033000 CVE-2024-13236,0,0,64abe32b85dcd45ec9ab991a4d5209e0313b6971aeb9b551d0d126d46b2b126d,2025-01-31T16:03:09.630000 @@ -246536,8 +246536,8 @@ CVE-2024-13332,0,0,dac8734d921a69995688399552e86863e8f706d7756f9f6bda00d7ba7dffb CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000 CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000 CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000 -CVE-2024-13336,0,0,bb991eddb9d6dca57629f03b2496d9ddcd626f1b8283912d91a624feb94fc82a,2025-02-19T09:15:09.083000 -CVE-2024-13339,0,0,ec5a27af237e49842908b435dbfc33b6109d676dd112fee42b660f932b06c304,2025-02-19T09:15:09.240000 +CVE-2024-13336,0,1,cede76271e6f385be5d64089acd208200ba1197d4b4d2bc143190ee513b032ad,2025-02-19T09:15:09.083000 +CVE-2024-13339,0,1,f8de09fdd4f03aeb041339a5015adfee1491817c598e87bb0c02ef66e5dfaa63,2025-02-19T09:15:09.240000 CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000 @@ -246557,8 +246557,8 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 -CVE-2024-13363,0,0,d21488ec7f458338ccd20de07e20eba3496f9cd581ddf0ac36e8680afdaaa6e4,2025-02-19T09:15:09.390000 -CVE-2024-13364,0,0,e8c23a5a2067b6574dada082a7e9e7683f39c89e5e5291058031d74b9c8fe13c,2025-02-19T09:15:09.547000 +CVE-2024-13363,0,1,0a8b30810ad6f10ef00c19f313f4a652da8a8907e2b479981cc172e02b5fc0ad,2025-02-19T09:15:09.390000 +CVE-2024-13364,0,1,87d3f229d6edb0f8ef45a0e61555e50d1e0078f51a6aa430d1de2e93156a0203,2025-02-19T09:15:09.547000 CVE-2024-13365,0,0,d4c9fb3b4eb02bb797a58b6d290aa4b0d82f091aa00e734ed2f15824907289b9,2025-02-18T18:15:18.303000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 @@ -246581,7 +246581,7 @@ CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c7 CVE-2024-13388,0,0,39018ba958a3df82d58d281cd847820c99037c3098bcacbac892e0d7e0cecf9b,2025-02-21T04:15:09.353000 CVE-2024-13389,0,0,d3a247569299e0cec1414509995cd3f6c342ffef8797b534d3731670cf5721e8,2025-01-31T15:59:43.907000 CVE-2024-1339,0,0,a64c4c68c8a9a926adb37b05ad26ad3fdfdc4a14ba534fc12b29b0c3bcb239b6,2024-12-31T16:52:24.407000 -CVE-2024-13390,0,0,e705fb41e6b9b2a446429c2afaf7228aa6c9783c5c2b2e53f9b8f7c3b1540c75,2025-02-19T08:15:14.743000 +CVE-2024-13390,0,1,2975f8f2cb61c7269b0550bb0687a2a2ed62ab6fa6caaa233b196bdcbcfd6ad5,2025-02-19T08:15:14.743000 CVE-2024-13391,0,0,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d0640c,2025-01-18T07:15:08.637000 CVE-2024-13392,0,0,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000 CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000 @@ -246596,7 +246596,7 @@ CVE-2024-13400,0,0,a0da00543409991e4d6711b443cdf6fcdbfddf916acf7563da4678bdf041b CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000 CVE-2024-13403,0,0,f48009abe82bf9e29ae1b7a46417bc2967746c0b5702def33976d86176d1ffc8,2025-02-04T09:15:09.303000 CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000 -CVE-2024-13405,0,0,8500742a3a71a92155698ea107ad646961d23eca5b705f80a37a996fb2e10f63,2025-02-19T08:15:15.167000 +CVE-2024-13405,0,1,fb551ac182383da8fdfe04e2d83ed2b2737ab3967b873d712814245495cdf68c,2025-02-19T08:15:15.167000 CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000 CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000 CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000 @@ -246619,13 +246619,13 @@ CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083 CVE-2024-13435,0,0,89f24bc446706fa5fcd2115cd25029503fee212a6b4fbe4fee449edba1db576c,2025-02-18T18:15:18.680000 CVE-2024-13437,0,0,ac4ee3cde1737eec9f740e3f4e2e3bc68da9f2e601434dcfb63740e8fa129b22,2025-02-12T10:15:10.920000 CVE-2024-13438,0,0,368c1d2de10ebc37c011dce97979d0a38fdf4ed2a5b5de964fc559be5e3d5055,2025-02-21T15:44:25.023000 -CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a6305a,2025-02-15T12:15:30.300000 +CVE-2024-13439,0,1,f84eee74d6de3b2c20430c623f2a0e24f12ff3d9a339e5bcd45a4054034f7205,2025-02-15T12:15:30.300000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000 CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000 -CVE-2024-13443,0,0,5e0554feb4a2f4dbf6619974907598a97160af25d67a3f0cb251733bc39feede,2025-02-19T04:15:10.360000 +CVE-2024-13443,0,1,5ac7b381092d3587128f88ab0ac814694412b734a8e80d1fc0040639e688aef6,2025-02-19T04:15:10.360000 CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000 -CVE-2024-13445,0,0,ca602141b3e6fd986c90924d4149efcdf57ad7ab8a4330bad37a4c1cbfb7a9a5,2025-02-20T05:15:14.373000 +CVE-2024-13445,0,1,549bfbd4dfab23b651985e1d12f55b13b3d2fecb722a26a5a3f521a37ffa3672,2025-02-20T05:15:14.373000 CVE-2024-13447,0,0,4e4ee51c076699c7672245e5729c9870c182faecf6e2bd018441c71df98cbb9d,2025-01-24T20:53:40.380000 CVE-2024-13448,0,0,99bef776585fb11dba8e8ef9f028b4f3c7371956a91f9b56a4977bbe471e6b70,2025-01-30T18:01:07.080000 CVE-2024-13449,0,0,52b88677fd423c43b44e149505ef75bf01f315f780529f08af2d104c0e8e8913,2025-02-04T18:12:53.713000 @@ -246641,67 +246641,67 @@ CVE-2024-13459,0,0,a9fe845bd277299369bc3f6cedb4f513e577d0a95806c4e189fd9614c9d6f CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000 CVE-2024-13461,0,0,7310b23419daedb24e559d3e84e89095cccd323ffb73d8e4bc88880b2b6bd17b,2025-02-21T10:15:10.767000 -CVE-2024-13462,0,0,bd808375ae18220a9dd6d9ebbed45c53c83edb8ab02aeb633cd1274f400f3576,2025-02-19T08:15:15.620000 +CVE-2024-13462,0,1,b89ee07e6c68c54def9d53a689616be7c4a17f1086d371e48eecb6e4e912d1b6,2025-02-19T08:15:15.620000 CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000 -CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000 +CVE-2024-13464,0,1,7a352fd8d40f98c98fe284481ee35b9aa2e19210d339b9419319675b53c256a4,2025-02-18T05:15:11.673000 CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb522053829572311149c1,2025-02-21T15:35:58.387000 CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000 CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000 -CVE-2024-13468,0,0,f5287d148e3a11717ac8973e6248eb65dafac48689ef1e2f6acd92e99c685cd5,2025-02-19T08:15:16.027000 +CVE-2024-13468,0,1,3b114e7865942bd4a908c446f11cc9e4d2c0bb866058c63bfd1c63d95d58f732,2025-02-19T08:15:16.027000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 CVE-2024-13473,0,0,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000 CVE-2024-13474,0,0,47c5ef29373a38dedd73d34609a66da336ed25f357991390934cb94c8fc76f31,2025-02-22T05:15:12.410000 CVE-2024-13475,0,0,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000 -CVE-2024-13476,0,0,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000 +CVE-2024-13476,0,1,6c832e4753c6e1a2b42a884fb9d06be1591da602319fe3d2aa41923e60e781a4,2025-02-20T10:15:09.990000 CVE-2024-13477,0,0,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000 -CVE-2024-13478,0,0,3d283885de2ff5694d473a7458eb6a9fee1962d7b2f3d84adb8d26453f66b0b0,2025-02-19T12:15:29.777000 -CVE-2024-13479,0,0,265f3fc391e53c595bed244b3e7c3502077a0bb4298bb2e92ab4714dd5430254,2025-02-19T12:15:30.610000 +CVE-2024-13478,0,1,93d20da65c90641b8c9eb9568156fb7ed87224c6fc01ebbb7c4ebcb32ab554ea,2025-02-19T12:15:29.777000 +CVE-2024-13479,0,1,320f2b3f59be0b2b2494d0637bf1b123958ad78b4c9a0d15125d21f97c871dfd,2025-02-19T12:15:30.610000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-13480,0,0,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000 -CVE-2024-13481,0,0,18f6163dfd9d1440b7c7726ceaa029ecf7615c66174a2f06ab95e8be286bcd48,2025-02-19T12:15:30.753000 -CVE-2024-13483,0,0,36b609d73c634ce761bc3a61cf94037aa579c6e7fb89e544a11515a27c0ee3f1,2025-02-19T12:15:30.900000 +CVE-2024-13481,0,1,cd3e90ca8788d140f33390a83c0826f9e44c5ca345ed6575fe60ca10b97c29bf,2025-02-19T12:15:30.753000 +CVE-2024-13483,0,1,b5f3518a5924670250ec107a30937ebf32a5288946a995cad42963f7774856ad,2025-02-19T12:15:30.900000 CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 -CVE-2024-13485,0,0,8fd4be835ad8beaf924553e9e603da3e062896c923b1d51909bdb73e4c592cba,2025-02-19T12:15:31.047000 +CVE-2024-13485,0,1,8b7ccb3f818c1d2bfaad4453b7626a32eb177699348988a241f77817c9fe6859,2025-02-19T12:15:31.047000 CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80844,2025-02-18T19:15:14.073000 -CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000 -CVE-2024-13489,0,0,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000 +CVE-2024-13488,0,1,0febadc42709de4de439774caa0be39485d89fc609ff2499f7ecda57907a7fda,2025-02-15T12:15:30.457000 +CVE-2024-13489,0,1,e8c649823bd25691a7fd18377eb7362ab2e836d6ca608ad5ec1169c2627b2084,2025-02-19T10:15:08.870000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13490,0,0,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000 -CVE-2024-13491,0,0,3901e563b54ff00b6149844edb6c3aec1c2bb14d137786d8368044d8dc0748a8,2025-02-19T12:15:31.187000 +CVE-2024-13491,0,1,37da783639fc50c7b1870d95247d096f5b860c9d9cdab94bf89aeadd8127207e,2025-02-19T12:15:31.187000 CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000 -CVE-2024-13493,0,0,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000 +CVE-2024-13493,0,1,4723a19a2001ff5b6cf9a55a45e451806c480b6813774962cdc7d0267b86c2ba,2025-02-14T17:15:15.230000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 -CVE-2024-13500,0,0,0c429174cca57ae83685b1f496a3cf42bd0c51ad39e20a565f4f68cce4f1c5cf,2025-02-15T12:15:30.610000 -CVE-2024-13501,0,0,38d87f70bedff5fc9fdfe37055275cd533c9f08814bf6da62517ae17e2845e24,2025-02-18T05:15:12.117000 +CVE-2024-13500,0,1,574d05e125c45592eefd906f16613fdb43bd0e6d5fc3a8dafcbca8af4da8b125,2025-02-15T12:15:30.610000 +CVE-2024-13501,0,1,5b8d8ae264189413c78df0a7018297fc5defc836d73f4a78e8252eff413bb1ca,2025-02-18T05:15:12.117000 CVE-2024-13502,0,0,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b3fe,2025-01-17T14:15:31.147000 CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000 CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000 CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90dcc,2025-02-04T17:20:18.253000 CVE-2024-13506,0,0,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000 -CVE-2024-13508,0,0,cb500d45d3d1c5f13cf603c102bdf058371a7c70fc790b3143ee2ca90431b0e4,2025-02-19T00:15:09.360000 +CVE-2024-13508,0,1,e6d61cfb1b6d3ddbc2eabaefef8facd67e208fb438f974d133cd6cf11f236a6b,2025-02-19T00:15:09.360000 CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000 CVE-2024-1351,0,0,405f7ca5457b566dd144bafd06aaa6f59a3ff04b5a8a69549d30c39336936faa,2025-02-13T18:16:24.043000 CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000 CVE-2024-13511,0,0,8b315badaeb5a615c739271a3e79d1cb9a54c1aaf05d6bc1436615af32fdbe24,2025-02-05T18:22:40.217000 CVE-2024-13512,0,0,15b524ef140c14d839848665047eaf39bfa9911689193bf2e25f735ef0c619c4,2025-01-31T18:08:22.743000 -CVE-2024-13513,0,0,9532be29dd949592136094366981443369989c9721b2baeb94407f59e57ccce9,2025-02-15T08:15:07.790000 +CVE-2024-13513,0,1,ee248efe5bb4950af94f287df4373f891a3515a0d5bf6dba2ee06ddd100d8dba,2025-02-15T08:15:07.790000 CVE-2024-13514,0,0,9ea9c943c8c862a90b064c6b687870de6d99753ab2446cc014bc97f56be09316,2025-02-04T08:15:28.777000 CVE-2024-13515,0,0,aca8f7e0638fd7d821357389659621eb450217319a62bd2c5a959e9c0aea1b39,2025-01-18T06:15:26.410000 CVE-2024-13516,0,0,5ffb65a61f80c9c94522737749ad7061abe4071a127f73ee8fe2d406cf9b6f3f,2025-01-18T06:15:27.627000 CVE-2024-13517,0,0,cfab1b395558d480252b3d9445658f67696997e56c4b9d51564795ba8972f0d2,2025-02-07T17:10:03.317000 CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c455d7,2025-01-18T07:15:09.510000 CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000 -CVE-2024-13520,0,0,0d022892f28692b2ae8762509ce4aad5b3f48413ebef3a0cfb18328336d55b8b,2025-02-20T10:15:10.167000 +CVE-2024-13520,0,1,656f36a2be31d04b22bac9a54ebe157436703fa55ca148b403e5446f69404e02,2025-02-20T10:15:10.167000 CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000 -CVE-2024-13522,0,0,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000 +CVE-2024-13522,0,1,febcf3a41932ad458358b5031b2f653783302b8155a72201a51a0be8c3a13c19,2025-02-18T05:15:12.463000 CVE-2024-13523,0,0,a22589ae6ec5992efe47bdb0fb01b8cdac2a43ff89103cd45e22c3f11d842d97,2025-02-21T15:41:26.060000 CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000 -CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000 +CVE-2024-13525,0,1,37719f965e9ed70bd613e5973870bf4639825595b6eebe5cf54af826ddefe4ea,2025-02-15T09:15:08.833000 CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000 CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a301d8,2025-02-18T18:53:58.897000 CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000 @@ -246709,15 +246709,15 @@ CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba7 CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000 CVE-2024-13531,0,0,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000 CVE-2024-13532,0,0,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000 -CVE-2024-13533,0,0,dca093e418f506c56c7b721bf19c66fbd6fc8408ab62d8e654c432036b784a95,2025-02-19T12:15:31.333000 -CVE-2024-13534,0,0,24e878dd73461d45240baee5013d359ea0437394343be594e0594e5922b1d61d,2025-02-19T12:15:31.480000 -CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000 +CVE-2024-13533,0,1,26d906ce9b077202193e301525e7edca6e0a1833eaabe6191c0b46190cccf198,2025-02-19T12:15:31.333000 +CVE-2024-13534,0,1,e2405866402f0c1fa20db5f97fb08d502b9ec5d9fbb9cfbdbb7046d6ed9d664d,2025-02-19T12:15:31.480000 +CVE-2024-13535,0,1,8b9741e38d90e9d93579122b68eb38f5e2e6d060d36f32c03a6024600f5ab324,2025-02-18T05:15:12.773000 CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000 CVE-2024-13537,0,0,9b4773b817d55c47ab692786fa73c9a47df13981824e511c415997a4bf10ab73,2025-02-21T04:15:09.513000 -CVE-2024-13538,0,0,aa825465172755b9863036b91c4745396a22ef52b7b6e5c9f1490e637d5ab375,2025-02-18T05:15:13.127000 +CVE-2024-13538,0,1,22db57767664a8551a40d370b6fad59ed9a1d86e9df94d3709a4bc872be60ce9,2025-02-18T05:15:13.127000 CVE-2024-13539,0,0,4b7e0c70558e34f6819b9b46d3f48cda096658439289d18effcd3cdff1bec624,2025-02-12T04:15:09.197000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 -CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000 +CVE-2024-13540,0,1,7973f64773f197c5684658bb2fdc27d86bcfecfa917070050067cc6782e140bb,2025-02-18T05:15:13.427000 CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 CVE-2024-13543,0,0,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000 @@ -246730,21 +246730,21 @@ CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a6120298 CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 CVE-2024-13554,0,0,593696d24f43140274834fa7c9a7ab6a89ace00d66aec05e7d998911a54b4ba1,2025-02-12T04:15:09.503000 -CVE-2024-13555,0,0,3200643e8c32cab10ee18a48199edd6eb143f7592c7375364c0412c5fef4c9c9,2025-02-18T05:15:13.597000 +CVE-2024-13555,0,1,fbc06e3ecab8ce8bbd205e29376426cd5c4b5a6032aa88a5e1403d12423ed79a,2025-02-18T05:15:13.597000 CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 -CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e060,2025-02-15T09:15:09.897000 +CVE-2024-13563,0,1,3031ac214bd3ea53346a6d71bfbed70d308745391dfcd1e2839ca77975e01983,2025-02-15T09:15:09.897000 CVE-2024-13564,0,0,670dfa6497a58babcc45a1c7badc23fa2b82edd696d1f35f2fde4c33fed62d21,2025-02-22T09:15:23.687000 -CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000 +CVE-2024-13565,0,1,d03c04d282758b31dbd64a92f2b690f93ab3fd5843d635e82a6b7dc573602316,2025-02-18T05:15:13.803000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 -CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000 +CVE-2024-13573,0,1,9938bb46208a95e8eecd18f3b547be8eb958f0db68d59e63636d47dae824abae,2025-02-18T05:15:14.007000 CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000 -CVE-2024-13576,0,0,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000 +CVE-2024-13576,0,1,d6c0ece85828787746eb09fa1325b1c29bd2bf4baa03b418ec7448f30a15f6dd,2025-02-18T05:15:14.157000 CVE-2024-13577,0,0,7ec226add5baf80fe65c72cfac22716a4ed179a333ffd2c2c08673fb55d268bb,2025-02-21T18:34:11.867000 CVE-2024-13578,0,0,2e03d593d9cc9c5cb01e1d2f1b7697601c3fdfe810a05cbd665a89f4ae6da901,2025-02-21T18:33:08.770000 CVE-2024-13579,0,0,9640388d79eec1df931f220b7238300cfc32ad9fa9f52686d215010fe1b6e407,2025-02-21T18:32:31.837000 @@ -246757,11 +246757,11 @@ CVE-2024-13585,0,0,8b429a5fdcb1d17a6b9f6c7205b1c4a053bc1e58a2ece96449aff53b2ac13 CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000 CVE-2024-13587,0,0,78718d4624faf32704d9f7233c2994e3a7207724b6cc3a9ba3ffea55a1b05b95,2025-02-21T18:26:02.027000 CVE-2024-13588,0,0,63f6205e8c2e76a94b6fb9e47b748b2b301f4ec9cc2a02b8acc0bf99fd9e40b7,2025-02-21T18:14:48.753000 -CVE-2024-13589,0,0,8634e98206d01df693d56e69e48e93eb7f9edba40831365b0c5fb968bd98fabf,2025-02-19T08:15:16.453000 +CVE-2024-13589,0,1,f6423282e21a1d338bfa98ca0e9526adb793210cc5a47183d14953e2257df0ed,2025-02-19T08:15:16.453000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000 -CVE-2024-13591,0,0,059c4cbd8eede965314c9395245280bcce16ff543735609c2d21c27a3fd9b898,2025-02-19T08:15:16.863000 -CVE-2024-13592,0,0,c09356b512438608a2e6306845fe8a94f1bd10d08c5c60fe45a11194fb74a4b0,2025-02-19T08:15:17.233000 +CVE-2024-13591,0,1,193cf35fff79afe371c06da00ae13056344710c69a29c3cb961a7078d02b24ac,2025-02-19T08:15:16.863000 +CVE-2024-13592,0,1,74775c728e40e7e58502f3b6ca8c4e8c7e39eb4cdb5a73f3eae50ef38d5a3429,2025-02-19T08:15:17.233000 CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000 CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000 CVE-2024-13595,0,0,0af37cc42779bfca530d3961d770211d9305aca9c7ecdc98a5bd6399b4365465,2025-02-21T18:11:08.257000 @@ -246788,7 +246788,7 @@ CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd7 CVE-2024-13636,0,0,8f7090f3cee37c858f7afaf2983a2cabcdc65da940d26a01a270d2b24bb2e042,2025-02-21T15:21:17.950000 CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 -CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000 +CVE-2024-13641,0,1,cd1890f30f24c13413424555c34b5a8741240269cfb8c1f67ec9e1b8c16fa87b,2025-02-14T06:15:19.957000 CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000 CVE-2024-13643,0,0,976eb3748a453f62f41c154b29792936c30855f6728fa73bdd9cf169ffa6a36c,2025-02-11T08:15:30.450000 CVE-2024-13644,0,0,103d60e076f3c7bd4ae30253359a8c34e6a584ab6c0d85823d2a2e5827ff1420,2025-02-13T02:15:29.320000 @@ -246800,14 +246800,14 @@ CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f CVE-2024-13653,0,0,770f4a34ec62861070a9f7aec2b86de3f221ce9b95996de0b65265b14bc1c12d,2025-02-12T05:15:11.820000 CVE-2024-13654,0,0,2a35a17fe264f64bb6af7c966578a0e3f22643a1d92580b28b17070dab12d401,2025-02-12T05:15:11.987000 CVE-2024-13656,0,0,0b9d444c7c97e411e4ea27cc87641e7cb92ad285f00faceee8008c4cb10f50a1,2025-02-12T05:15:12.143000 -CVE-2024-13657,0,0,60a44e2d645da9e47eb235800bc9c18bced979a00904293529414d276150722a,2025-02-19T08:15:17.620000 +CVE-2024-13657,0,1,1b9bba2a66ea20d4df64ceb8790e01924057bf2e92e24e8fc6b6faba8806cdad,2025-02-19T08:15:17.620000 CVE-2024-13658,0,0,d03a5dca2864c8417f9018e7bf90bf0489d89a07c14724289f58406d6fa3a508,2025-02-12T05:15:12.320000 CVE-2024-13659,0,0,dbe630e285c8f72dabbec8cebaf54bef8da7c792e6b5f98321e2c39fc417940f,2025-02-05T17:40:49.037000 CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000 -CVE-2024-13660,0,0,a49d9476a5008e62d51a6b2a832dfe61828f91b18b4b8cde7e3993179e3b9e04,2025-02-19T08:15:18.013000 +CVE-2024-13660,0,1,d2cdf5d8cf8e31e4e8454a9f3311cb92335589e4523ce599ef87ea75bd1a0b06,2025-02-19T08:15:18.013000 CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020b33,2025-01-31T18:08:05.420000 CVE-2024-13662,0,0,8eed535a30180a19d960f2273d8a6d88ed11a0c316177a8c8d801e83b1bee14c,2025-02-18T19:15:14.220000 -CVE-2024-13663,0,0,4afc7501b59f2c8209bf8490c661f82ac8f691d34758c934a3e9bd65364ca6cd,2025-02-19T08:15:18.433000 +CVE-2024-13663,0,1,4d35c2aa6bb22f4acbf057554f2f8d44f446a1c9a791ed355d4b3cde1b61509f,2025-02-19T08:15:18.433000 CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000 CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000 CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000 @@ -246815,20 +246815,20 @@ CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000 CVE-2024-13672,0,0,98ff804d86690a48289eebd38819c69a1ea39c58f0316b0ac80ac7e733fd1773,2025-02-21T04:15:09.683000 -CVE-2024-13674,0,0,ac3642212117e2e4dbcdf6bf845cb1df3b30736364ba81890bc6e7f12c727bf2,2025-02-19T08:15:18.823000 -CVE-2024-13676,0,0,4f8bf0d44a971fbbb44d738bbf0fff36757bda864393a0685528bb1e1a4d43ad,2025-02-19T08:15:19.190000 +CVE-2024-13674,0,1,ccf8b266d3404726aa76131692ed055756c65575f2164f27de116ce89e18470b,2025-02-19T08:15:18.823000 +CVE-2024-13676,0,1,d71fc752196841e13708ada45e7864b2d9bbf81823a4755eb88e3f941de0a305,2025-02-19T08:15:19.190000 CVE-2024-13677,0,0,13401c1b73282722904b75cd499f0a3bc9825602c732ed33fda81e11a6c0d93a,2025-02-21T16:03:44.037000 -CVE-2024-13679,0,0,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000 +CVE-2024-13679,0,1,376562074b3f661a95343ca76bfe546237229fd3363ab8d9afd809103a82328c,2025-02-19T08:15:19.623000 CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000 CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000 CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000 CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000 -CVE-2024-13689,0,0,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000 +CVE-2024-13689,0,1,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 CVE-2024-13691,0,0,e2ffbabc297e59a5c1d2ebf52a7761c6c116f558696876672f6c292ae9c9a1ee,2025-02-21T14:22:06.687000 -CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000 +CVE-2024-13692,0,1,d6a2c5e09f6d6b282a84a5c98c0a0749bf62d677e316f69790d5c144cc510706,2025-02-14T06:15:20.140000 CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000 CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000 CVE-2024-13698,0,0,ea43a0ffeb82eb62bdf790bb3904a4694fa6ec80884e9d936dc30a8e05897d00,2025-02-07T20:15:27.277000 @@ -246842,14 +246842,14 @@ CVE-2024-13706,0,0,ab3c260451f5aeaf628499ae0037d8fc16844264bd9ec15ebc42f8eab05dd CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000 CVE-2024-13709,0,0,89bb0c649902e7b71dd397a2d1262eb45ecb5db3a49c5090d0564ce4341f03af,2025-01-25T04:15:07.670000 CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000 -CVE-2024-13711,0,0,28001e86fb043564d3a2fa90df9b7c35a4ccbdf5b6fc94ce2c871cacc4e4e50c,2025-02-19T08:15:20.007000 -CVE-2024-13712,0,0,030d96b716f25bafd54e090712c9bb60cc23ce32577681d3cdb6f0bf5f78f893,2025-02-19T08:15:20.380000 +CVE-2024-13711,0,1,afaa7b98604c781c997f370fd11d4586c5c6e11d4b026e7ec9dcfd65867af335,2025-02-19T08:15:20.007000 +CVE-2024-13712,0,1,dc7644dc4e1dbc747bbf2221b44bd3e1c5714d00548aa1a048cc6c77b3cd422b,2025-02-19T08:15:20.380000 CVE-2024-13713,0,0,325bf5535693a886456d4dc30288f32e2355aa6c0f7fe640457617c4bf8a5017,2025-02-21T12:15:30.040000 CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000 CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000 CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000 CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000 -CVE-2024-13719,0,0,96b9dda9a58b9bd7960bc82f0f45bdf70117123abedc9395edc605858d81a5c6,2025-02-19T08:15:20.737000 +CVE-2024-13719,0,1,82e1c4af9f0b8d4908b4e334be7136368e8b0d540e14dda9dec9f059b1234cbf,2025-02-19T08:15:20.737000 CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000 CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000 @@ -246860,19 +246860,19 @@ CVE-2024-13726,0,0,6f933b5330ba37986acbe4c29892bcb7173ac142380eeae5f3195ee1c4836 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000 -CVE-2024-13735,0,0,5831f6a512bd98ee3e9e0b41a189da9a28ce9d6efc5226591d1a0439e0759ef9,2025-02-14T10:15:09.207000 -CVE-2024-13736,0,0,642ff0262a392915ca94c3ffce9d077b9ffae6211006cc282752a825aa5395b6,2025-02-19T08:15:21.077000 +CVE-2024-13735,0,1,ff074bbaa964be9f58cfafb7febf97dd296dcaacf8b054eb8eb77d2361a0ac43,2025-02-14T10:15:09.207000 +CVE-2024-13736,0,1,3b29576ab15323383a328a744776aaaf6860a47e0758ba2a384a57213e3d5dbb,2025-02-19T08:15:21.077000 CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000 -CVE-2024-13740,0,0,ba6332fba984f0b615db8e6ca888f7060538e8c0e0b28351d9f7958c938b931d,2025-02-18T03:15:10.273000 -CVE-2024-13741,0,0,175049f3021b19cf7fa751f03fe80f12100c24edbb7e3c159d12f4c96d5eb8a9,2025-02-18T02:15:13.047000 +CVE-2024-13740,0,1,146ea6bd467b11f559ce5120880fc082abd00bb089ecb64f7f871959dfe018ee,2025-02-18T03:15:10.273000 +CVE-2024-13741,0,1,6bb53aa0adb963a4279c3a38ad52a28f463403668619eb7da24d6295ea4de827,2025-02-18T02:15:13.047000 CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000 -CVE-2024-13743,0,0,27ea41ebfcfb791fdac8994b9a3c60039e7203f73b7d197f4d7616cc1f730a6d,2025-02-18T23:15:09.267000 -CVE-2024-13748,0,0,1697b574f690f336c11060fdfb3f73b4037faf1a5992f7a8b6df68b81a12de40,2025-02-20T10:15:10.303000 +CVE-2024-13743,0,1,cb7982c1eb3cd84d6b2c792a7741ded5385c662265d6c1b123912e485b0d90ad,2025-02-18T23:15:09.267000 +CVE-2024-13748,0,1,1a121a176b64e7683caa6364c4ef53cc2a9076b7e8e8599919d210ff2e56a289,2025-02-20T10:15:10.303000 CVE-2024-13749,0,0,80f262ecaea974125eab2d55e54ea371d41d3a900599102c4f121cdbe4bfacc8,2025-02-12T04:15:09.793000 CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000 CVE-2024-13751,0,0,f5edea72cb38e234db02d5811b75c1ec56c75ebd81b9f8253237e94df80810c0,2025-02-21T04:15:09.837000 -CVE-2024-13752,0,0,90982070281cf6fac387cb369b7b78fff5885316e613711da2e6fb3910f9109c,2025-02-15T10:15:08.533000 -CVE-2024-13753,0,0,b2ba220ac3d1a62c609e1defaf324d88eb47f70fafd61d617b1b90635fc079be,2025-02-20T10:15:10.450000 +CVE-2024-13752,0,1,4e02e3fe3bcbd96a86747be51e490a6b26db430b6a028a622e93086c92eb9893,2025-02-15T10:15:08.533000 +CVE-2024-13753,0,1,3f4fc9627c0f2aa321755f232e314cce0cf82a32011b9e970cb2df4995dc685b,2025-02-20T10:15:10.450000 CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000 CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000 CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 @@ -246882,18 +246882,18 @@ CVE-2024-13770,0,0,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000 -CVE-2024-13789,0,0,66685c0c937a45caf4804fdbb0f6a654b7766a4df93c13ce786e130fd2ed5ff5,2025-02-20T10:15:10.637000 +CVE-2024-13789,0,1,7e93b6d08cc6df1b6bc2f867c0f4be1ee78646a7a043ad72e374fd176f679c40,2025-02-20T10:15:10.637000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 -CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000 -CVE-2024-13792,0,0,5eea2eb9c2e9b718585e09fb9464cf4787dcedab1db15551defa783e010d8240,2025-02-20T10:15:10.850000 +CVE-2024-13791,0,1,820bbb9fcad22a7a341b736abd342ae5d89c31cd51639d874a73cbe9a15313d1,2025-02-14T11:15:09.320000 +CVE-2024-13792,0,1,efa9790342c65d720d97e1d4a5746353d1cea9ec7eeaae9566972c4a8f25591a,2025-02-20T10:15:10.850000 CVE-2024-13794,0,0,27d6b89d805464403aa5cd7b47bffa4f0df39472970f2a8182a5a27be68e3d41,2025-02-18T18:15:19.290000 CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000 CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000 CVE-2024-13798,0,0,b7519f3897d26f2d9d8f21bc61cafa9077a8c17dfa0e7a4b29a801ec94d2e592,2025-02-22T05:15:12.590000 -CVE-2024-13799,0,0,ec8cb514ef31404e1cd13657eea18c026b0b0f4d5ffefec8356a7aac820d1c0c,2025-02-19T06:15:21.283000 +CVE-2024-13799,0,1,e8bf3eec61ee5004ffe816bc3d1e1d3f4c7c5fc01f5e38b638ff3d46b6679801,2025-02-19T06:15:21.283000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 -CVE-2024-13802,0,0,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000 +CVE-2024-13802,0,1,799adf2c5a2e8a6674a965e84c09b9fbf5a704bec620d344f92121a6b0bfb91f,2025-02-20T10:15:11.100000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000 @@ -246904,7 +246904,7 @@ CVE-2024-13821,0,0,92231948809e64858a527fe3859ea33ead7fc0306ca0e57a7c903c741fbe2 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,aa117bb4caae4c90c9ef562f3b17aec83c186c85e2ed83fcc25ce7b11090cff4,2024-11-21T08:50:27.733000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 -CVE-2024-13834,0,0,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2403,2025-02-15T15:15:23.423000 +CVE-2024-13834,0,1,b00d348c6bc596e587bd28805c775af0bb10055239c1c6f1ecae7cdc38009161,2025-02-15T15:15:23.423000 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000 @@ -246912,21 +246912,21 @@ CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567 CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000 CVE-2024-13846,0,0,7a6b2d68f6b35a1c0346eb229a9db02fce41ef7ca697acebf08e29ec1c1313dc,2025-02-21T12:15:30.183000 CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000 -CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000 +CVE-2024-13849,0,1,76427ddbd1b9c89aad3ff1ad69ba5ca19d42f02190050e5d0291188382af9c14,2025-02-20T10:15:11.330000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 -CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000 -CVE-2024-13855,0,0,87ff80a4a4bcadf924c0b68cea8cd371d8a19ee5f045d490959e15e51f021d88,2025-02-20T10:15:11.530000 +CVE-2024-13854,0,1,b293d3f2f05083e98beb719565723791c5cf1a85fbf867f7cfec3a20f9286342,2025-02-19T08:15:21.440000 +CVE-2024-13855,0,1,07563565d63aa0673a3108e0a48747889696d3c84d85640c1521db3b7a6edb9f,2025-02-20T10:15:11.530000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 CVE-2024-13869,0,0,6cf76ca30972bb4e146a69d16f09015336f9457aca89967f7112327623dcc3eb,2025-02-22T13:15:10.920000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-13873,0,0,ddf058f4c75682e8cf7335d38f43094b08f172b8fcc2d656f2cc5238777fc340,2025-02-22T04:15:09.567000 -CVE-2024-13879,0,0,9feaa77a4a107496b778129b23b28c9a020cd8ce5e3b7bb155fa8c6898d38c2d,2025-02-17T16:15:15.950000 +CVE-2024-13879,0,1,e61e29fd11a21511e45abef3be0c353bba4af1d6241469d18216deb18ad9be53,2025-02-17T16:15:15.950000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-13883,0,0,dddb8b479d8345e49ddd8f724d4ab3348652441913a63435d046cdd13b4c874c,2025-02-21T04:15:10.160000 -CVE-2024-13888,0,0,c87839d2bca683e4e01b4f16bf4650844bb0d5c14b76b96fd45e3c4854b6fe97,2025-02-20T09:15:09.577000 +CVE-2024-13888,0,1,40320339f79eb27236ee58a78c4d4cc336b2214fd07c4cef1292627aa13cfaca,2025-02-20T09:15:09.577000 CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000 CVE-2024-13899,0,0,d4e618d3301d89b67b6787c524f771ae072ae7da4c1f68069e64d4f4683b0db8,2025-02-22T04:15:09.720000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 @@ -247038,7 +247038,7 @@ CVE-2024-1497,0,0,bbe3250bf4479120430c0f29b882afc9852aab2e448bf41f0296f987b62a68 CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 CVE-2024-1499,0,0,0633316f47685281ee22de44984ee86e019a3a966e3a05caf35512f407ac2251,2025-01-22T20:58:15.017000 CVE-2024-1500,0,0,7bfbfd7f7c0ef8fa4afdc863c1d8fd768e05a37a631a8321003f16dcf9167941,2025-01-08T18:34:33.033000 -CVE-2024-1501,0,0,7278cf3016d6e749f83586c857f319c6893ef852e37caa5b00a791eeb8409c93,2024-11-21T08:50:42.983000 +CVE-2024-1501,0,1,2920a2ba02d4bcc76f4c26ab7f93182f56a0ad6e54a218d975a0d6cb3093efd1,2024-11-21T08:50:42.983000 CVE-2024-1502,0,0,fcde604d4a7c0628f2a9a4d7ccfeae5e30232d291f179882e82357fd13177d22,2025-01-15T18:34:26.217000 CVE-2024-1503,0,0,701aab9502169da6744faf6af51f6a159c418115b00c7ffe0d0aa53bdb78b3b4,2025-01-15T18:35:32.333000 CVE-2024-1504,0,0,d581c9656f5131563cedb677e916eb2d390674aea901c47070200915ed1b024e,2024-11-21T08:50:43.387000 @@ -248954,9 +248954,9 @@ CVE-2024-21604,0,0,1a7a37fc7cc36b20d7b8978537909fb8fbba39617f234155b394688993722 CVE-2024-21605,0,0,c986b538952dab105b51d22e7355fba5d593944bdff8288c4e213c6a3491d91c,2025-02-06T16:58:10.283000 CVE-2024-21606,0,0,96b9b5aaaa10d12d746cfced3bbe184276bbfbc212f99fb99927862a8cbcb0ca,2024-11-21T08:54:42.453000 CVE-2024-21607,0,0,f59415b22faf656477f9e7bf7a982f3f8655c7ad86e44b7900b038f38b711102,2024-11-21T08:54:42.600000 -CVE-2024-21609,0,0,af1ae1833d0505ee24ae4111b4f44bef9c1ce3c5982efb9cdc7efce0447d15bd,2024-11-21T08:54:42.753000 +CVE-2024-21609,0,1,9b2b0a867247e862028482bc925777b4bfd31a014205c7c65bbfcaa37a52a27d,2024-11-21T08:54:42.753000 CVE-2024-2161,0,0,09285d34c68becd4910fce6a857fd42baeca498f3921f8c0788274bc89faf18c,2024-11-21T09:09:09.573000 -CVE-2024-21610,0,0,51a32e10a90af07ba72199f4cebab18872958a3eaed5b4b303e5ff49f7e22c72,2024-11-21T08:54:42.883000 +CVE-2024-21610,0,1,2893368b4bd2454b07a316e074f5fd3e6a391433ba2105df6748344f03aabf9a,2024-11-21T08:54:42.883000 CVE-2024-21611,0,0,334e98596de5cccc370c36d1b9f4ee75740cb3840f270668136be62f04aafb00,2024-11-21T08:54:43.017000 CVE-2024-21612,0,0,a1c64368428607152868a7719ac581eb5c0c82d11e43ace9c200d48539f7d1d6,2024-11-21T08:54:43.200000 CVE-2024-21613,0,0,1b5cc7582af8e29a485625fa0664bab35c6731001707514eb375ebe0f6bde842,2024-11-21T08:54:43.363000 @@ -249523,14 +249523,14 @@ CVE-2024-2224,0,0,e619a251ac84ca3f416df539c769a3b524815974155640f4ec211a0ed783d2 CVE-2024-22240,0,0,76eba359f290033dd8f1debe807422103207788cdf52c52ee67de038677ad8c4,2024-11-21T08:55:52.303000 CVE-2024-22241,0,0,bd56aae87eeec04b39ec1e5b666e28f125a4e5a99038a095f491d3a6a08e503a,2024-11-21T08:55:52.440000 CVE-2024-22243,0,0,2bbbe692c706286c409c9711ac92abcf3db0f1c1fcc923c3be457159b75dc85b,2025-02-13T18:16:47.530000 -CVE-2024-22244,0,0,46ee281f06dbdb3de1b3303c058923ba9e01105c90b04fc55b1b8169dbb4a767,2024-11-21T08:55:52.717000 +CVE-2024-22244,0,1,5dfc14d3284a68071f5a2541a3edf8b12a004063d113f54c22e3b4bcff5d4bd8,2024-11-21T08:55:52.717000 CVE-2024-22245,0,0,28160c1b7edd8629d42d912690401bebe90dfb88c0bf5d4aea9d9798777453bd,2024-11-21T08:55:52.853000 CVE-2024-22246,0,0,3ad8f091c992ef0cbdd48a2a2293d5474828742dbc9e91a3177d9a9487836ce7,2024-11-21T08:55:52.973000 CVE-2024-22247,0,0,98551df5e52ed97248ab470679d67b187ff4dc2bf422d4a17c411b750b658cc5,2024-11-21T08:55:53.110000 CVE-2024-22248,0,0,7d11e6f20b6e40a0e1b3d2474db81de7a92f55a017f57048c4c374e5a84d824e,2024-11-21T08:55:53.237000 CVE-2024-22250,0,0,40db3fb51052a18ec19cf444cfe62376d1b552d431677cfcf8f3962e85474381,2024-11-21T08:55:53.373000 CVE-2024-22251,0,0,7962e8c1073d0793f33908f5af22b8fc0809c0ba75822692ea4b295588a7524f,2024-11-21T08:55:53.500000 -CVE-2024-22252,0,0,5e0528c1aac332410932ea5a6a50396eed4e958d932bcfa6f0bf1229ecb6e48f,2024-11-21T08:55:53.647000 +CVE-2024-22252,0,1,5f49ec7740ecf23c7ae979006bc50acb0e45c810b5db18088d8b9313bad53955,2024-11-21T08:55:53.647000 CVE-2024-22253,0,0,b50aabf6eb2ec6f9d4f741174d0b5159ccfe7acd1b46f4546735214781343c2c,2024-11-21T08:55:53.773000 CVE-2024-22254,0,0,2fe0462c8eff093e322a6ddd02c09b1d23f8f94e5337f30d36595c1b2c8402e5,2024-11-21T08:55:53.910000 CVE-2024-22255,0,0,d960bb32026f52cbb91b98955eb040cf83d5638234fbe58082db83cc49b3ce64,2024-11-21T08:55:54.043000 @@ -249540,7 +249540,7 @@ CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d CVE-2024-22259,0,0,1d5817a8999b58be866796e36ca3e4199c3e466f70ce279e4c60007061b8260b,2025-02-13T18:16:47.843000 CVE-2024-2226,0,0,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000 CVE-2024-22260,0,0,7a7ec824f5ee06e50803ba498f9aef05f0816e9454ff00b22048fb01f9eeb0f0,2024-11-21T08:55:54.833000 -CVE-2024-22261,0,0,2f3f327d5f00b5b399eeb14b1642972cb9f1a03fa2d26a05c05601b888eaa6cf,2024-11-21T08:55:54.960000 +CVE-2024-22261,0,1,61cca4051b8bf6fdc73239fe8b0653a56854344e6b7e6d6f85e06c19653f8603,2024-11-21T08:55:54.960000 CVE-2024-22262,0,0,c6cba0eaa82aa4b35f3e73f09e60a77ab1893f065fbc1843c84c2a7ba444c92b,2025-02-13T18:16:47.980000 CVE-2024-22263,0,0,6b57c165ae6f4f24efbe95adbce97de5c609eb29ccf1915937950705d9f78a34,2024-11-21T08:55:55.223000 CVE-2024-22264,0,0,578dd8660fc7c0fa6384213c2b7962834c168b36b5ef92fa90215ef8713df428,2024-11-21T08:55:55.360000 @@ -249552,7 +249552,7 @@ CVE-2024-2227,0,0,f4193cad275230e4a77caad12789eba12ab0bb05070cfcfc47b838d20d2627 CVE-2024-22270,0,0,686ed972793d7f5a552dfbb080535e83ba0afe88182341280195825995aa4303,2024-11-21T08:55:56.013000 CVE-2024-22271,0,0,75c1718838fa265bf8dac6e03c9384a09b6896e0d07a3322cc92b020117c5dd0,2024-11-21T08:55:56.137000 CVE-2024-22272,0,0,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000 -CVE-2024-22273,0,0,9d8662742ef89c4e09258fed363dceb3e1d7333010cff3107d12170a4476971f,2024-11-21T08:55:56.397000 +CVE-2024-22273,0,1,f426aa5a54c0ca3c3418d9b1d3a36ca622a3f95915854d97b8cbe98bb9c82ba5,2024-11-21T08:55:56.397000 CVE-2024-22274,0,0,568316e85d4cace1f65225c3627bf29b9b513721d081155f7f0f0f60375a00ad,2024-11-21T08:55:56.530000 CVE-2024-22275,0,0,bc719934d47d6c144e92538461f9037d51dc70942f45443a583aba7da17d037b,2024-11-21T08:55:56.660000 CVE-2024-22276,0,0,a04a9e6d0ae5e9d579794d26ed880a69b39cf873a295c44f1908b9c4201e03dc,2024-11-21T08:55:56.780000 @@ -249674,7 +249674,7 @@ CVE-2024-22396,0,0,a6f86b280685a8077d64ea0c4e6e62471b49d7ff7e81586c6e52ac5aa39b1 CVE-2024-22397,0,0,01399fd328b3875d3cba807f43194ce1c518378bb4f49faacd426911edda9d25,2024-11-21T08:56:11.887000 CVE-2024-22398,0,0,dfd55b15b360ca1655d53463ee39d2e2f8fc335d78f1021104df189fbcc47922,2024-11-21T08:56:12.003000 CVE-2024-22399,0,0,440fe391b5ec2015da468cab093328959c1b38c96ded1c0d9adb3003d7cd4bf8,2024-11-21T08:56:12.200000 -CVE-2024-2240,0,0,16a10f4a1ac0ccd76202fef3186f83cb5364c39fd5bd0c984fb5f954401af798,2025-02-14T05:15:11.550000 +CVE-2024-2240,0,1,b010beecadb74c6e0aeb57fc04f4044357d30fe9d2f1cd1248d2abe0bb4a004b,2025-02-14T05:15:11.550000 CVE-2024-22400,0,0,5930ebcf2866e03427e30d4762c0c3b8aeae3ff4116c2beec8fd91037b7d32d4,2024-11-21T08:56:12.393000 CVE-2024-22401,0,0,37c4e9c09afc5473d51bfbb7104c0cda826d003022619855b6d7e90cb4694716,2024-11-21T08:56:12.540000 CVE-2024-22402,0,0,645886260abde48d7718fc6c6c2e9b322fc883f67f629caa855db20c63710f23,2024-11-21T08:56:12.680000 @@ -250214,7 +250214,7 @@ CVE-2024-23326,0,0,4cad096b926e61ba5057fc61c818f175644122ba3bf2af2998e5007964e72 CVE-2024-23327,0,0,a8afe8abda31e003c23c096976d7f35de964762f6854560205e003d15676baef,2024-11-21T08:57:31.030000 CVE-2024-23328,0,0,31d0cef0ed7438d2981343da4f7a2780ae54e6fa105b1858178661dbbd43b5cf,2025-01-08T18:52:16.350000 CVE-2024-23329,0,0,6f00857f1323e733be7f4007f4cd28eb924527a4b1e19ac242db7d35637409df,2024-11-21T08:57:31.297000 -CVE-2024-2333,0,0,aa9fbee873f24a7fcf3257af1de3e39f370ee81e78e3d2194f8b11717ede7e1c,2024-11-21T09:09:31.550000 +CVE-2024-2333,0,1,5c10b694b762a1d6aa34ab66bd0406e30f7e99d152f25942dbcea3c62ef146e4,2024-11-21T09:09:31.550000 CVE-2024-23330,0,0,9c37dd2c8d5180b5d682b7e4b5e92f1c52ed11136a4f6aa3156db7d54d493360,2024-11-21T08:57:31.440000 CVE-2024-23331,0,0,d249684f95243c86cd9ac165298c6d83c767bd88a7562199924aa7b58497314c,2024-11-21T08:57:31.573000 CVE-2024-23332,0,0,d71e1782a43b90e8f3c6045284fd1374fc8749a7455b52cacdef33d8b65d9b8d,2024-11-21T08:57:31.710000 @@ -250400,7 +250400,7 @@ CVE-2024-23505,0,0,3e3fddc3c9865441111437f463ae41f700c424092b9fe16a43401e2fb0495 CVE-2024-23506,0,0,e88f279c37cdf9f46123c4f77d5df107be8c4e8f01702aee814129ba8acbfc70,2024-11-21T08:57:51.103000 CVE-2024-23507,0,0,ee194c19e69fb972b71bca97ab4e2e6c3d3f088b983812978c2b1f12ae84d7ce,2024-11-21T08:57:51.250000 CVE-2024-23508,0,0,7aa77a891506e26942c2d9d85544961bcfb4c6fcae6cb4a851b3432bf596fe0e,2024-11-21T08:57:51.377000 -CVE-2024-2351,0,0,63bcf91f11150780191757c4122721f4c72b25eef3b28832ef4faa2525e3515f,2024-11-21T09:09:34.440000 +CVE-2024-2351,0,1,03a4dce06a36bfabedc551bd266686706e577c3fd1b52ee53fe9b0872403d1b1,2024-11-21T09:09:34.440000 CVE-2024-23510,0,0,4efbd33641766696acf755eb3ef43ab907bd3d4a55a5705b83ba836ab88d944c,2024-11-21T08:57:51.503000 CVE-2024-23512,0,0,4e8e80a06eebc18115ce8d65d2a77bdcf38722f9cbda81ec682263e1c96fdbb9,2024-11-21T08:57:51.627000 CVE-2024-23513,0,0,5a752548faba1d879d8a1700e74c1920ae46edee49cc0d3f9f72ff3782019b79,2024-11-21T08:57:51.773000 @@ -250942,7 +250942,7 @@ CVE-2024-24216,0,0,c91d3207be0c3ea044cbf6738bbf666c1897a05972ed2939b684c896fd773 CVE-2024-2422,0,0,e0f16862e56460b10d4b35ca25930db7c4d978826a4cf9df9132fc1f008d49b9,2024-11-21T09:09:43.220000 CVE-2024-2423,0,0,03409ed0dc8e0f4efd88a22de5812d4650fabdd5a154a54ec4e063dfe45fddfb,2024-11-21T09:09:43.383000 CVE-2024-24230,0,0,db3d903fb4d0fc1cc9f1e96b322c8f4d603020a89a27e030df723420bc1b610f,2024-11-21T08:59:02.790000 -CVE-2024-2424,0,0,4984c661289058f3e31cbe226891b5203add94baf9ca896ac78ee3dc89d86cbd,2024-11-21T09:09:43.510000 +CVE-2024-2424,0,1,60c28a231637118c17bd143dedfede9703409903a2a3aff91572d4048b3a3411,2024-11-21T09:09:43.510000 CVE-2024-24245,0,0,05fcf96d96c9e2b055db7b2c62978672a6cefdae945d04a54aa9eda9382704d3,2024-11-21T08:59:03.007000 CVE-2024-24246,0,0,aee375bd384f6f6525ecaf7c72a242d761df287a727d4bd73ac8a34a8fb0ec3f,2024-11-21T08:59:03.260000 CVE-2024-2425,0,0,819d6b5e41a9ad08d75b1d0f90a9bd716fe340d9aa9a5f5644e10d03953f24ea,2025-01-31T15:41:54.357000 @@ -251506,7 +251506,7 @@ CVE-2024-25062,0,0,33d5a68ef3b936424a736429c0cf52857e2954c9e23e61044543b96f4ce8f CVE-2024-25063,0,0,66e3d9769be4a072b3ce672f9896271f84fc3a46faea832786d65ef1b0821cb5,2024-11-21T09:00:10.580000 CVE-2024-25064,0,0,630189d4352af193613c5caf500a30b1ea966acedabfdb6b6c44c8c9c90ff2da,2024-11-21T09:00:10.703000 CVE-2024-25065,0,0,d9b3f95564df6ce5bbc93b83e6e400dfe73cd962c70fa49bcbdfa1f240e5106e,2025-02-13T18:17:13.343000 -CVE-2024-25066,0,0,cfe99037f8c60bf9e1eb92942e0cb294c42dc1bf159b970776555c22910844c2,2025-02-17T21:15:10.993000 +CVE-2024-25066,0,1,ba1f945917f824d405690c3c0995692e83e8d1cda25cd2cba4cc0ae184ba4291,2025-02-17T21:15:10.993000 CVE-2024-2507,0,0,d2bd12e43cb16137b76052767012daeeb5681b81f827ee8546e5b590614b4a24,2025-02-05T17:28:13.613000 CVE-2024-25073,0,0,b773096cbe22b7b2359c05c5b9b8c5d77df4ed93f4aca2b5ee2c4c6254770bbe,2024-12-04T21:15:22.230000 CVE-2024-25074,0,0,ceec7e26506d1c51c0a15b70554b53358fa1555c187d8abcdb06a9354ef81f73,2024-11-21T09:00:11.107000 @@ -251830,7 +251830,7 @@ CVE-2024-25569,0,0,b037d1dac321d0fad4f682820302460ba3789c0955cd0c11614e35160f41f CVE-2024-2557,0,0,67a259b4af3e70193e67c621b23a4258c6c329ffc2454edde4f3adef49c00463,2024-11-21T09:10:00.307000 CVE-2024-25571,0,0,a033dc338f3323de872de3be9c0cf5fa2d9aeec22dc20530918f06e8608393f1,2025-02-12T22:15:31.667000 CVE-2024-25572,0,0,3b91a9b2b3340e450f0ace2854bb810c9267cbdf3d9a3da323e758f101a51695,2024-11-21T09:01:00.427000 -CVE-2024-25574,0,0,31c112accbf17d2b994dbb76497de7bac711140b2a7549d57fd0373c5604c7bb,2024-11-21T09:01:00.637000 +CVE-2024-25574,0,1,5a4772f97b4fabb237b226afe6115ce52c03351378339e96568489b26ab9ad30,2024-11-21T09:01:00.637000 CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e117,2024-11-21T09:01:00.773000 CVE-2024-25576,0,0,95b8b2fe29c3b8fa31fbe37491add9737a675d1ce27c7ad5d9b93d6c253067d8,2024-09-06T20:17:14.003000 CVE-2024-25578,0,0,cd7bc684525a22b1c5771942ff4ae262fdc7036bf854cdb96ec3e2374a3eeb34,2024-11-21T09:01:01.047000 @@ -254201,7 +254201,7 @@ CVE-2024-28442,0,0,39f9ff8978e427c05b79b512e2e774e85082ceb0d52e4ded352ec1fb8b627 CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661838,2024-11-21T09:06:23.270000 CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000 CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a154207,2024-11-21T09:10:39.807000 -CVE-2024-28456,0,0,7dbeb10b4fc6753fed5ff92a160199e2866a3dcd5e74a2ac1b07f749fa96c6ff,2024-11-21T09:06:23.933000 +CVE-2024-28456,0,1,c37c837328580067ae63b94e7d7c9b46f0b957c77ec1074ef942ca71a5ffd77f,2024-11-21T09:06:23.933000 CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f7252c,2024-11-21T09:06:24.153000 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,eb3e3360556b68d794af1ae08995717641c6898e210d72f26e5d317c83eadaaf,2024-11-21T09:10:40.053000 @@ -254351,11 +254351,11 @@ CVE-2024-28770,0,0,b8811b7fb98e7ac5379aa26a96e0b35f3c550f414784b5c1af5c44bab09d5 CVE-2024-28771,0,0,a0137eeff8a509a8fdb4e37fb64616fdf842469ff599fe3f95344835ee73fac4,2025-01-27T02:15:28.553000 CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 -CVE-2024-28776,0,0,7813f4a598d53c815744e34437e69fa74a5b5070a8a0d6503e4999a527293265,2025-02-19T16:15:38.870000 -CVE-2024-28777,0,0,df83cef3ed556e980229e04768c97cf95b872a367d90979f3c72eb9990d2d4aa,2025-02-19T16:15:39.363000 +CVE-2024-28776,0,1,d4f23f132951b2151f4470decce9243914752d2b7457be6fca41a9a9d7739006,2025-02-19T16:15:38.870000 +CVE-2024-28777,0,1,1d5dc943549daff67c52c09e8ff9cdaebca9249edb65f9a452e712c72737479b,2025-02-19T16:15:39.363000 CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000 -CVE-2024-28780,0,0,97203d55831f98cb3a22a29777c0bdd757fc3fa17fd1841066cf1cd06b59cd90,2025-02-19T16:15:39.510000 +CVE-2024-28780,0,1,2bfa8e942a53d85f2f73d60ef9a31eb458a24308571d31d67772509019f366cd,2025-02-19T16:15:39.510000 CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 @@ -255224,7 +255224,7 @@ CVE-2024-29986,0,0,9cebc6375bd62f229f8915ff69e481bc7c94824c63f186ab305a5804aa360 CVE-2024-29987,0,0,b088f25d058e7315318f51b6a3c07eb070d211a07bebf75efa1e733d2f8c02eb,2025-01-17T15:50:06.500000 CVE-2024-29988,0,0,fdcc2acd38f912b5ac21e5fcea047a785698bc825da3363822d605015d6209b0,2024-11-29T16:28:51.757000 CVE-2024-29989,0,0,c6cfa4e5c4d4e0bcbd4dd9067d2a77e4b5f1b92faef9b769900a9815a1aa29b1,2025-01-09T13:56:22.663000 -CVE-2024-2999,0,0,2ad67e6bafa77ccafcc440f8e6b2fdd38c9778d3b6a3320578b33ffe57141c4d,2024-11-21T09:11:01.453000 +CVE-2024-2999,0,1,9ee5dc56bf3706008205f20144a592adc4aba489977381f57131d6094bfb2019,2024-11-21T09:11:01.453000 CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3414,2025-01-09T13:52:27.430000 CVE-2024-29991,0,0,7497d72bd5d1a58966c800eaffa7741b7aa207b328bcb3f1a4c98147b6508228,2025-01-17T15:50:57.133000 CVE-2024-29992,0,0,cb20ee66fe5ea64bb2e770ccdd8378d7d184401d6d137f3292d293bdb502c2e4,2025-01-09T14:45:52.750000 @@ -255257,7 +255257,7 @@ CVE-2024-30016,0,0,f14e2b30562661a4ff2229a6cf966afa3e8b1b1d4a8bca3ecb33c5cb24a03 CVE-2024-30017,0,0,e67d0e79d48005dff5e96ca4240ff702a62d87cc11261645103efaa57520fa65,2025-01-08T15:45:33.653000 CVE-2024-30018,0,0,78eb900d0e305c5426aba068baa9e9085e482ce3790fb76fe45e8bca8845b5af,2025-01-28T17:15:22.960000 CVE-2024-30019,0,0,7895e4301f8329f0d3bbc3f85de5145162e754cb364ac2d6125a1780ba065c87,2025-01-08T15:46:05.617000 -CVE-2024-3002,0,0,43285269ba1ba668064835131e260faa1611d81ce919795b2f96499b7ec676f4,2024-11-21T09:28:39.160000 +CVE-2024-3002,0,1,4ac4fdd927e3ca9386eb683072b265b68cff788c7cb7589d721ccf895bc609c8,2024-11-21T09:28:39.160000 CVE-2024-30020,0,0,cc6801de5fe4e02339df6739ba20205da5b257c845d519ab27900816e8676433,2025-01-28T17:15:23.177000 CVE-2024-30021,0,0,32ea6e2004046ee2f59a5edab463b3ea0b497769e657e3bc75984d5c4fada69c,2025-01-08T15:46:36.790000 CVE-2024-30022,0,0,adc9bed26322e1b6cdebce6ec02a5a280b16673d9ee8734b490ac0aa670b6fe4,2025-01-08T15:46:52.783000 @@ -255267,7 +255267,7 @@ CVE-2024-30025,0,0,59211b3148d41d5f2d1591e205eaddafb7c2881bce7db47b5f2828dd1e258 CVE-2024-30027,0,0,2453006bce839a4dccec64751f1915bf46ab8c1dbcaac05cd82e943729c9e722,2025-01-08T15:47:32.647000 CVE-2024-30028,0,0,528f9a241d54b5d0a61f7ba5959930a7199b44f51e4af6dc146f70726a6a27fa,2025-01-08T15:47:42.203000 CVE-2024-30029,0,0,757a9f3dcd31128b99ad30ab6cae35772eeef937c04086ec4ffaf707096648d8,2025-01-08T15:47:58.657000 -CVE-2024-3003,0,0,78a766eb2a27d90e6c3a6602d7b541a446a959cc45dfa310f5acc6722fa85ca7,2024-11-21T09:28:39.300000 +CVE-2024-3003,0,1,a60013a5c0589836e8287e24cef106c5b87fa00c235436370844274b571edb3d,2024-11-21T09:28:39.300000 CVE-2024-30030,0,0,37892ecdf6da58f97d739e70f80226ffd9b0d5a5e8c59bb8905ab9b418310045,2025-01-28T17:15:23.673000 CVE-2024-30031,0,0,cecb1c1d6955264ff1c6dc402bee6c96f05874b073d3e4e550eca8ab24cf7001,2025-01-08T15:48:09.667000 CVE-2024-30032,0,0,e97bc9f469761134c288d43791e05d263ad5408925711e41e3a9b4a875aeedd4,2025-01-08T15:48:37.563000 @@ -255278,7 +255278,7 @@ CVE-2024-30036,0,0,10f01c6391438dab4883c634ef797688fedda0a95a991404880cb2c671a1a CVE-2024-30037,0,0,f2d401000dd9549b2f095203aa37be55cc4c90841f711ed62b7216ea20cd689f,2025-01-08T15:50:32.630000 CVE-2024-30038,0,0,27a4c29b38257f8bcafe88f8509a9aba246c05aefab003cf829c6073e1b87d25,2025-01-16T19:13:10.340000 CVE-2024-30039,0,0,a9047a1ee3770867bedf8729bda5c6e979affd5cf6d07e8365e2142e85ac3926,2025-01-28T17:15:23.990000 -CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000 +CVE-2024-3004,0,1,7b5c0efa46554cf756c25d89671f8e557ac0ad0390e6be1e9dadb631b56ff7e5,2024-11-21T09:28:39.437000 CVE-2024-30040,0,0,03261c3b99c116e922e110c27bbaf5fe4d48138c1ab76778f292a2df9de80da6,2025-01-28T17:15:24.213000 CVE-2024-30041,0,0,f9c10cbe19f35b717577bc6764f2546acc1215ed22680df6006f57d9c2099fde,2025-01-08T19:13:10.127000 CVE-2024-30042,0,0,9544f834a0b92a843308b4d5510959960649fdfd12e3981ba713ba27b676a4c4,2025-01-08T18:59:45.373000 @@ -255610,7 +255610,7 @@ CVE-2024-30374,0,0,5750c84f0dfce3e388704bb4ab938fe04de20050b059190da07191e8eeb9b CVE-2024-30375,0,0,cb0368348c49f86546e5f7857b0c0a61bb5922fbcf3db6a88e5f77172355ae24,2024-11-21T09:11:48.357000 CVE-2024-30376,0,0,2248943ee02f5c871a122c8a9507747e520818300358783dbb175412597e8e17,2025-01-09T16:08:38.383000 CVE-2024-30377,0,0,5fedfa7ad2f481f3b5188ccaa34065076e4b733235d8435732180716c5e929f4,2025-01-03T20:46:41.177000 -CVE-2024-30378,0,0,d71d4638dbc6eba8bae8051ca94bfce66728e9312382c0209d27d8a1be3871f7,2024-11-21T09:11:48.497000 +CVE-2024-30378,0,1,6c05c483ccdbc02d1c9d5307f68676a265d217ac816dc6149ceece776a5586f3,2024-11-21T09:11:48.497000 CVE-2024-30380,0,0,722247db4c6105cab301e6e2a3eae92f925a25039ea68fefb4767dafd82d0699,2025-02-07T20:17:11.053000 CVE-2024-30381,0,0,16af65d0f620fa329a4ee8e3a262a00f313455370e8bb1cae2f8a98e8cb8cb80,2024-11-21T09:11:48.810000 CVE-2024-30382,0,0,f8f31571180ddbab9dad1368968a8345df42a3a90337a215255038387c9e251d,2025-02-06T20:37:07.020000 @@ -255619,9 +255619,9 @@ CVE-2024-30386,0,0,4d8ec9d857c9c5ef282c36e0a02ab3bd6fa3140022fc89c222f4cbca2e5fb CVE-2024-30387,0,0,442c52f07c4aa85d8d9ef9c5b8a4e6ba01c1c49beddf02d669c87aa52fde1be9,2025-02-06T20:36:42.403000 CVE-2024-30388,0,0,5479ac57a7690c3084c8bf7194ef0ec8ee2438e646028ad3b05b99d3fd987b6c,2024-11-21T09:11:49.483000 CVE-2024-30389,0,0,39fee6ecc8931e1cffcb0f3c13f2220edd58929a510e916fbe78c4f4aef82884,2025-02-06T20:36:23.717000 -CVE-2024-3039,0,0,f8c1134c02cb56fcdef93cfda91853c6b28b369a533ccc823dc09c5759efd6cc,2024-11-21T09:28:44.357000 +CVE-2024-3039,0,1,b6637a79cf40e33cece608003a7dc15042e08fd816c9de2d2c459b9732a0bdfc,2024-11-21T09:28:44.357000 CVE-2024-30390,0,0,dca042fc0915c2bbee31c03663258f0e3497326d1c45b0b2c7e17bb0b9a50230,2025-02-06T20:36:12.843000 -CVE-2024-30391,0,0,26463ded791348d93d472c555f39d23710f07b99c228bda423ecaddde8772c30,2024-11-21T09:11:49.877000 +CVE-2024-30391,0,1,81b7a0d141487d2a17e6b889272799a52101d557e37b75679a9277d4e16ddc84,2024-11-21T09:11:49.877000 CVE-2024-30392,0,0,b065ca165687360d84ba02e43d04835f798b47b0cd57f527ccc64d72d770e70a,2024-11-21T09:11:50.017000 CVE-2024-30394,0,0,282a1d5b5196375d15831e6bd393cab1f623bd77958f81043f7297f549a1ea27,2025-02-06T18:39:12.470000 CVE-2024-30395,0,0,78b53f43de2e8d4fc94e7e6cfa8d455e8d1b61416414b6cb165d9e06dbce8f2b,2025-02-06T18:39:02.430000 @@ -255631,7 +255631,7 @@ CVE-2024-3040,0,0,c8af8750a613f5187d04c39a0bc66acbf0b9fe72661c80b26586a546c32e80 CVE-2024-30401,0,0,e66f9f288671cc268b0bbabbb0c77a681bc7fc825f4f062725eca8cb61117058,2024-11-21T09:11:50.720000 CVE-2024-30402,0,0,11bf8adf636354ad51e53c009b313389d2ed4942885d4bcb54d9b2c57d81a8c4,2025-02-06T20:35:36.530000 CVE-2024-30403,0,0,dfa24a06bbb67d392236bf8e03f84105aeace41af9511fe3103480265eddc2e5,2025-02-06T20:35:23.557000 -CVE-2024-30405,0,0,93ca037c766cfbea85d792ad3da86ac2017744d3b9276fae2ab082c4c193089b,2024-11-21T09:11:51.157000 +CVE-2024-30405,0,1,a9ab3813e43a3d7c10a9c17edef56734d918eb60510eb44e36860f11f32b7375,2024-11-21T09:11:51.157000 CVE-2024-30406,0,0,263c121b9935ac1f0cba68507fa3ddf84f6f74b8de0b1d32637ecd0e25ab0902,2024-11-21T09:11:51.300000 CVE-2024-30407,0,0,3406d1368ddd83e61968965dc4c4570bf87e9ccfa14bdcb20ff4987c446bc626,2024-11-21T09:11:51.440000 CVE-2024-30409,0,0,402f5335486175569efe57a40ebcbb8d4d027fe6871c2eb8345aecfb1a962d50,2025-02-06T18:32:50.510000 @@ -256947,7 +256947,7 @@ CVE-2024-32167,0,0,cb4f69058b5157952ca42b4b0dff18755b8866e500c0e1b176d4a09ec4484 CVE-2024-3217,0,0,568131edae431aad089ca604dd56a8e6db1af2d40a05045878243eef38ec2407,2024-11-21T09:29:10.137000 CVE-2024-3218,0,0,81581ac92c0291d6ed71dd9b38de9b17941e2f3f078e37375ed0e3bad56cd497,2024-11-21T09:29:10.287000 CVE-2024-3219,0,0,613f24a90b9d07df734e813c77dec022a198bc783ddf69b77ff7279e0db84b10,2025-01-31T20:15:31.547000 -CVE-2024-3220,0,0,cb62f35fb890d6a2137630b575bdebb720f057fb6855e72ca11d364191332ae9,2025-02-14T19:15:13.770000 +CVE-2024-3220,0,1,f6355640a7171889b8de1bebcf284fdd1136242a3bddba3b38f9b737eda6418b,2025-02-14T19:15:13.770000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,82de9fd2512155ee1b039d671013d0c708a38fc533bf235bc5023a60a9960005,2024-11-21T09:14:35.290000 CVE-2024-3221,0,0,8a3e7967f04a5cbc8644aa96bf5091869ae98ba4f981da9454c554a2fb9431f6,2024-11-21T09:29:10.600000 @@ -256968,7 +256968,7 @@ CVE-2024-3225,0,0,1702654e86d9615f0cb87e717b5ca06a0ba87dddbca38a637d31aa56e7bfc5 CVE-2024-32254,0,0,27db2cf4047461feeb9a479dba4cf663e9a27869b2fe97e4d3048977601a013e,2024-11-21T09:14:37.663000 CVE-2024-32256,0,0,e878fe31c26ddc2ef1ba0d5960e20d26b67e4ede83d59e4dfc5d31992bbd2f30,2024-12-03T16:15:21.697000 CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242344,2024-11-21T09:14:38.023000 -CVE-2024-3226,0,0,6137e2be65e3e5cfd5dce34a9ebd096d7888366da9bc23cca1d9d74fbf5416e6,2024-11-21T09:29:11.320000 +CVE-2024-3226,0,1,c18862886a76639d8d03fb464275d0bdc03e9833195678ec9094fa22ad19c9cf,2024-11-21T09:29:11.320000 CVE-2024-32268,0,0,4220b068189651923e7c03eaebbdaa1016b5566433d5df81372417a7a35be918,2025-02-10T23:15:13.667000 CVE-2024-32269,0,0,946bbdfbb629e9015a5d3fff72eb7016b39f3bb020c4b6fcea1e2b24974b3684,2024-11-21T09:14:38.380000 CVE-2024-3227,0,0,28a05cffb436fab86b4dee105af0c7bd6e6a85e8028ebc28c7f55daea5c039c9,2024-11-21T09:29:11.463000 @@ -258101,7 +258101,7 @@ CVE-2024-33686,0,0,3afcd6cea304556460a374d9713cea2e14cef1e01eefca9f1328446ed4166 CVE-2024-33687,0,0,142b66e7141e111151d7a9c222f1e47168f88d38a8bd47addc899af54426500c,2024-11-21T09:17:24.363000 CVE-2024-33688,0,0,457aa3c6a8bf471d023c378e0adcb6907f2b6ce5990a04eef4fa7a062571ec27,2024-11-21T09:17:24.550000 CVE-2024-33689,0,0,0bc0392661c86cc6937d68a94c0d3c236dc897f938e4765a8cd55f48ae118ddd,2024-11-21T09:17:24.680000 -CVE-2024-3369,0,0,b76af4bcb43a399a44faf76a3826736980ccb6aa614d209089c17ea62f37f6fe,2024-11-21T09:29:28.630000 +CVE-2024-3369,0,1,ca3433dacefdb56a9407c28d6496d43c2bbdd048156a2d211e23d3e6e74cf101,2024-11-21T09:29:28.630000 CVE-2024-33690,0,0,008c538ee3e33963786d09aabc2681e74651f5e2046951ce2958567ff70041c3,2024-11-21T09:17:24.803000 CVE-2024-33691,0,0,b96b56c17cb3964557c2b2e5b79d38d0f28edf82927cf0798e5af6c9cc9b4b4d,2024-11-21T09:17:24.923000 CVE-2024-33692,0,0,15f945927b827862bc222b3b20b31185c330bb09e0997f4d27e79be4818771a2,2024-11-21T09:17:25.040000 @@ -259068,7 +259068,7 @@ CVE-2024-34923,0,0,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5e CVE-2024-34927,0,0,cb7df4b23e37ef549254c4db52a0e18c56c7a16df31685fb7ebea0fb3b9c8f5b,2024-11-21T09:19:33.080000 CVE-2024-34928,0,0,6948ff991ad71f88113604cf8e5ed2ff9a99ec59c0c7d23553d5f536b5e99167,2024-11-21T09:19:33.307000 CVE-2024-34929,0,0,cdb28d9c0a1ab2a147a8dd483f6b655fffaa9c560bdb240a424b6286cdaeea56,2024-11-21T09:19:33.527000 -CVE-2024-3493,0,0,d7accf07a717e8e730f42819db0aa1996f214f9f87037f32b55e1edf530f8067,2024-11-21T09:29:43.297000 +CVE-2024-3493,0,1,8c2135a0b79fd83a64756990f188eb4d4e868186d7be146e3cf7118657196df4,2024-11-21T09:29:43.297000 CVE-2024-34930,0,0,8e4758b04d182faf35af8d2d8b4d7bbb7a23c5e30ded31cb3b36806e3a76b69f,2024-11-21T09:19:33.760000 CVE-2024-34931,0,0,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000 CVE-2024-34932,0,0,fa667bc8efec7742ae79a7e2235ccec724f4d66353f90714c1639179a2bb15ff,2024-11-21T09:19:34.150000 @@ -259248,7 +259248,7 @@ CVE-2024-35221,0,0,a693e5a9b7263830da1a0be75d2a5150e9819fe125e9d95c5ec699dfb387d CVE-2024-35222,0,0,7a855322bd1a78463001893b531506556efedaadeaade99870064ce7c7dace13,2024-11-21T09:19:58.127000 CVE-2024-35223,0,0,77b9724ff2e79b10a4c03468e58ceb2eb347f090165a75b0e3338e55431f932f,2024-11-21T09:19:58.247000 CVE-2024-35224,0,0,7dff480f26c21edfb3831751d7f0fa9b05fb6a9c613bb2deba47eb5d9e73aa3c,2024-11-21T09:19:58.373000 -CVE-2024-35225,0,0,f8b0cde1d30cc323c7eca816c762b9f623ff0b17c57cbb638b7a1605ecfd7890,2024-11-21T09:19:58.493000 +CVE-2024-35225,0,1,088161d8d9d6a3c474b3d519f5855a3d0f55fc9362a11ac81a23088e5cfb1cf1,2024-11-21T09:19:58.493000 CVE-2024-35226,0,0,0cd62053ea6f908549b56ebffacdc7940d690fd6d1988ba9a5b95106a44433a3,2024-11-21T09:19:58.633000 CVE-2024-35227,0,0,f603064d312bdc0236cec2fadb9b100a9b378e884da8c1127fcb9b11919670d5,2024-11-21T09:19:58.770000 CVE-2024-35228,0,0,71272b772368179098bc4880da40d61506624e75d28f6489fd71d5eca6523168,2024-11-21T09:19:58.907000 @@ -260999,14 +260999,14 @@ CVE-2024-37355,0,0,232a4434f17e0bc8751d82efdfca0c13f1c3ff54d2c9e7b03357ee342b205 CVE-2024-37356,0,0,4fe4d4a17eafd229e9050e6753d570a71ec28698aaa6438baa1abb86c96de84d,2024-11-21T09:23:42.667000 CVE-2024-37357,0,0,fc7134e6eb69001209ce08e10f760d544b4fb396e8ea209636530f56b5eb787e,2025-01-14T16:15:30.027000 CVE-2024-37358,0,0,d63f36f666a30bc5a531bdee61d9493741ce80a82a2db30dba675779712c5b7b,2025-02-06T12:15:26.343000 -CVE-2024-37359,0,0,0164b4be005f853818bcdcce258948ef3b9e1daade18f9e2f8fca5b602fd2996,2025-02-19T23:15:10.330000 +CVE-2024-37359,0,1,789db59c257ac335405184c50381aa799a7ea320369684474de4bf9a4c002f9e,2025-02-19T23:15:10.330000 CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000 -CVE-2024-37360,0,0,a4091fe21f26d9058b42d48095351e79c48d46ff5ddb54aa2e6a91e3943ae007,2025-02-19T23:15:10.537000 +CVE-2024-37360,0,1,5082ff7bcb3d3cb8e7a6a50f56c1c06d00e3711bdafd99885977272135bcb967,2025-02-19T23:15:10.537000 CVE-2024-37361,0,0,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000 -CVE-2024-37362,0,0,bb8cf118a60dd5876d1853971fb911924b6e1d70593c134cd474c796067a2140,2025-02-20T00:15:19.630000 -CVE-2024-37363,0,0,82ca42c41eab0f0de2c367f2c6182f5bcfc400fd0a5fa6cd33611ca15fd803e3,2025-02-20T00:15:19.750000 +CVE-2024-37362,0,1,83167a22b111f5895d453c1b79eefff13150b2a5b22bf7942212bbbdede629f6,2025-02-20T00:15:19.630000 +CVE-2024-37363,0,1,bd52abb9ec7cd64bd5fcfc0b83596e2cd7f295fbfdf513c13fce35852329c19c,2025-02-20T00:15:19.750000 CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000 -CVE-2024-37365,0,0,92f445546c97440aae8023b82925d87a3f96476cde45f92ebb44b9fbc714aebc,2024-11-12T15:48:59.103000 +CVE-2024-37365,0,1,715a7173ed24ad78c72a2eaa34cdc27d58748f5bcdb9e7b3393f122f9ca45e02,2024-11-12T15:48:59.103000 CVE-2024-37367,0,0,88c1db1326a2055c257859218d9a7d519959cd2a9d0833a8fb70cbf5ec4953b1,2024-11-21T09:23:43.120000 CVE-2024-37368,0,0,c85c2881cae369b108da51572f6eb52c147289ee20313d0234d33843e481a157,2025-01-31T15:44:29.627000 CVE-2024-37369,0,0,9f6d6c014e0fdbc6aa79f6f240aab14af463b5cc8d0f0af8fe35317442fc125b,2025-01-31T15:45:19.597000 @@ -261224,9 +261224,9 @@ CVE-2024-37575,0,0,fb41a93cda92e423debc2a813128d4d353bf25b2fe44666c8d6cd43b5e9b3 CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9b1,2025-01-02T19:04:15.777000 CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000 CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000 -CVE-2024-37600,0,0,ddbcae7fbc14a550ac4bc4a22e786b186115bf006884f2010b7cd244187382eb,2025-02-14T21:15:15.253000 +CVE-2024-37600,0,1,5eea13ef3423ff4c2dd7285cc23490e1b84c0133cb3b7e34c56a24ff367adcd6,2025-02-14T21:15:15.253000 CVE-2024-37601,0,0,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000 -CVE-2024-37602,0,0,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000 +CVE-2024-37602,0,1,affe7addab1c572a318248afd4351e23cc399120b600b4c482b558afa61c2e6b,2025-02-14T17:15:15.447000 CVE-2024-37603,0,0,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000 CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000 CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000 @@ -261798,9 +261798,9 @@ CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f7091 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000 -CVE-2024-38316,0,1,f0f7d4868952b9ebe63cc68b669b123ed9d87382a6cf3ff50cd8b92982309add,2025-02-22T21:15:34.937000 -CVE-2024-38317,0,0,a05b76f8d0d39a5a54de8123fa1133391f93806d6ae27880b27880b9af3bea8f,2025-02-05T23:15:09.407000 -CVE-2024-38318,0,0,4bf8d34e9a88e56cc6923122e607a3d4d0eb45a05823a692769d300db93ecfac,2025-02-05T23:15:09.557000 +CVE-2024-38316,0,0,f0f7d4868952b9ebe63cc68b669b123ed9d87382a6cf3ff50cd8b92982309add,2025-02-22T21:15:34.937000 +CVE-2024-38317,0,1,ff1193f3e26eac9444d8f0239dc9d9e4dcfebee720d04d63c8ca17238355b963,2025-02-05T23:15:09.407000 +CVE-2024-38318,0,1,c83f9a98b8738ac6a90d3cfa78d51ea8a5ffd1ac962a8c51366662c33a9b321a,2025-02-05T23:15:09.557000 CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000 CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000 CVE-2024-38320,0,0,4bb869c8ea82ab12a47183ea9bdc7cf49478a8454232d78ccf2ee6bb1582e818,2025-01-27T16:15:30.973000 @@ -262283,7 +262283,7 @@ CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a793 CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000 CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000 CVE-2024-3881,0,0,38ab6d7d284c0ca3e6b9161a425cbc55ade2a75172ea4255ce3e799638ef4528,2025-01-27T16:25:02.423000 -CVE-2024-38810,0,0,5eca7ced7ced269f1d8b6c6c4298e21e756532564a3f32db8863a6f0cdf6c0d5,2024-08-20T15:44:20.567000 +CVE-2024-38810,0,1,495fe4d9a7892030ee02a262f19206840747dc6dde54a88f222c4286414b0e11,2024-08-20T15:44:20.567000 CVE-2024-38811,0,0,e90c16a207e5ff636d7114e5326f61042c05eb2d83b5698a9b4fa38a3dcbf1d3,2024-09-17T13:33:32.957000 CVE-2024-38812,0,0,2e704a7e06ecb019d5085676217a7390700a3558f717063ea75069351632bd32,2024-11-22T02:00:03.353000 CVE-2024-38813,0,0,1409084c41adee72bdcf9934e18e7da6818185b8a3db90d337d0b96891a93438,2024-11-22T02:00:03.353000 @@ -262566,8 +262566,8 @@ CVE-2024-39323,0,0,7e22b917354a2e5b4799a1cef4baf0b8134a833606bd812ba695ac22ead63 CVE-2024-39324,0,0,5b58097cc0f94f554b16fabf13a1485b606607c6996b61ebbc380a66c6ed83bb,2024-11-21T09:27:27.850000 CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae60e3,2024-11-21T09:27:28 CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000 -CVE-2024-39327,0,0,aa9855e49fae8aaf65bdcdb0f5a6fd291fe01f74f32303653588bdfaf2376f5f,2025-02-18T17:15:18.440000 -CVE-2024-39328,0,0,999715163280e41f87d85d36eca13d26fe12599227ecb0f578555a4cc2b63ea6,2025-02-18T20:15:18.533000 +CVE-2024-39327,0,1,e159be83e6a94153f601fb799404945de5dc140717e6d7b503fe782ee2eecfa7,2025-02-18T17:15:18.440000 +CVE-2024-39328,0,1,a00e9dbdd3e55bbdf614ef0ad9d1cf5f35291f7ebcc2655205839e9683cf46cf,2025-02-18T20:15:18.533000 CVE-2024-39329,0,0,7ff8e254c337ee0bc8d4995df77a5971be90342987fb55e2cc6c6590b4df097e,2024-11-21T09:27:28.300000 CVE-2024-3933,0,0,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000 CVE-2024-39330,0,0,fbd31b5b3e2b3f2feac33fefc5ce863bbb8e247faa0695e58548f2d114ee1657,2024-11-21T09:27:28.523000 @@ -262751,7 +262751,7 @@ CVE-2024-39514,0,0,213d785aa625cc5d5db3b13a968955ba7e45330fd13304016a2f53f6d1859 CVE-2024-39515,0,0,bc03dd8d113d65337da081dd26235d2299c7491868e58f1ea6c3319dc28dc7b2,2024-10-10T12:51:56.987000 CVE-2024-39516,0,0,0ad21d261e5f9b7478e87b848256e978776342f2df2d3ed9e8a9e397676304e1,2024-10-16T22:15:02.943000 CVE-2024-39517,0,0,d240f51ba4efebdbfca4a3eec63e29aac63704f46678cd23a106ee2c9f9e8a06,2025-02-07T19:59:34.660000 -CVE-2024-39518,0,0,7b3a7e62c1acdae8a25dcb0c472fa8d11c0a4d7d543fdae3d88c39f02230404b,2024-11-21T09:27:54.567000 +CVE-2024-39518,0,1,e14b4e35d61cad76e2dbdcd5736941951a377fda7a6a8995e2681fe613af86e7,2024-11-21T09:27:54.567000 CVE-2024-39519,0,0,82199d52720538c0bcf6aa360ee905de89d60f551154e683e3a5b187cb4e7af5,2024-11-21T09:27:54.717000 CVE-2024-3952,0,0,96f6f37f7eea2038c3e263873348f7ce855f5a4c9f63427ae2345ef8e8d037ec,2024-11-21T09:30:45.937000 CVE-2024-39520,0,0,d8a67be6c55c0761c5240da3e94c49377c33e0dc9df033c893f6ff18f66e9a18,2024-11-21T09:27:54.893000 @@ -262773,9 +262773,9 @@ CVE-2024-39535,0,0,5d67b38c02f98e745cc8eb5481b9722c64305d5b562b0327f0da191b27abe CVE-2024-39536,0,0,10bf777060d8cf7c3a8b0f16b8b3d3a51f864eb3191a093987658b8b6661dc7e,2024-11-21T09:27:57.373000 CVE-2024-39537,0,0,dcca190952730a29801ae7622e803549fe5ca40712d1b07470e8aa7d7476a769,2024-11-21T09:27:57.533000 CVE-2024-39538,0,0,f665a2ea4c1716ba0c6d9e17c82886c21678064d7a1668392fec98370e9dc760,2024-11-21T09:27:57.707000 -CVE-2024-39539,0,0,4521e93a7d9fd251d30ce26c63ef5696c704f585c7a61b45412454e786d0836a,2024-11-21T09:27:57.843000 +CVE-2024-39539,0,1,93498866a4f9e5296b0c8edaf28a45a34a4a518d24b12a87796bfa9d931d5624,2024-11-21T09:27:57.843000 CVE-2024-3954,0,0,81a57b3b12243c29f71dd87070c24e26c50f4db513af81e3652558e1ed14589d,2024-11-21T09:30:46.053000 -CVE-2024-39540,0,0,d17cbea800fe887b257251e6e3ab1ca3b458f61b9408903d19e140a5873f8955,2024-11-21T09:27:57.980000 +CVE-2024-39540,0,1,96d4d93ff65f3a93f128d3e4e6b34d6b484982e20b8153da94c0a53a3c6a69a5,2024-11-21T09:27:57.980000 CVE-2024-39541,0,0,bd0f5d5de74009fb19b9a1e539de6cf8bd9a6b1cc3ce00a0e20a6e1ac1f55cff,2024-11-21T09:27:58.117000 CVE-2024-39542,0,0,893cfdcba7a097f33eb251422686caa1e952722b4dd0eb2dae8f7e0bc1d5c803,2024-11-21T09:27:58.267000 CVE-2024-39543,0,0,7073df80c80de2fb595aa774ad13ed30ecd0d17e2c34b642b07f268dbfb04281,2024-11-21T09:27:58.410000 @@ -262786,7 +262786,7 @@ CVE-2024-39547,0,0,72a69468dac487b78757f50511012a98aaf458ce45568aacceb40d851ab3a CVE-2024-39548,0,0,00d1ac82027bcda3877041fe6103003744ea7cf004a87b68ebf31d26ded64f37,2024-11-21T09:27:59.110000 CVE-2024-39549,0,0,23a50147460b80253dc35b26c53048290844ff9afa1b4f615b8729c6d7103e9b,2024-11-21T09:27:59.253000 CVE-2024-3955,0,0,9ccbfcdde1791dbaf6c66c27a286687ea2d0d3aae3cea4faaedb402b144ec8f4,2024-11-21T09:30:46.170000 -CVE-2024-39550,0,0,3a95d1cd72921dbb66208f056506cc5861e7a177279861897ce5c14de0804a43,2024-11-21T09:27:59.427000 +CVE-2024-39550,0,1,823b7b012c0ef31402f4c2a5ad93b42bf17a7162342b8fb4d96e743cc96ca10c,2024-11-21T09:27:59.427000 CVE-2024-39551,0,0,289525e446281457e7927e9eeba0918433b441f940ae0e632d56c5da6eea94e4,2024-11-21T09:27:59.563000 CVE-2024-39552,0,0,f2b3a6a7d86a5d7ae40d2f0ae34732589623db2b52c7bf0b06e94a2269f70a60,2024-11-21T09:27:59.700000 CVE-2024-39553,0,0,2b1da78b9845ab194d193bc33f87e208f3e94dedb192e56176e46d377c02df4a,2024-11-21T09:27:59.850000 @@ -262798,7 +262798,7 @@ CVE-2024-39558,0,0,2ef8ae2952056e7474bb516ebb50dd7d3c1ede728863ff831f09c102636d8 CVE-2024-39559,0,0,97166beed2c407b4567a3842bcf9654f82a1deaa263f906bdd7bb81006f1f86d,2025-02-07T20:06:04.390000 CVE-2024-3956,0,0,5b541dd3dc9c98939a4ccba4319e69708e56247d2bd66fce94cd154d980fae8e,2024-11-21T09:30:46.370000 CVE-2024-39560,0,0,88eafacaed1840d39a37f33beb4e76b0e883f299a72f71f2957d33fda68a23f5,2024-11-21T09:28:00.970000 -CVE-2024-39561,0,0,129105f153bb211354d859daf2f1ec70e81851adc189be0ea8b99636fc1c328c,2024-11-21T09:28:01.113000 +CVE-2024-39561,0,1,610bae392228f2a824a8dcb6934eaea942bb10cdb31af3d2bc68e0b30c118cf2,2024-11-21T09:28:01.113000 CVE-2024-39562,0,0,5a2127926798bc04e33036e0aaea6d51bd2b1aa48ba0d1b8ac2f5559a1f75d57,2025-02-07T20:05:34.960000 CVE-2024-39563,0,0,e4017fb4c173cbef6fa8e4a9d945f6c438b962727d3cee4871551dc266a31030,2024-10-15T12:58:51.050000 CVE-2024-39564,0,0,8877154739dbe900c1162635bc186a1ae9afa9fe69cb2ed00ad12975499c990d,2025-02-05T16:15:40.270000 @@ -263228,7 +263228,7 @@ CVE-2024-40239,0,0,ae12c56ee9941f755c16494c8dd5bdda020fbac80ab12acdfb5936223e53e CVE-2024-4024,0,0,a77cae97d384e849e77184d79ab929b86d552816a3a00262f6d8dbbc8bdf401b,2024-12-12T16:52:12.103000 CVE-2024-40240,0,0,aeed04cfe484a1b1358812993c89c6f17cab7b8a4f5edbb8982d767f42036e4d,2024-11-13T20:04:13.080000 CVE-2024-4026,0,0,33b3d77ab9b9baca3af18c1fa45a0c153be1e97e050db1d7d75fa691b1dd64de,2024-11-21T09:42:03.233000 -CVE-2024-4028,0,0,dd195162d57e8928613af90a9d16c58e69b7ff19cec45728e1d15654a24fb415,2025-02-18T18:15:25.473000 +CVE-2024-4028,0,1,13b8c728d068bc5fb6e930fe6e90921b45c8966813ee5bb3ad702128e0b19c8d,2025-02-18T18:15:25.473000 CVE-2024-4029,0,0,df5cd0c8103e6b760c8676847fffe035d6dc3da349285ee8d2f32538714d8665,2024-11-21T09:42:03.370000 CVE-2024-4030,0,0,3a307f10ea3984c15ff103b06b7509b9645c4374d8ce702e02367c7d96ff0eae,2024-11-21T09:42:03.650000 CVE-2024-4031,0,0,c66717a29ed137320452249c910c6dc337a02df56960a90dee87aa3b86e4c54d,2024-11-21T09:42:03.867000 @@ -263447,15 +263447,15 @@ CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73 CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000 CVE-2024-40681,0,0,2b5a5c013480bd5cc87a564fe6701f318e09e1cde3fb5250634972a9f9aebf6b,2024-10-31T17:15:13.143000 CVE-2024-40689,0,0,41d3e4691112f48676cdb44eacf0cb30b856617ce94bb50310ea65e78ab406af,2024-11-21T09:31:28.053000 -CVE-2024-4069,0,0,94f7ce6ab537b8de29354ee99519ed1e16c84a745bc6420413a49d7a75f78144,2024-11-21T09:42:07.833000 +CVE-2024-4069,0,1,37755704e6042370618a05f54961c30a7858c90a31ba090c71e4da172027f621,2024-11-21T09:42:07.833000 CVE-2024-40690,0,0,ac3fd8879f79e94d956d55740e068f2d064b41dedd1ece8ce64e710fe502e9c1,2024-11-21T09:31:28.197000 CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76ba35,2024-12-11T03:29:39.627000 CVE-2024-40693,0,0,4c2fcccc4f84da1fd3dab504f015de786a85b237d58197aef3700f847f835001,2025-01-24T16:15:36.003000 CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 CVE-2024-40696,0,0,0fffaf3f9cb548de841ac140d5da7ed3f05e1de3fb6a83e7dee96c1e37b258e6,2025-01-31T16:15:33.913000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 -CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000 -CVE-2024-40700,0,0,8b4edc4aaa85574205612781de1c4b0ab2e351bdfa9b39c9eecc15bed6118758,2025-02-04T21:15:26.380000 +CVE-2024-4070,0,1,6b6ec221804b80ca26591d0c60003c7e3648b99fba591fed40129eefe3c814d6,2024-11-21T09:42:07.967000 +CVE-2024-40700,0,1,2d9c229abc1faaac1cc418f4ae90c891c929abab0867d534c439a3cc25c44edd,2025-02-04T21:15:26.380000 CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8a85,2025-01-07T16:15:33.463000 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 @@ -263494,7 +263494,7 @@ CVE-2024-40736,0,0,51155ecb708936aa1331242150e64519e136c713b0ee70c06e263e665d518 CVE-2024-40737,0,0,79eefe5e10fb289edd09328d0c7579f889f86c998d1e825eb1d399b018ac3ab5,2024-11-21T09:31:32.700000 CVE-2024-40738,0,0,0b3ba17100f1856fa9d105812907a56e1a331ebdacaaf4556b4edb4f28b681ef,2024-11-21T09:31:32.857000 CVE-2024-40739,0,0,7cb0d2e49a6eeb6bb3d9c48888fb227edfb0e06966eadac0d3d509c7bfcabd26,2024-11-21T09:31:33.077000 -CVE-2024-4074,0,0,9fadb508d4adade09f9882c39623ff488629afab8dfa881e4e93c729ec995672,2024-11-21T09:42:08.553000 +CVE-2024-4074,0,1,6e64b7de0a1ccf2581e670cd5acc75f08b261df66f93d5cda46ea07eac0345ef,2024-11-21T09:42:08.553000 CVE-2024-40740,0,0,4c17fabd2e5b453b15042867bbfcb12d2a4076855dd46ee082c2528caa82a0f1,2024-11-21T09:31:33.300000 CVE-2024-40741,0,0,b4e55bc2fa7057638eeda6d29fe079d80fdedc4e8baf29c6543af6b06257b563,2024-11-21T09:31:33.517000 CVE-2024-40742,0,0,29a5802712e54abfe0659169e906f48e1d97a2cb65a71e0978087e251001d5d9,2024-11-21T09:31:33.757000 @@ -263505,7 +263505,7 @@ CVE-2024-40746,0,0,28b5eac0696e1aa464ec2af9223be9793b0cfde2d3c3c98b18ce12186dc2b CVE-2024-40747,0,0,34091d33a31a881c140241d77e2c51a289d54f6c7a21fc83133dfd637eb5d428,2025-01-07T17:15:23.430000 CVE-2024-40748,0,0,e0ac7e4d0ecc5c823035a2f883e0bd5ed1005cbf94f0d981cdf7af18b477d98d,2025-01-08T15:15:18.110000 CVE-2024-40749,0,0,150958834a05c0d7f6a0d67d6884c443bc293f6737ff979bf9f6b11eb6280ee4,2025-01-08T15:15:18.400000 -CVE-2024-4075,0,0,6c653a7c78c4e11129adcbe0518ad6a07843b29f0e234c98fb05402925f6c893,2024-11-21T09:42:08.680000 +CVE-2024-4075,0,1,cb4464e1692b1644cd481095ce62691e28f35b0c3a214ff16dae03d67e778482,2024-11-21T09:42:08.680000 CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97d61,2024-11-22T19:15:07.113000 CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000 @@ -265132,7 +265132,7 @@ CVE-2024-42813,0,0,4b20a1ebb3665953fa718122bfa12aa762b410b6814a21600ddb5075a5bcd CVE-2024-42815,0,0,b0c824ea019918de59fd32b154af16c923b2879fc083ee857cf41b3c11ab802d,2024-10-24T20:35:07.330000 CVE-2024-42816,0,0,f48cdbf32ec6ef2592c0debfd370e60e5e7330faf2228d3c835601d4668d4327,2024-08-27T14:35:07.077000 CVE-2024-42818,0,0,bbf6360e7bfb7a58f7f9788c0da5c5644776ed691811c19b8a0e9e2b45223065,2024-08-26T19:10:18.890000 -CVE-2024-4282,0,0,a5056025112944f8006c95bf1c60ba99b1f5965db67d7c4339cbd575243b4433,2025-02-15T00:15:13.370000 +CVE-2024-4282,0,1,b3d7d3fff5e119c73d50477ca6f59f4532b176ad9aa90c2ae16a0627eaa8c269,2025-02-15T00:15:13.370000 CVE-2024-4283,0,0,dbded5b426511f413cb3237cba13f6b6ed21876c57ee55a403066620b10afe2c,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,e5405dfea4c9b102a804483b0abb1201156ebd1e129b1904b2aace628bcd141f,2024-11-21T09:34:42.307000 CVE-2024-42834,0,0,4682a7643f4f1c0d32c2822f9fd1a1c021fa496bbb8846e29948873617922a7f,2024-11-18T20:35:04.417000 @@ -265344,12 +265344,12 @@ CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 CVE-2024-4318,0,0,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b9942358,2025-01-24T17:11:02.097000 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 -CVE-2024-43187,0,0,fd33b957fe7572397f42a8a7c31de1a30c4e04d56478fd2368be62bcde069816,2025-02-04T21:15:26.537000 +CVE-2024-43187,0,1,027b184f54ed6e57a4ade4830d3c1fbabe0bdf3c1bf35d43dcc0bd27e581a9dc,2025-02-04T21:15:26.537000 CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000 CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000 CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000 CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000 -CVE-2024-43196,0,0,4a020ed7d95b50b6484595f6b9846dfb086d5a35b6921a89feff86efefe818c1,2025-02-20T04:15:09.630000 +CVE-2024-43196,0,1,3e055b34f6ea24cdde997324ee0d5c195aa0a244a6cb6a6610c853468f12cd05,2025-02-20T04:15:09.630000 CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000 CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000 CVE-2024-43201,0,0,e638a7f8526c6643b3022caa891a343f1b876f7a5aa0673ac1dcca77850b734f,2024-09-30T13:55:38.390000 @@ -266206,7 +266206,7 @@ CVE-2024-44040,0,0,74b42965e6e3986525fc77deeb0ef094e32ece4aff2cecb84f707822891ab CVE-2024-44041,0,0,40e1db2f65bd9a020f30713b0d9178a6e32ba90a0e086503a110d2a28adbf345,2024-10-07T17:47:48.410000 CVE-2024-44042,0,0,1d7bbe5f51b27e09708cc24f3986a913e72fd98931fb78d44a1cf4aa3f2fbbd6,2024-10-07T17:47:48.410000 CVE-2024-44043,0,0,5a54ccce540366e3100b03336264da52bbe72223a1a384e61c57b8debae86b18,2024-10-07T17:47:48.410000 -CVE-2024-44044,0,0,30d88de66e10ebcca8605da4e27c74f33057a2361f9e858f4983b46086f05c64,2025-02-16T23:15:08.907000 +CVE-2024-44044,0,1,e8bcae9c0a925c367758f0b128864c987427cff558dfaebdf800f9a18148883b,2025-02-16T23:15:08.907000 CVE-2024-44045,0,0,e30add326efb0689032d9e1291ab1ceb0e7cee7d7cad42f2447eb76eafa4c869,2024-10-07T17:47:48.410000 CVE-2024-44046,0,0,8cb28132dcb52c0f855cf896fc0277479d6e2fdc4d9679affa04a96ae7375ecf,2024-10-07T17:47:48.410000 CVE-2024-44047,0,0,55ccceb367f56cca0478fcf20023ed31752b3102ce8e00f651967b31bd809ce5,2024-09-24T22:05:25.723000 @@ -266806,9 +266806,9 @@ CVE-2024-45075,0,0,03a325d99e9aaae9ce6cdcda7dc19958a7d4699a1b3c50bb69b2322eb1c7e CVE-2024-45076,0,0,eb3cee64fe130784cdfbc414736fb4f58d6d633f4eb84170ae099934a833c82b,2024-09-06T16:44:52.310000 CVE-2024-45077,0,0,488142147518607f635ce7d743802f40a784f5d21ed9a2383706160f63df7b4d,2025-01-24T16:15:36.903000 CVE-2024-4508,0,0,7ab716d1977417cf41aa4b0c86b8c6174f947212dc2b37b9a7b838a9393e9bd5,2024-11-21T09:42:58.970000 -CVE-2024-45081,0,0,a682d09a464b709ca80fea95802ccf1ab8cffd7dbc54f5d00704f2cf0eca378b,2025-02-19T16:15:39.740000 +CVE-2024-45081,0,1,a4941ae4b9fe569289ede15a1f52d9b10384740457ad770a7a6b968a1c220d04,2025-02-19T16:15:39.740000 CVE-2024-45082,0,0,654e2014bb8a40c3daa06199b4082ee25f295dbbc2190046fcaf39d42d46c651,2025-01-10T19:34:56.253000 -CVE-2024-45084,0,0,eb48a47e0c0239a27338c18ec617446dd1a07443bd9c24a70d72cb5d92602873,2025-02-19T16:15:39.900000 +CVE-2024-45084,0,1,2d24491cc9349cf9af16e68626f5a52fddef8d0634546557dc20e5052375b3d7,2025-02-19T16:15:39.900000 CVE-2024-45085,0,0,d83665b902e695b0351a452cf13e24b78d2419ea7439e442327b57c582a16d2d,2024-11-08T15:13:11.307000 CVE-2024-45086,0,0,2d2c1612ef6e5a8ce239cd3dcdf490449d1514d9bada7d0d52c5fd5141b8d1fa,2024-11-06T23:04:04.673000 CVE-2024-45087,0,0,5a1fbae564cbb4ee2c9e115b9e60e394ba12f02ef5cac53d3fcf17b309556986,2024-11-18T16:34:23.010000 @@ -267026,7 +267026,7 @@ CVE-2024-45317,0,0,5f43c76e9ff743bd3a3e5058ccc2d1ee5b77faf16f692fa3d7b6e565fa265 CVE-2024-45318,0,0,75989837b2772ed0bee9b8d611c5c445760df07141b272a0d99d94a5a5004185,2024-12-05T17:15:11.880000 CVE-2024-45319,0,0,f54a68d148467026440ad15f341a6bfb542cacddb35ec8506cc4659fa4aa336e,2024-12-05T17:15:12.040000 CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73ac,2024-11-21T09:43:02.993000 -CVE-2024-45320,0,0,e478cfe896354b43d3025ebc3913c99bb1bf2ec6c99ae9e67f251dc1dd0d0b9c,2025-02-18T06:15:12.060000 +CVE-2024-45320,0,1,0442b28145c8544501978acfb3b5beef62859e9b576b01c0524da6ff770a7801,2025-02-18T06:15:12.060000 CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000 CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000 CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000 @@ -267265,8 +267265,8 @@ CVE-2024-45652,0,0,6254bd590ce03a9259b82c0dba15561aacbeb1df97e69b146f493975ca4a2 CVE-2024-45653,0,0,d5f910fd8739708cf51cbbec066e6e9e75fa42921b46a68d0a44ce8674d18967,2025-01-19T03:15:07.643000 CVE-2024-45654,0,0,84e0b6e2caafc48baa1b35c20875028bfa1c53921b9ea64b0881773217e0e97d,2025-01-19T03:15:07.787000 CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000 -CVE-2024-45657,0,0,cd6ce7bd5396679533d6fb9b8464015de524871bdda0dd5d3a77a5111128b375,2025-02-04T21:15:26.687000 -CVE-2024-45658,0,0,31a85bb3422a372e0b185ee9dd4ee56c4a518ef334840b7222ae3d01e2eceef8,2025-02-04T21:15:26.833000 +CVE-2024-45657,0,1,7a5eef9b925442dc8d84e1f516344c5c80c75658a7c519c6cc81634b57ca69fa,2025-02-04T21:15:26.687000 +CVE-2024-45658,0,1,8932f3a8cf0f70fa04aa4437185397d20fc6ebf566ce62ce8b08260d14a6ce74,2025-02-04T21:15:26.833000 CVE-2024-45659,0,0,0895159fe44731498b416385a0a001615f3ff6fe1f25bbc34c263b64f34b8934,2025-02-04T18:15:34.723000 CVE-2024-4566,0,0,67793534ad65df3a22647f8471d680f58a33cea10b3409d6ba3f0ab52674e69f,2024-11-21T09:43:07.400000 CVE-2024-45662,0,0,42e3213cdd9e0313fa4ca25aac2349a283b3056fe3b2b35deed0feef55505b61,2025-01-18T17:15:07.343000 @@ -267348,13 +267348,13 @@ CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000 CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000 CVE-2024-45773,0,0,fa133c6be41b30498db96f8cc8924c7e28e5e1652411403fbf684ea7526e1df8,2024-09-30T12:45:57.823000 -CVE-2024-45774,0,0,37ee52def301acbacbb98d371af17611b0ea5677ea1198727041c01080d74c9d,2025-02-18T19:15:16.387000 -CVE-2024-45775,0,0,423d1e330fa24c8a3fbd0393060a8783e9d499b35850a8dd26d803d1131bbec6,2025-02-18T20:15:19.177000 -CVE-2024-45776,0,0,385d07ec63a349d0425987122ae126e78bb9b3764f4619b43701925b16b5d728,2025-02-18T20:15:19.313000 -CVE-2024-45777,0,0,75020b4901f8aa48ceef3c75eba1368a9f6af1a600ad9946626f501af6001224,2025-02-19T18:15:23.210000 +CVE-2024-45774,0,1,a3bc5d04a61e98e194792a45ec24d92641728bd65c6c5b092588d7cc58c371a3,2025-02-18T19:15:16.387000 +CVE-2024-45775,0,1,dc9934913719b7ba371689f85d372f27a1c5a62c61667ba391c7f8d330af43e4,2025-02-18T20:15:19.177000 +CVE-2024-45776,0,1,7a04b7c7af22da1288ed82b6f5b30f15805ed4d914e4fc273482119cb2625695,2025-02-18T20:15:19.313000 +CVE-2024-45777,0,1,bcd0bab214a719b58ddcd730a7be37124827cbe868fcd457da07097e9b2f3848,2025-02-19T18:15:23.210000 CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000 -CVE-2024-45781,0,0,79b7476d3019161ae013b143cdf95cf3d9a51e7c452280778129eb9c95a9bb69,2025-02-18T20:15:19.450000 -CVE-2024-45783,0,0,01d46dbc915b4269fbd278f67c597e211642d618d31b9ab4e48748e890cc60e4,2025-02-18T20:15:19.560000 +CVE-2024-45781,0,1,a587a3b87f71b568c9e051f17c521e2c823b1cb6704713cfcb2fd1f1a495d795,2025-02-18T20:15:19.450000 +CVE-2024-45783,0,1,e4aa133b1a4c5368c5e922eb069f3b52cda2e750027d303f7902e92d25e80622,2025-02-18T20:15:19.560000 CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000 CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000 CVE-2024-45786,0,0,ee0549ab7e141aefcd79daf8b84009d14b6c1c3ba092323e36280bd57cd9e018,2024-09-18T20:12:47.337000 @@ -268025,7 +268025,7 @@ CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fc CVE-2024-46922,0,0,6bdd5d60ca2de902a066d900eb3f1a02f2bc8961d2c788d1e656cf659ba11e92,2025-02-18T18:15:23.653000 CVE-2024-46923,0,0,a9a48683084983e354bc1f2a4a7b5f585943d9f414289960054fde2cd8cee181,2025-02-18T18:15:24.083000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 -CVE-2024-46933,0,0,57ccc07d56265bc523d2c786977cdba52e4e908b0583314595a03ce4983846f2,2025-02-20T18:15:25.007000 +CVE-2024-46933,0,1,b166510b57dd4b5ed74305b1224d4b2faab441a9eb9e42a9e24950c88498bd67,2025-02-20T18:15:25.007000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 CVE-2024-46936,0,0,8b90383cd17b05972139dd51260528d7de429165343a27e0f637b90d1d54a91f,2024-09-26T13:32:02.803000 @@ -268927,7 +268927,7 @@ CVE-2024-47925,0,0,e85657cf2064d6c6e6af79febd3acfb5604d99d861da18ed64400f723839f CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861dde,2024-12-30T10:15:07.380000 CVE-2024-4793,0,0,71c105dd8a23544d38a6828e9fb69e3f3c6b237924652b6cd022ef685b41711f,2025-02-20T18:23:45.077000 CVE-2024-47934,0,0,c5ee21e51979d89f537acbabceb77f32a9e51b9036a475c6fa323918ce911a01,2025-01-08T03:15:08.550000 -CVE-2024-47935,0,0,dda26a62a7bdc994f9b4a9d9391e631773aed6ff22c30899552af9731fa1f71a,2025-02-17T06:15:13.053000 +CVE-2024-47935,0,1,a34dbd49d1d8c6bc9c44340528f7c520c3c935780b149b7b1e91ee136c1115f2,2025-02-17T06:15:13.053000 CVE-2024-47939,0,0,56807ff489784cf4fadb2e00da7b797597c1ced2e2c98f8bd3c06e8fe447a672,2024-11-01T12:57:03.417000 CVE-2024-4794,0,0,d08d4c149975b67912d030422dddd09703cb9e1751aaae9789bc33f4c754cfb1,2025-02-20T18:22:57.657000 CVE-2024-47940,0,0,13d7c32b7f73c4e4fb7631fb34c565a5b9a53b3818e0802f4a7c760b1b5809b8,2024-11-13T23:14:54.567000 @@ -269639,7 +269639,7 @@ CVE-2024-49226,0,0,8b039bf61f792f56c90706720d258255d8df3f4f240d45c648d9f0747fff0 CVE-2024-49227,0,0,98cab12bd6c66ae41da2bcc8629f4f7f29bc4be754ec100983ce3733879dd1e2,2024-10-16T16:38:14.557000 CVE-2024-49228,0,0,acba4297b757460f4568b626bea11344afc987a3267d44de870e94adf9e4ec7d,2024-10-21T16:34:41.267000 CVE-2024-49229,0,0,0353058f3f83fca46abe27d492b5b63a6531a6fa0d267a03ef7aa4b6ab176597,2024-11-06T20:40:30.740000 -CVE-2024-4923,0,0,73a45ee83c48943760e8b2f496278466680c3e3633145bffcf9e6645938a9bcb,2024-11-21T09:43:52.737000 +CVE-2024-4923,0,1,da18d3c3cca59e2f60e43bf91d02cd0f1cff0827dd029b143dd364d6ba6acef8,2024-11-21T09:43:52.737000 CVE-2024-49230,0,0,bd9844b65817f448403444ba81d1c98e57386b7d336e51dd55277128cf3212fe,2024-10-21T16:37:15.807000 CVE-2024-49231,0,0,7e52e9fed38ee4e1078fd49029dc147b433ea5d5e66affa1aa88bfbaab9de2dd,2024-10-21T16:37:46.010000 CVE-2024-49232,0,0,98e24597b823abe77600cce3537bf6c60d7503153cb5f3dda0e30102525f2e57,2024-12-05T00:15:19.063000 @@ -269756,19 +269756,19 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881 CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000 CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000 CVE-2024-49336,0,0,74b5d6ca5a527605069a19da7232fb13c834e91072ba01d322d091e1df5fa9ca,2025-01-06T14:29:06.027000 -CVE-2024-49337,0,0,b8a48e9bc9ebd77c2dc1ec454f60e0193d7bbfcc795cf49651cc8f688caf1ce1,2025-02-20T12:15:09.293000 +CVE-2024-49337,0,1,fa6691cebe8657de04b0e854a4d160b6e0915d7987d3cb0ad9eb5fe02e7ac757,2025-02-20T12:15:09.293000 CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000 CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000 CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 -CVE-2024-49344,0,0,ca18aede5d136da2317880edebac0e451734c847e5f1c23223bf9f5d6708ba72,2025-02-20T12:15:10.377000 -CVE-2024-49348,0,0,0c6cdfcb5307c005a68c1aff02f6722c257087813897611dd4477d2e900a8fa1,2025-02-05T12:15:28.570000 +CVE-2024-49344,0,1,57ee192331f807434bcfe23676c3028d1aebe4b8055056c49698195bfe865f84,2025-02-20T12:15:10.377000 +CVE-2024-49348,0,1,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000 CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 -CVE-2024-49352,0,0,5b54f9b75518511305c412ed74c5838fc4e1568e8431a075550c1b801ecdf820,2025-02-05T11:15:14.540000 +CVE-2024-49352,0,1,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000 CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000 CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000 -CVE-2024-49355,0,0,8b38b03596da340e2134fedff5517cd6778fa94a8e4954d71df54ae23c048c08,2025-02-20T04:15:10.670000 +CVE-2024-49355,0,1,ac8ff7ecca3d99828a67a67e2b417fb81b3811531caca2fbeb8cab9cf13693c4,2025-02-20T04:15:10.670000 CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000 CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000 CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000 @@ -269912,7 +269912,7 @@ CVE-2024-4958,0,0,8a8c67bc903e1a46ad33f1a53da00f2ab4fc5b43d3db7efb6913c74195b267 CVE-2024-49580,0,0,3616bf5be4f69eda17b61f84b4b764987072fb4d926e0d601ddb18e72d10c716,2024-12-06T14:15:20.670000 CVE-2024-49581,0,0,fc04f235634cee9bbda44c07dedbe542398bc35eb960d06f033e42ad0e6ba09e,2024-12-02T21:15:10.830000 CVE-2024-49588,0,0,c0da3a5f349cd3c67a8d63a4235e951da64ca910546e63aa78047573574ef33d,2024-11-21T20:15:42.707000 -CVE-2024-49589,0,0,76d9a956eef2f7d484ddbd1aa778d49d6887de3c08f455059493ba9480071c57,2025-02-18T19:15:17.670000 +CVE-2024-49589,0,1,0b6951e146d4acb045f5b82ebf3cbfd74a3604da1497bc2887597b38b601b393,2025-02-18T19:15:17.670000 CVE-2024-4959,0,0,0b1acb96710cbb6b752fcc1086e21a77c5901c1eec006db8a6dce25dccf4805b,2024-11-21T09:43:56.943000 CVE-2024-49592,0,0,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000 CVE-2024-49593,0,0,20effb99bee61641edd5d332c453463760e6d2b9681276cd06a2523441d82150,2024-11-18T19:35:04.960000 @@ -270083,20 +270083,20 @@ CVE-2024-49775,0,0,f7b107fd90967d0f5ebc9cc515008c8fdf5fb3cf128e6b60db0d23183670b CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 -CVE-2024-49779,0,0,6486604c5d581ddf3e0f3b056e09f87bff8e5df54f940cc2f474c3313bb68c34,2025-02-20T12:15:10.527000 +CVE-2024-49779,0,1,ddd00cc70dce6b265be2061f24ae0ad447bbb2fe2af097669f4aef0757f0da40,2025-02-20T12:15:10.527000 CVE-2024-4978,0,0,de30ddfe983833699ad8e2f2543285ea22a567f389ca513dff29646a99a121fd,2025-01-27T21:42:09.123000 -CVE-2024-49780,0,0,fff55ad4626a9979eba41a1b34d4616290f7d231f0b1712eef7696601dee4fa8,2025-02-20T12:15:10.657000 -CVE-2024-49781,0,0,fa870178578d49a4bc6c9e50419c3540ba055f41fdaf4f69f475d0a8908744f6,2025-02-20T12:15:10.747000 -CVE-2024-49782,0,0,0bc087b291a089e65a143cf89914514d05076b15dbb30d3729c21d37dca3c647,2025-02-20T04:15:10.973000 +CVE-2024-49780,0,1,7f9027a39d2733a3cede58ca07e345e21b51ac609974bd8742e660b45bb336c9,2025-02-20T12:15:10.657000 +CVE-2024-49781,0,1,3bd82726febd80f82d5a617bf728fa8cc573c841c8bb74f3d2fce32ca2e2d380,2025-02-20T12:15:10.747000 +CVE-2024-49782,0,1,627d33abe70cdd0ba21d14eae8983a28f12391e17db22a81a3d8e7323e7774d1,2025-02-20T04:15:10.973000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 -CVE-2024-49791,0,0,436e3ec68e0463377f56d61753d1a9ed190ae95d7dd892d9e3c8a12bd564a16b,2025-02-12T18:59:58.627000 -CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000 -CVE-2024-49793,0,0,fac1c55a65b5d3da27c6a329f82e430166d0b74adda812e4b78984a75cfb0d3a,2025-02-12T19:00:57.080000 -CVE-2024-49794,0,0,4188151a12ec309aa3d9591939eb9ec6161f375faaefbf12f00e48d0dbf555f6,2025-02-12T19:01:05.303000 -CVE-2024-49795,0,0,2488609fa172fd52eb1ebf78f585d1765abf8552c9dabc86a634a259eb443742,2025-02-12T19:01:17.880000 -CVE-2024-49796,0,0,01581574ec94382134046a52b8d8fc293723163bbc97fbc6b7537c6117cde60d,2025-02-13T09:15:10.020000 -CVE-2024-49797,0,0,142e3c077cfb816fdf02e00e49040600ef6f61c85dd208b6f4e3dbd964c7d2f1,2025-02-12T19:17:11.273000 -CVE-2024-49798,0,0,586cc47b4ff15ea0e4cd830539c74d083debaf1034853fb6111b395ff5596189,2025-02-12T19:19:30.360000 +CVE-2024-49791,0,1,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000 +CVE-2024-49792,0,1,693a2fd39c8dfd598958fdb8bad16f8a352d92afe1bc976e175f50b0beb082a2,2025-02-12T19:00:51.357000 +CVE-2024-49793,0,1,93505ab1a713c7f5e371ae5e84a5f8ba33b73ca8c053c22164062bf223376375,2025-02-12T19:00:57.080000 +CVE-2024-49794,0,1,f335485e54ef503df1d52c1ff49fdf84b4c59d93bc03f13aa59831bbde26a151,2025-02-12T19:01:05.303000 +CVE-2024-49795,0,1,5dfdc1bf8e7cc7385a271f0d7f72f61ca066096724a019b04ee78775686a5968,2025-02-12T19:01:17.880000 +CVE-2024-49796,0,1,8b1fb9fc18ca83c7dc6d418193c691afe0fe4eae32e93620f8d87f25bf32f789,2025-02-13T09:15:10.020000 +CVE-2024-49797,0,1,42604ebbdaf644f378effc3597fc837138ef12e316a87aa17727d1fb2083c728,2025-02-12T19:17:11.273000 +CVE-2024-49798,0,1,1aec0907b4fd732315be69d41519055181cb89ba95f62d72251da2aca1ab6651,2025-02-12T19:19:30.360000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 CVE-2024-49800,0,0,c2e08020b86a0127deb4cad0f0d72546a923f7dec86c67481406e56d8f0cb7c3,2025-02-12T17:58:29.817000 CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1b60,2025-01-29T21:23:51.343000 @@ -270104,7 +270104,7 @@ CVE-2024-49804,0,0,ac9e0f55577ef9257227b614ccd7a1b01a15602bfa23a61ff3bdb6906b004 CVE-2024-49805,0,0,8c1aaacc8d12be331d70aab0e8f7279b981c807cbe4aba5debb78bc30d6f0d29,2025-01-29T21:24:36.337000 CVE-2024-49806,0,0,1e9e7366d429bfe4288411d8922c4ce74b00945547b83f0b9b47dea0218eb8ae,2025-01-29T21:25:06.310000 CVE-2024-49807,0,0,68d646b93ca169d9246962a92303d7bb36c19bfd79c59c0a41204a851f5cb51d,2025-01-31T16:15:34.647000 -CVE-2024-49814,0,0,7744698f5403f3ee924254eea82f65e46ab706e1ab470d95397226a3223d99c2,2025-02-06T01:15:08.230000 +CVE-2024-49814,0,1,73913b2547105d571411ec726289dcdf22a5171ac9632e1edb82b0e05878de6d,2025-02-06T01:15:08.230000 CVE-2024-49816,0,0,29fec4881722e27e4de58cfa345cd2fbdffa0b4c8c7096fb575d64021d438094,2025-01-07T17:25:58.430000 CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96260,2025-01-07T17:23:31.817000 CVE-2024-49818,0,0,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5317,2025-01-07T17:20:08.497000 @@ -270789,7 +270789,7 @@ CVE-2024-50476,0,0,35748ba4306c4240aef0107ccb81a7afc297d782a8a366836b7f46e83a5cd CVE-2024-50477,0,0,30b542ca3c23213ee012ae6b20ea099ce0e58e93e7a3ceb961529dd7319062c0,2024-10-31T00:24:28.160000 CVE-2024-50478,0,0,c6e943c6420c3f5a389145933c0c4dfb9fcb100e73f4e688b0d5bc9895280483,2024-10-31T01:44:47.407000 CVE-2024-50479,0,0,83213c1cbe1c808ca9abcf9be6166c74770ee338364b15f7cadb07ba2e041af4,2024-10-31T13:02:20.793000 -CVE-2024-5048,0,0,26d22a926f0874ce3a871619efa66bffb1c3bb44facd4821260d439fab3094e9,2024-11-21T09:46:51.377000 +CVE-2024-5048,0,1,bbffd26e3a62fc7ede2b7cf49ba39cfd053906d7c992fac32f1fc97c2d6ae1ed,2024-11-21T09:46:51.377000 CVE-2024-50480,0,0,c394acde8bd643a056b7572b138b020eb004b0c9c953a2494c2b6863f87f6132,2024-10-29T14:34:04.427000 CVE-2024-50481,0,0,b6d00daa5f8961a65f932692fff07056f855c2a0de3457ab8639f1aabd27024d,2024-10-29T14:34:04.427000 CVE-2024-50482,0,0,093771549c5fece2d89ef85592fe40f6590e8d360be1b306b38d905240229a77,2024-10-29T14:34:04.427000 @@ -270800,7 +270800,7 @@ CVE-2024-50486,0,0,09ac0f4d9332c90a2449f6036c90602c1a8465c0a25adadb963699fa6d356 CVE-2024-50487,0,0,2c1dc0d5641824f0b613b12739318856bcf27621fcec5364c518d84f73c3d871,2024-10-31T00:17:48.153000 CVE-2024-50488,0,0,a66f5dcc5616fe86c11ebf506fc4f272680f0e1294b584fa5c94d9d7e7408837,2024-10-31T13:19:42.087000 CVE-2024-50489,0,0,71c7e9d3312f01c8f8fc6cafb114d171b038fb98af6aae873110a7d2af32e829,2024-10-31T00:16:07.977000 -CVE-2024-5049,0,0,b1abae444344598b7912f441c0b001fdf02ed93edd8d85624bd3f319aa67eb12,2024-11-21T09:46:51.530000 +CVE-2024-5049,0,1,5868d4b5a3f306642199aea85b3bb71ea0ca3a671d521de2e9f815e793ec6c82,2024-11-21T09:46:51.530000 CVE-2024-50490,0,0,231b39aafa3d500a7c028ca66b380481016bcf6e3ab21ac90f84076fa925f479,2024-10-29T14:34:04.427000 CVE-2024-50491,0,0,ffb8b923dd93f7c74c358c4139bef967636291541d659875ebd8ff3441352eec,2024-11-13T14:00:03.247000 CVE-2024-50492,0,0,ae81b2440fe0bf97f36da5ad0b3ecfbc7666d424011fb9be50f1b7aecd13b782,2024-10-31T01:12:02.283000 @@ -271274,7 +271274,7 @@ CVE-2024-51440,0,0,203986c75a80a34d889d62b668b90a6f364317185f011a078d8cdc459d4da CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,026f2f79f883da59dbffb9dacf2ddcce01313f0fb97ba3b8dc804a5b33e0dd57,2025-02-10T13:57:18.723000 -CVE-2024-51450,0,0,daaced1779c691b607ff843bb370a3f42aeb8807361c3f8517017dba197273ad,2025-02-06T01:15:09.420000 +CVE-2024-51450,0,1,b24ea7b4369b0a65d966e21c7dc8a033d60cc44bff8cf30a91a024c498c7fa31,2025-02-06T01:15:09.420000 CVE-2024-51456,0,0,66b05d860daa73e2ca5150a1c93bd2ff924126d07f9447d85a1bb5c4e9cf4c2f,2025-01-12T14:15:06.550000 CVE-2024-51457,0,0,0ecbf506964ce26877e8439aa4a3160d1450f6ed502906387cfebb224c3433bb,2025-02-18T20:15:21.160000 CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310af,2025-02-11T02:15:35.307000 @@ -271318,7 +271318,7 @@ CVE-2024-51501,0,0,fd07d849fcf005114e49b704958146e2649ec425c6f8ba03cb89ad7a21759 CVE-2024-51502,0,0,01d887214d04155f79d0c06f386d7d2cac323fcc6a65c68b1c14739db41bba3c,2024-11-21T17:15:22.737000 CVE-2024-51503,0,0,e1b49616d4a00e7d7d3cfa9d7aea7e4c02706f35f12a6b64bc3311e1675452c3,2024-11-19T21:56:45.533000 CVE-2024-51504,0,0,a627aebc8984112665cce121693ae08102fe7e16b5ed7919df3a69779ab68805,2024-11-21T09:45:38.483000 -CVE-2024-51505,0,0,92494ea580318bb0d32f5795711be115f9029430b8789ca63a312cea3e456607,2025-02-18T18:15:26.420000 +CVE-2024-51505,0,1,59a9c27ff1aa6293764a1805d129d78b3200f41b807deae85bed614c1c751bd1,2025-02-18T18:15:26.420000 CVE-2024-51506,0,0,a7315fdb20bfc8ae32683e052f8bddf6ea6b461d07571867f37ba8dd3c5f1001,2024-10-29T19:35:28.723000 CVE-2024-51507,0,0,91d00d755cfbcc307baea5e6c1e9729d1d51abe9613c87956cdbb28a5c122c55,2024-10-29T19:35:29.513000 CVE-2024-51508,0,0,183ebcba7ff30eff9a3b4e3f5e80c97c7bd892a95a5e291c33e22412b0defe8a,2024-10-29T19:35:30.513000 @@ -271357,7 +271357,7 @@ CVE-2024-51543,0,0,2e5257f71ed91dbe805d033e4a6755a3128eea835afba16fb7592fead3d31 CVE-2024-51544,0,0,7efd9c63e1ba6e4739e8df404675fe83bcef56d7a820892978f28dad5fdcc658,2024-12-05T13:15:07.767000 CVE-2024-51545,0,0,12784dd02658da51b8fd924393f44f530cd7fafbc95dd8f22bad4eb10273a07b,2024-12-05T13:15:07.920000 CVE-2024-51546,0,0,5c6de9d868a42f3fc08dc14cd51663420600f19cb389c7f5f42de4b279edee8c,2024-12-05T13:15:08.077000 -CVE-2024-51547,0,0,1e3ee33e81c62d0d6c24af32c02715f546def02ecfddfc726ab45c749dd59cae,2025-02-06T05:15:12.850000 +CVE-2024-51547,0,1,840a0016b0502b63cf1e44eb3525e081ee3929e7e7734c3408c644c794880887,2025-02-06T05:15:12.850000 CVE-2024-51548,0,0,e88659b0097cab2f2778fcf3118d332e05ca9d29ffa98c4c01f12c464b76742b,2024-12-05T13:15:08.227000 CVE-2024-51549,0,0,cb39e548643b0e1d431233e25114b65e98b55fdbfea2fc2ee3734fd0108cd465,2024-12-05T13:15:08.397000 CVE-2024-5155,0,0,2801a7861c6f621ab1aeda3d9644689e4c7101f0c6cd1c35db7e5ad1a20fc106,2024-11-21T09:47:05.140000 @@ -271959,8 +271959,8 @@ CVE-2024-5236,0,0,2567479af261d5b21b924e08416f98f775dfb54600e5bcd680efa9c7d4ca61 CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000 CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26140,2024-12-18T16:15:13.967000 CVE-2024-52363,0,0,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000 -CVE-2024-52364,0,0,11ebdc4f029fc92efbe785c04c8edcde23c1939eaef3d0ba101c2de72270cd25,2025-02-05T12:15:28.743000 -CVE-2024-52365,0,0,927d2f6d769f42b151d1930d90c89aa267bb96e1faf5415104568e34dc5ab589,2025-02-05T12:15:28.917000 +CVE-2024-52364,0,1,82606ab35773dfde3fb3002f292688c503168f9c71015cb6232e593a409c127a,2025-02-05T12:15:28.743000 +CVE-2024-52365,0,1,67d0593b9ab22b3d0e70ebc54cc166e413b2572e8cebaba6bf7845898f27108c,2025-02-05T12:15:28.917000 CVE-2024-52366,0,0,5eb5d532a2a455b08ea0a92266486ecbd59be84360d732dbaa7ab966f9474b5c,2025-01-07T12:15:24.680000 CVE-2024-52367,0,0,c8bd249cf84afc9db3295deb602b0f010566468527c0212f3c545dd982041f33,2025-01-07T12:15:24.847000 CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000 @@ -272106,7 +272106,7 @@ CVE-2024-52497,0,0,76432643899f38ba75179a14113d755b57d5df1f8babd4f34008a6d331544 CVE-2024-52498,0,0,76cac202cbeb242c14b1d2c5adf3a36c2511bb84947d578ea6d325dd3cd59683,2024-11-28T11:15:51.550000 CVE-2024-52499,0,0,c4a61383a7f46923ae8747f865f68e3c09e090ed901c3f4dc5bac7fe19b8caef,2024-11-28T11:15:51.957000 CVE-2024-5250,0,0,c6115fdefc9430249c7d4d4f46e79b3671914cf50bd888826e056df7f2862765,2024-11-21T09:47:16.567000 -CVE-2024-52500,0,0,dbe9ea763afff54f67f6a30f1f054811ad93e4df54c77a364a0d44c396569ea7,2025-02-14T13:15:42.483000 +CVE-2024-52500,0,1,076bf18bc62f34b6f77013e42bf47b9be9f029c7276ad511605c7c74ac595668,2025-02-14T13:15:42.483000 CVE-2024-52501,0,0,17f495159b62ae52bde02e4d66727865ee859c014ec753466b398523b6ca7857,2024-11-28T11:15:52.363000 CVE-2024-52502,0,0,b83969b57c15f3908db9b8cde5a6323408839408d2580b22402d26e419e17698,2024-12-02T14:15:11.037000 CVE-2024-52503,0,0,866437c4597392d22bdbc732e1d233714902a80c64c79c2d9e95409c5f1593e5,2024-12-02T14:15:11.177000 @@ -272146,7 +272146,7 @@ CVE-2024-52535,0,0,bef515410181a811c26fc680524553d9ad7877ab91586d8a4ff019d636628 CVE-2024-52537,0,0,452ae911f4de5122c99d1e9bb0a1a51cc02727fc3434d173d3a4156ab777cd38,2025-02-04T16:13:09.543000 CVE-2024-52538,0,0,bdc7a8adbcccc26407d6cd63a537a1ed9796d07ff2d4f217707baf8e0c83204d,2025-02-04T16:12:55.947000 CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000 -CVE-2024-52541,0,0,2908bd61aede4331267b4993e1472a2ab6b7bbc9e17c30a30e9bfe7a1989021c,2025-02-19T17:15:14.633000 +CVE-2024-52541,0,1,f97c18f3479bff3649d5f360e59d0179d414e098da085fd6f26905274b8ca28f,2025-02-19T17:15:14.633000 CVE-2024-52542,0,0,782d30ca63c890d96ad6bbe11bf7f4bbe0aeaf8efe12cef1c1148c420124d676,2025-02-04T15:56:24.143000 CVE-2024-52543,0,0,33519c6ddd0702e3ff651d02a1fcc974b38a1e8f86180d3c4f24bb697efb92b1,2025-01-29T20:26:09.100000 CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000 @@ -272176,7 +272176,7 @@ CVE-2024-52571,0,0,77a9159855cd62fa01f047f9112fd0953f87a29ce60ac61f24d8893b5a240 CVE-2024-52572,0,0,6376707757e7137e4ed57cb6aa915c75f77a0c9d8f5dcf819a13dd807d60e570,2024-12-10T14:30:46.097000 CVE-2024-52573,0,0,9b0b6e6543aa62aa5974779f944f035fd69c656fc6d7016b22eedb4bc991f5cb,2024-12-10T14:30:46.227000 CVE-2024-52574,0,0,d8df409b977762d84a83d9a80a80d32c1ddc712a3a86833baf305ddb75a990a9,2024-12-10T14:30:46.367000 -CVE-2024-52577,0,0,cb4249700ea409806fe0645db62257c6192d23add30e1fa2245a66d509fb3211,2025-02-14T17:15:16.200000 +CVE-2024-52577,0,1,cfbc97ba899ff2bb0de295b22d51372659555766fad64dbe415babceda99e084,2025-02-14T17:15:16.200000 CVE-2024-52579,0,0,d378de938891f71e4fc556c9415102b9e08c8e29cf41254f78470db78534fb63,2024-12-18T20:15:23.383000 CVE-2024-5258,0,0,53374e7ddf7cf7e465eb57d73b1205feee2ef084995ee89434e5eccc31b66e53,2024-12-13T17:09:56.883000 CVE-2024-52581,0,0,eebf748bb1f77ebde863c93ef3f2148c2ec8f59bbc22dcc86790ce8d59decaaf,2024-11-25T14:15:07.077000 @@ -272342,23 +272342,23 @@ CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336b CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000 CVE-2024-52875,0,0,1ac4526d2c044d382cc0f35ef9e40c2813ed4958da8686e71b5eb97bc5d89bd5,2025-01-31T08:15:07.827000 CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000 -CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000 +CVE-2024-5288,0,1,53fb03fd5f451c4961fc4f636ee4c07f76f843c532e61257bfd8fc5c1f960668,2024-08-28T12:57:39.090000 CVE-2024-52881,0,0,6827d5b00e4d65ecef084d42789cd1b28668fbddfe238fc2e2c516c9983ea948,2025-02-10T17:15:17.687000 CVE-2024-52882,0,0,0e9b7e7fc9ff7df204d4c4669c35379bdd8bdf36506c56aa49c6db64563e7a8b,2025-02-10T17:15:17.860000 CVE-2024-52883,0,0,52d7ad1ab3055f670faacd58028c9ee893ca0da51fa82feaca7a6e676a1b1814,2025-02-10T17:15:18.027000 CVE-2024-52884,0,0,3227498fd6659af285064d680f971c699a66d023f187f44698185a705cf44c56,2025-02-10T17:15:18.190000 CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000 CVE-2024-52891,0,0,c6b610008a5f3ec3869a4a93380f2e9ddf6baaf48eba1e31c2434c79c4127010,2025-01-07T12:15:25.010000 -CVE-2024-52892,0,0,70788c25d86f20ecd74fbe3cd5b1e787e63f4f7af2ca750bfad2d4b05106647d,2025-02-06T20:15:39.763000 +CVE-2024-52892,0,1,9eba69a4b423ab3b0faed8136763965b521ef23cc8c0984c63b5b975c522a8cc,2025-02-06T20:15:39.763000 CVE-2024-52893,0,0,93318ea4edf051cd522e6cc747b964878d2b91249e126365b5b3b33f5344312a,2025-01-07T12:15:25.153000 -CVE-2024-52895,0,0,7f4a5ce15883b62a7aa1b544cdc19f80b65ed4bfb8b25711977644f659f94848,2025-02-14T15:15:09.210000 +CVE-2024-52895,0,1,413a10118e40c38b0bc46dbe570180b39d85c1b7898c514a33593c45962304d0,2025-02-14T15:15:09.210000 CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000 CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000 CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f889,2025-01-14T17:15:17.513000 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000 -CVE-2024-52902,0,0,cf8f9dd5f5314aabb5776e487e7a04f7f09b37e927323e64ba1b1424836da94f,2025-02-19T15:15:14.660000 +CVE-2024-52902,0,1,a7f9d2afacccf2690de8a495e5fa568e034edf1f53564b372a3a258b8766a6b4,2025-02-19T15:15:14.660000 CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000 @@ -272705,10 +272705,10 @@ CVE-2024-53295,0,0,b8e985a8e27bd0c49159e8a0c89472687e5b7e5449b7c5ba70064bf994d36 CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000 CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000 CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 -CVE-2024-53309,0,0,fbd192ebe8ddc3ba7c6c8bca9f108e5de178d036f56947c6f5d14ea2aed01d0d,2025-02-13T23:15:10.400000 +CVE-2024-53309,0,1,9976546b7abf02e4cd14874d5157a8b157e66c777a5c271e7537ecb85f040d33,2025-02-13T23:15:10.400000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 -CVE-2024-53310,0,0,bb9e3e768922d5b2c6f52d290405822e84f0ba0511a6111a2bc22311f7f3fa04,2025-02-13T23:15:10.493000 -CVE-2024-53311,0,0,1d95306049f15b3ba580c1cb4607e72763bc84a9d8705b243ef89765e2a00bb4,2025-02-13T23:15:10.587000 +CVE-2024-53310,0,1,6685b9be2f2201e0c13d317b7f9ca8bf020de9ae865dc14aa02d1c548e9cb6ee,2025-02-13T23:15:10.493000 +CVE-2024-53311,0,1,040d10bd201ba53cae909a8cd3bdf13215fcdc49187517d2728916167525d002,2025-02-13T23:15:10.587000 CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000 CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000 CVE-2024-53320,0,0,c0ab61e5ad040dc2e73e2a9c67587cf91fdaf7884054cb7c117a2b735a98de10,2025-02-03T21:15:13.373000 @@ -273078,7 +273078,7 @@ CVE-2024-53964,0,0,8b957f9c6ca1dec43d35dad3b6547f3c315ba420617d586a20a9f871b1db4 CVE-2024-53965,0,0,fe5265ed578fcf02d9c7551665c4d02d94d57b5c2a197155d2f383c80e4623ad,2025-02-11T16:05:25.927000 CVE-2024-53966,0,0,e11c591668a48bce198ebff61b349df8c8683723a99ad711247803fb06f85133,2025-02-11T16:05:33.017000 CVE-2024-5397,0,0,564acdcbfc9dac7a844ec06f4ef19eb7d83976348ee7d0a1a270c23ed8471553,2025-02-10T16:20:41.830000 -CVE-2024-53974,0,0,77cf81f45cd33fec29aad76b311acdff17e0c21e7e9d2ce5ce7bf7e51ba0652d,2025-02-19T18:15:23.543000 +CVE-2024-53974,0,1,042c32d4a9d965334131096d8bc55661ded2d399a3151e41902cdfa630e1aac8,2025-02-19T18:15:23.543000 CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000 CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000 CVE-2024-53977,0,0,12d017cb33e32f23864efced2c126af55eb60414ad0aa463f96d4912a8bf85d8,2025-02-11T11:15:15.063000 @@ -273225,8 +273225,8 @@ CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827b CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 CVE-2024-54160,0,0,4df1c13c84c21e9aa7050ae9319fa9577473b95f44c8e77953e28575fc0cc4c7,2025-02-12T15:15:15.050000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 -CVE-2024-54171,0,0,a280ad61fd608c1b98587e9d28d9bd94ac1778ae44bdf28b8d1cc31a429024e5,2025-02-06T21:15:21.453000 -CVE-2024-54176,0,0,3bc9287e3e58e7e6c0a7e2abddd56567ffcfb09091c3a0c19ab5f7535da36a73,2025-02-08T17:15:21.643000 +CVE-2024-54171,0,1,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000 +CVE-2024-54176,0,1,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000 CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 @@ -273582,8 +273582,8 @@ CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 CVE-2024-5460,0,0,d1df8428a10a618dacc511f1783e341e208a5618919dfcb93f031b38621f5972,2025-02-04T15:24:36.480000 -CVE-2024-5461,0,0,e9e0632fb73a3e7546021df4990954741acb4202ceef231a67fb7451901d6fa9,2025-02-15T00:15:13.513000 -CVE-2024-5462,0,0,f749f3060428a6b147d3ac48fccb7b849dbfaa192c07033d9058534618091553,2025-02-15T00:15:13.650000 +CVE-2024-5461,0,1,633d803723730573bdba47164e4a60ea62f0cc4e3bef688995df20bd3afd47d6,2025-02-15T00:15:13.513000 +CVE-2024-5462,0,1,045b42c6e687c888d6a2f15aae041947ac8dd2fa2a221ce631f3da01f323d2e4,2025-02-15T00:15:13.650000 CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000 CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 @@ -273694,13 +273694,13 @@ CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b67 CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3ddd,2024-12-11T16:15:17.033000 CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 -CVE-2024-54951,0,0,1856b28c2c5a142d99515b7fffdcacc1f630ba9c318f4cffa13c747e66dec9a4,2025-02-14T16:15:34.060000 +CVE-2024-54951,0,1,8b2bcbe23ae754cb335a19524b9fb140fa909ba5063a6b13cf36fb5639e89ebb,2025-02-14T16:15:34.060000 CVE-2024-54954,0,0,ea2e7989196e0ca78538061e8245a722c8247faafc7a9c565c651ca357e96580,2025-02-10T18:15:29.663000 CVE-2024-54958,0,0,69980aeea30a2a881a4d3d60af27dc56a66e90cd80d98f68c95b14c20a9676de,2025-02-21T22:15:12.440000 CVE-2024-54959,0,0,9f0a686e6ecddb708d340473cce33ce83c57a259a6f56d0e5117df6a2fd44baa,2025-02-21T22:15:12.593000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 -CVE-2024-54960,0,0,b56dba238d1a6ba5b7d36e1205517b2aabf5339ba1a9854d8812410b69334572,2025-02-20T20:15:45.927000 -CVE-2024-54961,0,0,73f36e4bb189518522c886e7156822b9247168db47faf21e982251cd726ee254,2025-02-20T20:15:46.077000 +CVE-2024-54960,0,1,02256103d798081271ea74668df7459f7886a5596fcb8979765b515d53087638,2025-02-20T20:15:45.927000 +CVE-2024-54961,0,1,bb4cf97d0df3a05dddc7fc6625d317d6e9bdc0dfb9184742d4cd8aa32e8f9272,2025-02-20T20:15:46.077000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000 @@ -273817,7 +273817,7 @@ CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4 CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000 CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000 CVE-2024-55456,0,0,a3d3f2052af70dd917d8e618e90f97fc45b823a73793a50cabf867252a0b02ec,2025-02-18T19:15:19.267000 -CVE-2024-55457,0,0,0d750578f809f304601bc27bdb7313f92185c8ddb70252e76fba61f2dbe3ae70,2025-02-20T20:15:46.223000 +CVE-2024-55457,0,1,82a4fa54334c8290ffa990e3fa369305b4f2741419cd66ebf5e4149be67cab81,2025-02-20T20:15:46.223000 CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55460,0,0,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000 @@ -273965,7 +273965,7 @@ CVE-2024-55894,0,0,a518cee2fb5c444e45eddc499c726dbccb5162cc415b97b8eed1d6bbd03a9 CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000 CVE-2024-55897,0,0,86f551f0669482615238eeaffb68bcc56791f5e1b9341f9faf1df69a0f9917a0,2025-01-03T23:15:08.573000 CVE-2024-5590,0,0,149ce733adb815f37cfb949017cf2104a0546c788a7c477d5e3007938805c8d5,2025-02-07T15:10:57.540000 -CVE-2024-55904,0,0,670a5b92580670024d95fafa42302e04efe1a78ea620e4f4abee465e697fd2e0,2025-02-14T04:15:08.753000 +CVE-2024-55904,0,1,2149517295e96b8f6067749aeaaef095de945c8c203a95604037ef950520ab7f,2025-02-14T04:15:08.753000 CVE-2024-5591,0,0,5b452d13d5bfa9a2af82af55a6427cebed5363226c02cb0163eff6e664b73ee7,2025-01-03T15:15:10.813000 CVE-2024-55916,0,0,bb2f39fb2dbe90e6c07ae14f8caf688273b3c9276641493fe6ca8dc8b8b6b9eb,2025-01-16T15:18:39.293000 CVE-2024-55917,0,0,c12e2bbc393b15d20fbce1ec995c8d1d26abb7f3ae27ddc186e402fd7d620706,2024-12-31T17:15:09.140000 @@ -274036,7 +274036,7 @@ CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85d CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000 CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000 CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000 -CVE-2024-56000,0,0,2ee6d1a1730d8d4d1d5f47f7f3465648c21682535137d7a34a45989c97b14df8,2025-02-19T09:15:09.710000 +CVE-2024-56000,0,1,398cd52d0c295ef06cdef18dba4d8c22cc1fd4b0ebf56907fced85d0756b1b0d,2025-02-19T09:15:09.710000 CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000 CVE-2024-56002,0,0,70b793e56112c1d8aad25f7a55707ed0973d44dd20df2cf309c7250f5eece26e,2024-12-31T14:15:24.120000 CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000 @@ -274154,7 +274154,7 @@ CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b18 CVE-2024-56161,0,0,2a6c7438bc454e067e4c7217ccd5cceb54331357f693b69fc6ab4e188462cd9e,2025-02-04T12:15:28.027000 CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000 CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000 -CVE-2024-56171,0,0,a57b28947d21118f6e92b6897a79ff02d9554d30c40f0d4e932307aae08f766f,2025-02-18T23:15:09.413000 +CVE-2024-56171,0,1,1f8de30f6737077dde8e5c70dad58b2b898d532526e7d21eb6d16d0b61082483,2025-02-18T23:15:09.413000 CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000 CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 @@ -274375,13 +274375,13 @@ CVE-2024-56454,0,0,9fe32f3b9015db86e1a4a24c1fea9536d34d315a1d0f17a6f977857204a2b CVE-2024-56455,0,0,db2c9c4d4290b1bfc3ae388650ee55637dbba19ea1aad42dbe4095f066ac1885,2025-01-13T21:49:20.337000 CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d499,2025-01-13T21:49:26.503000 CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 -CVE-2024-56463,0,0,e2b73e80548b2c9708e1a343eee80d7db08ba2945bfa3a46a81a810daf6fd8df,2025-02-14T17:15:16.420000 -CVE-2024-56467,0,0,13891879ca313c8cb226e6ca0ceaced74e48f609731ee2455e1c59f775ead668,2025-02-06T21:15:21.600000 -CVE-2024-56470,0,0,7e01545c3941e3e7ce420883b8077787aeccd34edea59f0be4c24f50aae0e3ff,2025-02-05T23:15:09.707000 -CVE-2024-56471,0,0,56b2c377f9ffa15c294942a5ad0898fe9aff16332c2eb19e271fe1907ff61444,2025-02-05T23:15:09.860000 -CVE-2024-56472,0,0,2f579974ab3d56b4fa0cb9f07abc76e41253508e1c38a779ee9f61c290ed9211,2025-02-05T23:15:10.007000 -CVE-2024-56473,0,0,b00f2cefa56bce9690bcb1d47d0343fe5ed0b7ea46fcb3c0c5485a3ec1963ebd,2025-02-05T23:15:10.153000 -CVE-2024-56477,0,0,ce1aefc7a0166760d03634da05dcc562842beecbab4a5b636c9a146472fac741,2025-02-14T15:15:11.887000 +CVE-2024-56463,0,1,17f04dc4f971dc052d8a07d70a50f9af34a6b9591bcefbda5f8382528587cae6,2025-02-14T17:15:16.420000 +CVE-2024-56467,0,1,4abd380d633d7d20b2a027f678c099ef3316a3d7b109e9e37281d916573a7b07,2025-02-06T21:15:21.600000 +CVE-2024-56470,0,1,96c6742485e13d1fdf2268bb4e653fbbddc1f16e286f381a0a3e73c95e5b7429,2025-02-05T23:15:09.707000 +CVE-2024-56471,0,1,8ee9a29903ea7e830111b74efc70975a88427d192b0949332c7629546fccdf59,2025-02-05T23:15:09.860000 +CVE-2024-56472,0,1,3341322fa566ec958920c7b53f3a2c2ab8c9a932d96b5bc7efdc8e5b66ba3fc5,2025-02-05T23:15:10.007000 +CVE-2024-56473,0,1,95cfed310cb3647bbda3340eb9a2861ece3f6a264ec3b8709c7f3e2f2b2f315b,2025-02-05T23:15:10.153000 +CVE-2024-56477,0,1,69f54c57c1e95b4eee06ff2634a0d66e2fb14ef4e946564e8329b5df0b1d985e,2025-02-14T15:15:11.887000 CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000 CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000 CVE-2024-56497,0,0,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000 @@ -274470,7 +274470,7 @@ CVE-2024-56586,0,0,b0c3a1afa1e35fa2222a1770b2af5fd447e0839a2d0703f1d4ca2d9ff4979 CVE-2024-56587,0,0,ebd24414141a6331d79514f7e45c789a676abdc5374959e8a3f404efa31874e0,2025-01-31T15:27:30.777000 CVE-2024-56588,0,0,c5e78c53e10590ee4aa67de98f1e9d7f44e9a534f4ba3ac877ccdc434bc6e47b,2025-01-09T16:16:22.040000 CVE-2024-56589,0,0,e669c8f2a28110966f3559dfa46339a87026e650a8eac6b0a3c626f7087ebd28,2024-12-27T15:15:18.150000 -CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000 +CVE-2024-5659,0,1,5fd5be5f77ac14ebb6962ed2f6d8decdb34c31ac9dfc9b977b95ff752e32a491,2024-11-21T09:48:06.543000 CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000 CVE-2024-56591,0,0,4ba918238e3f95ae969f7fc6eb9deb7c2f61d316c31ff9b582499d3d15ae9fc6,2024-12-27T15:15:18.383000 CVE-2024-56592,0,0,da483575f709d66f59d5bd6be0ac7fdbfa2fd5f2d9c42677ad036c85af63cd52,2024-12-27T15:15:18.500000 @@ -274715,7 +274715,7 @@ CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b2 CVE-2024-56901,0,0,f89b3b91c31270f42932d03916257d6a9b393ed803f4768bf5d8a01bfb9f30c0,2025-02-18T19:15:19.887000 CVE-2024-56902,0,0,55ee08bfb2b27d43a029f100c2808a37e82c9fc88eeda298a3df76e9bf1db388,2025-02-18T19:15:20 CVE-2024-56903,0,0,d60ba2f267939c2c71e180c0dc7f1dccb823d37ca9ed8ed634c546c4ea49c769,2025-02-18T19:15:20.117000 -CVE-2024-56908,0,0,5432237ac8b7fb042a60e387b8cd04a7f17a411a13db8c6306624d4d5eeb87a5,2025-02-13T23:15:10.773000 +CVE-2024-56908,0,1,bd6446d25c0eced2f1194551cd15f6a72964df8dff2a7352af02018d9edb7037,2025-02-13T23:15:10.773000 CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000 CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000 CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000 @@ -274753,7 +274753,7 @@ CVE-2024-56969,0,0,6ac568be18148d8fcdd8d68339e261c470b024f783d4b1afd4465c66e8f04 CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000 CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 -CVE-2024-56973,0,0,5dc6b709501a4f789c92c376bf9657ee53fef4631e2d7164cbd8c35411ff351f,2025-02-14T16:15:34.273000 +CVE-2024-56973,0,1,8d33220c71cd8846ab48892f96d6fe95369c615f3e948476ab517ccab4c1d74e,2025-02-14T16:15:34.273000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6f0c,2025-02-04T16:15:39.010000 @@ -274792,12 +274792,12 @@ CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce6328 CVE-2024-57045,0,0,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000 CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000 CVE-2024-57049,0,0,72e4153e948b22daf264938fc035d68c4ce564ff6470b7a7d4ef6548a1ce31ea,2025-02-19T15:15:15.297000 -CVE-2024-5705,0,0,0d309b7b5cce01153c5b5cdf2e83fe27f23344947d30e18a3bcf2d826c4828b3,2025-02-19T23:15:10.823000 +CVE-2024-5705,0,1,1cef401c9f586f1546539e5bb230221e96f06398042b2af4810b8be60a5e70bb,2025-02-19T23:15:10.823000 CVE-2024-57050,0,0,bb074b123a74639ce311d395794df55bade21f4ee761fe5d114f6a275d0722e9,2025-02-19T15:15:15.460000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 CVE-2024-57055,0,0,25fd8e176e93a7077d2c56fb488adb2448d136d23b0f47f9c778c02edc29e4d9,2025-02-19T21:15:15.227000 -CVE-2024-57056,0,0,b9603890c7ff3b1788bfd8d3a7f0aae9ef3f814f4773a55453d5c35b67b57623,2025-02-18T22:15:14.653000 -CVE-2024-5706,0,0,be01094ffd718e304235b9b6ad1eacd4561ea1c73dedb4c7668b35f922552103,2025-02-19T23:15:10.960000 +CVE-2024-57056,0,1,c5f38e31b11fc5619df22f526b11d4165362d2ea7b48326b9b2145fe721919f0,2025-02-18T22:15:14.653000 +CVE-2024-5706,0,1,5f0292f3da9603182013895181764e218663eb594c05b44f15dd493036e5cf34,2025-02-19T23:15:10.960000 CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000 CVE-2024-57064,0,0,d535f1189c2fd178785b9587824905a95a99a3e73d0701453c0d1b761967f131,2025-02-06T16:15:39.347000 CVE-2024-57065,0,0,c1726d0070358bb3ea68f84c317d5e2bb80148f08f590add9a090f23b534aa2f,2025-02-06T16:15:39.603000 @@ -274835,7 +274835,7 @@ CVE-2024-57159,0,0,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 CVE-2024-57160,0,0,d044a821e4cd7d6f282a359da69fef7f6a3fff09a99b2b7f3d3224dfc169d2b6,2025-01-31T21:15:10.910000 CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf8ff,2025-01-31T21:15:11.153000 -CVE-2024-57162,0,0,6b8ec48279083ede2559fb26afae6b179dc7a8a459c2b2e06f9ad78b7dc11bad,2025-02-18T21:15:23.657000 +CVE-2024-57162,0,1,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000 CVE-2024-57176,0,0,d3cfb0da410e06c83385af0cb0bfe3fc267d8b062d189d344e72e0d1d67688b6,2025-02-21T18:15:18.877000 @@ -274867,15 +274867,15 @@ CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e82 CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000 CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000 CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000 -CVE-2024-57254,0,0,78f3756f504d64aafe3c7fe030d998338c4f68eeebca5a88a1ee7746dcf3b080,2025-02-19T00:15:10.243000 -CVE-2024-57255,0,0,47d85e6c518447f6b2398d380509ce606bb346706e2218bb1c2ffeae53aec47c,2025-02-19T00:15:10.397000 -CVE-2024-57256,0,0,04cbb17411d01c78be02ff0e779795e92b0782215dfab979123c37fbfd98ae11,2025-02-19T00:15:10.550000 -CVE-2024-57257,0,0,0f11b41937fa4627d73472deb52deae8f6bc85d7966ebb62d9c4447ed3649650,2025-02-19T01:15:08.963000 -CVE-2024-57258,0,0,22fe56d0f81aba8abf95644ff85b0581abf3fa4849ede72d307ace4cb2da41cb,2025-02-19T01:15:09.117000 -CVE-2024-57259,0,0,7a6eb23f5e3eaefce3e01258346d6c3c63f7f8eb3b1eabb3adf0a779bd3162ae,2025-02-19T01:15:09.257000 +CVE-2024-57254,0,1,6aab634ace3a24577f5100d341a341040c3220e60332d310d02c9f6c650640ae,2025-02-19T00:15:10.243000 +CVE-2024-57255,0,1,80f80da6175fbe8bd57deb80fed62bec7119358f32001a708c3f7c1127eeed91,2025-02-19T00:15:10.397000 +CVE-2024-57256,0,1,77ac271bd2a464005ed22fe39253db075d2e2b0c1272372f7cd5418baa65ad1f,2025-02-19T00:15:10.550000 +CVE-2024-57257,0,1,eda5d792febb5a41f5a00626a883b67f73ebbb1e56ac386511649e0d78891ac3,2025-02-19T01:15:08.963000 +CVE-2024-57258,0,1,b7f53a2134ce9b849f8ad4d5f99ca8bb1b19cbaaa4c9b691d3d5d5844442a365,2025-02-19T01:15:09.117000 +CVE-2024-57259,0,1,e30d92c50ce8dfe6aa380cb5db2be51f66a303a92f90eba8ea74cb7a78f25b64,2025-02-19T01:15:09.257000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 -CVE-2024-57261,0,0,ca42f68e153d0be6e9cb0cd79e10c17f8af4df029f55193e9ee3cebd8e1524d1,2025-02-19T02:15:08.480000 -CVE-2024-57262,0,0,9450e719a6c12b68a90f479bb3c057c51a8162807b8fbaf825e482631247111d,2025-02-19T02:15:08.677000 +CVE-2024-57261,0,1,c3085ebc8cf159b46bf45e1f9532815bbac9b3f1090f2d38cc46aa43f08ff7ec,2025-02-19T02:15:08.480000 +CVE-2024-57262,0,1,9f1e467a91bfb95a860cb2618b865400801130a028e9beedd06261db99b42e64,2025-02-19T02:15:08.677000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 @@ -275058,7 +275058,7 @@ CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaea CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18 CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000 CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000 -CVE-2024-57668,0,0,0af0e4de6cdf8fb7970ea43f931a79515dce5ddffe6ecf67a456a12f486e6bae,2025-02-18T19:15:22.387000 +CVE-2024-57668,0,1,b42c4ade7e6a2558861b605d2123b1349f96e7cc0e39e48ef31fee02864c6273,2025-02-18T19:15:22.387000 CVE-2024-57669,0,0,2f4fc4d2260e34d110875389bd7ab9de03534a7c899c516b99b914ef7ba8823b,2025-02-18T19:15:22.490000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 CVE-2024-57672,0,0,c16f76cf99184924653ee9614a799340e334be0f516a9718fc9db286d21f0edd,2025-02-18T19:15:22.617000 @@ -275120,11 +275120,11 @@ CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c194167 CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece260,2025-02-14T21:15:16.197000 CVE-2024-57778,0,0,1a22178fc29abe6dc59d7566fc4abe03a351aa30931d5173f5e6ba8cd7ab0933,2025-02-18T15:15:17.207000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 -CVE-2024-57782,0,0,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000 +CVE-2024-57782,0,1,27b1821c8b4fe6a8c68be5a861a8528eec385d40734642a750e225c45381394b,2025-02-13T23:15:10.863000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 CVE-2024-57785,0,0,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000 CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000 -CVE-2024-57790,0,0,0217612903ad6c9366e535fb5355778cfb9d3c77f32f2f4a38735f90a312eec3,2025-02-14T17:15:18.343000 +CVE-2024-57790,0,1,c6a7c31dcb1356449419f3c845d3f6dd0dbbd54712e1304f63b64cd33b7a6fd9,2025-02-14T17:15:18.343000 CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000 CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000 @@ -275255,15 +275255,15 @@ CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022a CVE-2024-57960,0,0,773b522c706cbc49414ca08e8ce62c9b452c14ceb463659dc8cf301c1c68526d,2025-02-06T13:15:40.270000 CVE-2024-57961,0,0,70e7b1214aba97db422e1a3b3f233758ab9ca724b4d145bac1ebcb3fd7fbccf1,2025-02-06T13:15:40.417000 CVE-2024-57962,0,0,54a498ba952c380e086f823bc80eb1c13badd26229709ca796a347944d7ffac6,2025-02-06T13:15:40.600000 -CVE-2024-57963,0,0,f3292c7bb0a42acc5163ed15b47d421c57318fc3cc3b463bd3fc84d9df19e300,2025-02-18T07:15:08.713000 -CVE-2024-57964,0,0,637613af4d74c60604771ff7eb969de4e439548306825583031fb9f32f69d7a4,2025-02-18T07:15:08.920000 +CVE-2024-57963,0,1,e2dbeebc8010d8dc7186383ae04d68ba122ce39f6e9eb009c54178cc1aae9169,2025-02-18T07:15:08.713000 +CVE-2024-57964,0,1,a513a219c58c7834f1fb7d9af62d97ac9abe5d6d48616e094a0b94af28f70d88,2025-02-18T07:15:08.920000 CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c580055559d5,2025-01-29T10:15:08.113000 CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000 CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 -CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000 +CVE-2024-57969,0,1,a9f30e64734dd187869aecfededf6452ff3f08b206a82e6a9bc1f372cfee58f7,2025-02-14T07:15:32.340000 CVE-2024-57970,0,0,f1d0dec9bb100b8fe9d61ebb8638b3be011d2a215ab10879b323d77b83371cb3,2025-02-18T17:15:19.130000 -CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000 +CVE-2024-57971,0,1,d445cf82813dc3c30cc2cbfb34aaec152222acdda2dfd902956bb2171f3be668,2025-02-16T04:15:23.077000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000 @@ -275861,7 +275861,7 @@ CVE-2024-6426,0,0,4ce002f398761811225a9161509362fcf85e9093181ba3d834a2dc27a8c558 CVE-2024-6427,0,0,80de2373d634cddc1315c0548dc19b6640fad9157630b47b6d68e0948ebd24fe,2024-11-21T09:49:38.180000 CVE-2024-6428,0,0,9824e5fb0d614a3d0e710881a83479c00dc37380d4de17daf97ea6d59ba991f6,2024-11-21T09:49:38.313000 CVE-2024-6431,0,0,202245554d16495714b4a50b0b5396dc96bed4c4cca10e8f1efb34aa2485167d,2024-11-21T09:49:38.450000 -CVE-2024-6432,0,0,b8b9e37a8ed808ba75a38e5d2d9d9c05235a2a1d87bd14d42f4cb5ef34a79bba,2025-02-20T10:15:11.767000 +CVE-2024-6432,0,1,4bad98bf89c7361dd8defc05f6cd0693c9ff33fcf46bfdd4b3e290d40ec6dceb,2025-02-20T10:15:11.767000 CVE-2024-6433,0,0,42c6a0efce14f311f1548d33d512d616e158da3b932d3b757e1b72ad689e1dfb,2024-11-21T09:49:38.570000 CVE-2024-6434,0,0,6a4274085a2124b428b913ddcbc2570d1d62abe5639e19e73a17b1e138716c77,2024-11-21T09:49:38.717000 CVE-2024-6435,0,0,4b307bda22842f0e1dad89cbe8433b0a2f5a1573c8d400fddf8a5d2b32d831e0,2025-01-31T15:01:23.807000 @@ -276061,7 +276061,7 @@ CVE-2024-6649,0,0,cf93a68b28f2495778d6226b4a68f593f6221327b748505fb9d91c6c91b1db CVE-2024-6650,0,0,7d06fe6dc829ec1bd92d110609f5bda24ba1d17e0790e4e7be5d3916cccd12f3,2024-11-21T09:50:04.373000 CVE-2024-6651,0,0,a4781e28925027a5ab244f480cd88bd079c01f30be1e8b73b56732969688d923,2024-08-06T16:30:24.547000 CVE-2024-6652,0,0,6769c1607e2067b9e0f1f9bc6e1ab2d458bd882cfdf317df7e4cd75d1b8c6354,2024-11-21T09:50:04.710000 -CVE-2024-6653,0,0,5d533cfe4c430fdd9fa29906366aa8a3a7a647ba421c7f9250b25397da0ff8de,2024-11-21T09:50:04.870000 +CVE-2024-6653,0,1,a68a075c3c249e3c52f4381da47126865e993942a0f0f5e5c51a01ef0c158f4e,2024-11-21T09:50:04.870000 CVE-2024-6654,0,0,588af6cdab4288e71ace34fb016aa97704f8b6a13fdf356bd5dc23ac4819f9fb,2024-10-09T09:15:06.713000 CVE-2024-6655,0,0,cd84fc0b2c91b2bd9ab26bb80467662001cb12ff5fa86634c3654ff0dea4aaa7,2024-11-21T09:50:05.080000 CVE-2024-6656,0,0,b8b17443d02141bfdc1eea17911e293987ca1cebdac4436f8908652b7790e96f,2024-09-19T13:05:44.953000 @@ -276095,8 +276095,8 @@ CVE-2024-6691,0,0,f4b0c8ba9d849a887a840b11a7ced71b334b6811834c4c0436e7f424db2268 CVE-2024-6692,0,0,b93ab5a4c1a77950586e4d26ff9d5ac1dc50208142450c48467964da3007a929,2025-02-07T17:07:33.633000 CVE-2024-6694,0,0,b0602046f946051311f5f53ac4a1fe1fc94ee3df5461e1341469650a4d3f115b,2024-11-21T09:50:08.387000 CVE-2024-6695,0,0,e7416d4b0da809333c44d11d864c3d3ca2b99581d3b043576988ce5fdc091072,2024-08-01T14:00:34.400000 -CVE-2024-6696,0,0,556d15a072957d2403efa1a44a7de98b2a287c430f5372c8960c92b6e8aad323,2025-02-20T00:15:19.880000 -CVE-2024-6697,0,0,eeaddd46771eaf079a7c698c68746ba0726f79343ea45c42e31597ff93c6a4bd,2025-02-20T00:15:20.010000 +CVE-2024-6696,0,1,7b3cededed1fac672693f0f3f0553d881843836244695f398a0d562116cdce8e,2025-02-20T00:15:19.880000 +CVE-2024-6697,0,1,3316b16b5b3d4932c2bd2450a18cf1e58f32c118ba597bab0ec1bfedb69b4101,2025-02-20T00:15:20.010000 CVE-2024-6698,0,0,610235fcada5e89e43ef5764d6841eb30060f7da0b318003e9f144749a194bd2,2024-11-23T00:44:15.393000 CVE-2024-6699,0,0,f79c00fe78232bd0af9979633ca48fb41011189810ec404e84b21352508b2fae,2024-11-21T09:50:08.783000 CVE-2024-6700,0,0,409ab3c91e44011855a21d30373ec03de7918b1550584d03fe35b2d76fab3662,2024-09-13T16:09:28.343000 @@ -276400,7 +276400,7 @@ CVE-2024-7048,0,0,f97f3592e9a62156744d6e051c2a46f407bbff37b6d74b038dcb4f6ca33e3e CVE-2024-7049,0,0,3ed1b44b3add6a7b5afeddf885ae26eaf09447a652c502b043770537058cabd9,2024-10-17T14:22:44.653000 CVE-2024-7050,0,0,e7e264104cea78047b76892b2fd1d390f9cbe010098741cea3997c4dcffc5e50,2024-11-21T09:50:48.257000 CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 -CVE-2024-7052,0,0,2f19299fb0a6d30f56189ed607ffe72d821bc893218df170535442262ee0e75f,2025-02-14T17:15:18.480000 +CVE-2024-7052,0,1,74fd4b815b7bb00777165d299f57ff35cb2a27a01933e6814a9bcea12f50fa28,2025-02-14T17:15:18.480000 CVE-2024-7054,0,0,dae977ba195c466d627a19bcd62fa740dafe560e6a8fd5014878665bd52d8b35,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,eda6ef490df5a6117a32915d1ec352603ee024f358dd3007691ca0ac4a1981c5,2024-08-06T16:30:24.547000 CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000 @@ -276470,7 +276470,7 @@ CVE-2024-7136,0,0,c9b7c1934246d93b2333971d2ef8defed42959b13176d62d2020adb9f2cd26 CVE-2024-7137,0,0,315ca8a4d8d765de04e23f26963a3f09773d43e19e5c1f55bfec2de2390ac1d5,2024-12-19T20:15:07.820000 CVE-2024-7138,0,0,5c76b507d93bfe0849573964a8b74ef29a6c94608dcf9ad8427b4e5898b74f76,2024-12-19T20:15:07.947000 CVE-2024-7139,0,0,522023278c89645da01bf63de201ded1722527d54b07fd76deb6fd63af2bffab,2024-12-19T20:15:08.073000 -CVE-2024-7141,0,0,8583ecf35df96b017a0036e796636088a9a2047658721b79abc2543b93c41bef,2025-02-20T19:15:11.677000 +CVE-2024-7141,0,1,bbf7a39ecfa86e197cd0d2c66eb8ffbc6384f407cfe3816336c2488200dd7bb3,2025-02-20T19:15:11.677000 CVE-2024-7142,0,0,b6ebf1ef224547b187fe0c9852385af88b239f02a13bb3208406f7ff52258322,2025-01-10T22:15:26.403000 CVE-2024-7143,0,0,cbb18ddd616be4d0de19ef80dd494e49a9fc2830c5a90dc2455077acae5f057a,2024-11-21T09:50:56.110000 CVE-2024-7144,0,0,3e989e748e38a85b3db1941815e5d921ed75a2233b0a59f112c1cb1f74b3c16a,2024-09-13T14:40:14.420000 @@ -277079,7 +277079,7 @@ CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6c CVE-2024-7807,0,0,2f79e8d22e5d6ed09b318ab38ea343291c76b7890ace2830ff2b3c8694390017,2025-01-09T18:15:29.543000 CVE-2024-7808,0,0,7ac11306e30eff8e50a7b86f7aac8fe9c520c3fd210bead54deae1abf746387a,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,9d8be3b7031af396722078e7b9e5a2ebeea936683bacbce13a1c4fdfedc55880,2025-02-18T17:36:46.073000 -CVE-2024-7810,0,0,048c5f698b16572eb13dbdde0a6f3f441c9e5f84a2c20bd6d58d137b28d8cf16,2024-08-19T18:12:14.090000 +CVE-2024-7810,0,1,7f2a639494e7fa98a2b84b31568214a1468b1f8916e1b1adb60b0ef5b4b7b619,2024-08-19T18:12:14.090000 CVE-2024-7811,0,0,12531cf26a35dae7741e8deaba0b16e536637c9c3f93919c3a2cef209680e0d7,2024-08-19T18:15:40.487000 CVE-2024-7812,0,0,1924e0763fc5bb43c521d60fef0a38629d7b1f875bae4e4b103ede96f056b2e2,2024-08-19T18:16:21.283000 CVE-2024-7813,0,0,c8a80911ff6a2b6b9d6552ffb280bfaa080da74f6ce4db144ea4f8cdaef5948e,2024-08-19T18:16:48.327000 @@ -277243,7 +277243,7 @@ CVE-2024-7980,0,0,e8a3a45c56239daf8539e2eefc5a5fa653a5119b71f94f66cec627822cde64 CVE-2024-7981,0,0,1c6e460cfce74f6fd4e2f6469dd41e8f70193dc8e653e2954b698b81d2342698,2024-08-22T17:36:24.803000 CVE-2024-7982,0,0,462c506ba764519643e33c61c10fcdfbe069d0c78c9882d0732f619d73215e62,2024-11-08T19:01:03.880000 CVE-2024-7985,0,0,ec1bd93d5f9861900169c49521b54a80432ffce2591a30e5deaf45d454faf56c,2024-11-08T15:22:33.123000 -CVE-2024-7986,0,0,63ef611275d21e0628b2ffec3ecec064a79315694e1f3746cc89f11c68935ff6,2024-08-23T16:18:28.547000 +CVE-2024-7986,0,1,ebd1cb34b889dbf7d4bb4e744a32d61527345acf1100d77ef38de2e43dd5efd4,2024-08-23T16:18:28.547000 CVE-2024-7987,0,0,abed22b72da70c5a452cf250a1d87ed67223ce016b306b9a7083d55123dd287a,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,d171cb4fd9af3657c3ce7424faeda8f9ac9cb76e63f8674e50a948949f457da5,2024-08-26T18:35:14.617000 CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 @@ -277766,7 +277766,7 @@ CVE-2024-8622,0,0,c0236be19c6f76388397240005bc8328efcd3afeb9b22de958aad09c2038c5 CVE-2024-8623,0,0,56ef81b3b9760b3060b925939b7f80127617fa135795d5260a98ea0e77ac317d,2024-09-26T16:46:28.590000 CVE-2024-8624,0,0,522cf4c9e0d095c65b39c7d99282ef53065d33993728082b5639660998b19008,2024-09-26T16:45:40.470000 CVE-2024-8625,0,0,1f961d9f44de1933e5f0790b78bd4aa6a0ce41f79feaab7dc1128a72edd8300e,2024-10-24T13:56:29.230000 -CVE-2024-8626,0,0,5760921af7cddff8ad564fa16e6b50af4803d6c4fc8bf447e0697c867f389a34,2024-10-10T12:56:30.817000 +CVE-2024-8626,0,1,2c8a2d5aee3f01f0fef0e5eaadb2e85a1d283c16076dc94c8cf894e4343029ae,2024-10-10T12:56:30.817000 CVE-2024-8627,0,0,27266881d63aaccae1399dc0ad1d0628066993bee61c3c604c55c6aa4f5b389f,2024-11-06T23:06:39.400000 CVE-2024-8628,0,0,b68a3e50b7aa7f345a4a8d9267235e89f90c245dc8aedbab47c4bc06341f36d2,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,e2a922a358bf246c8de0dd6bfffe026aac95a455217a4a0cb80f1b479dc48aaa,2024-10-10T12:56:30.817000 @@ -278003,7 +278003,7 @@ CVE-2024-8889,0,0,cdec4457205670f8c1fce8d5ec4f28e385f385cd4c6bff224f6758703eef56 CVE-2024-8890,0,0,14ace7d92a0cb039c8f83b8b1d2fcde984c649b2d52acb27da4aae93ecfd88d9,2024-10-01T15:46:33.750000 CVE-2024-8891,0,0,dcfee199776fcf2a67ab9eccaa232b7ee6a39a3f93a7b26e93cad40b2c76b3f6,2024-09-26T18:50:56.827000 CVE-2024-8892,0,0,2bc42170fdadb33e24d097620e456d4331ea0e177116b9a61aed31427fea67b3,2024-10-07T17:10:26.673000 -CVE-2024-8893,0,0,dd591037df50a8ce1355b3cc78b2310ffa2f9c8d99617f0bc81e02d549f5c858,2025-02-14T17:15:18.690000 +CVE-2024-8893,0,1,712f7623e4bc75074f88a1267735f9fadfac1f95da062b452299fc823f0ebb86,2025-02-14T17:15:18.690000 CVE-2024-8894,0,0,2afcf79da1ae860d0dea9bd3bcd6b3bd6c1b1aa1ddaa7801de097bd759b666b2,2024-12-04T12:15:20.763000 CVE-2024-8896,0,0,15db3dca334d16efce2b5cc93aa60cd50f1976bd9a02ff816eabd5e356b493e7,2024-11-01T16:27:16.693000 CVE-2024-8897,0,0,0fdfc9f71cfefedb0c7a5c55250fccd8899f2bafda1fe770d540ced5f92374b3,2024-09-25T19:49:02.493000 @@ -278585,7 +278585,7 @@ CVE-2024-9595,0,0,affe800d4ccb9fbe30c63eaf437475e7b4f1b8f6ed06b3135e5296a266d83c CVE-2024-9596,0,0,97d2b24b69eeab4b46fc850bb8355e0549024bcd45410c14a3bd69da526dabde,2024-10-16T17:00:19.787000 CVE-2024-9598,0,0,5c0fa148e22055423c63f1a7155091692b712567127d27765647509813b47724,2024-10-25T12:56:07.750000 CVE-2024-9600,0,0,ea15b50099d09f31b8281c72f2e9f7d888450824868eb6eb5785430b8539a997,2024-11-21T18:15:15.853000 -CVE-2024-9601,0,0,81b6958d2d5ea875a80fc76ae37785ac7d2772cfdcb27aaa31ffe9273b852d61,2025-02-14T07:15:32.570000 +CVE-2024-9601,0,1,56ce9129a2fa2634b7fd20842d0bc306cff270addaaafdfa9fe73fb78d866e9b,2025-02-14T07:15:32.570000 CVE-2024-9602,0,0,97e94b3551b8a143150ba66a2e724dafe158b773cf8b0069e0eeb8d400c5b732,2025-01-02T16:48:01.163000 CVE-2024-9603,0,0,50669f21073ac14122f480035b4c1b46d69ab6d3ffcc460bb7bd86545f71cc92,2025-01-02T16:48:21.323000 CVE-2024-9607,0,0,54c7fa609071a2960fe8514c7e09434070f7928dbf6bf2601a0c6b5966a0c0f2,2024-11-05T17:40:57.777000 @@ -278932,7 +278932,7 @@ CVE-2024-9996,0,0,188a485776485f9e8dc9179367e7d7a07cab50fec958b227455a8676b58582 CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eba8,2024-11-01T16:27:34.960000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 -CVE-2025-0001,0,0,5760e2d1c8a423ec1fce437052bab776887b78a7792a13401fa67b8fbdd14b3d,2025-02-17T10:15:08.550000 +CVE-2025-0001,0,1,38ec2ba7150bfb694196d450b816883b72d88c4dfb5a4a4c7f9b797d86063dc5,2025-02-17T10:15:08.550000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 CVE-2025-0054,0,0,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000 @@ -278957,10 +278957,10 @@ CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07c CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 CVE-2025-0108,0,0,32fc5b68a56685a0b9b51207f2482d34ad1064df89ea1f574e01f75f06d01c3c,2025-02-20T03:15:12.317000 -CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000 +CVE-2025-0109,0,1,fb91e87a468358bc8d7c1052da790da8326a83451a79a8a0da57133874d5bc9b,2025-02-12T21:15:16.470000 CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000 CVE-2025-0111,0,0,ed569020ca3fa5c1134a21efd6d6f5ad743d98fc5724f337e56afc10b8fe1389,2025-02-21T14:50:23.877000 -CVE-2025-0112,0,0,88a8fd5cbc7c2c881979117d133c376f494cd853ce04b18c4dd3daf2c90e4471,2025-02-20T00:15:20.640000 +CVE-2025-0112,0,1,b6b3e61773351bc73d02ac3b160f71a2dda8c90a2e6d1219f29fa3dc8a4d567e,2025-02-20T00:15:20.640000 CVE-2025-0113,0,0,3478c732e987ffac3f9b17ecd011e78e159149f51d0641ffa2e937f895e713a5,2025-02-12T21:15:16.950000 CVE-2025-0142,0,0,79348507832bccb3dfb1eba9563d5795fbadbc3e9e1a05cb5ea2a751abd30411,2025-01-30T20:15:33.853000 CVE-2025-0143,0,0,09ad13005701a80a3a5816ecb54ffa484521fbf4e695c8cfa61de5a2bf3b5e04,2025-01-30T20:15:34.050000 @@ -278969,30 +278969,30 @@ CVE-2025-0145,0,0,fa1cca7a3820491168930060335690235606867b1573b086001c6a9b0b6497 CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0ed,2025-01-30T20:15:34.907000 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 -CVE-2025-0158,0,0,f3073b33a682c6c4fcb1bbe908bc9fc861912bdae73f97919c33833b929dfa0a,2025-02-06T21:15:21.923000 -CVE-2025-0161,0,0,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000 +CVE-2025-0158,0,1,9c1de144d1a0a3d7e92dd988e0992691cec26ba223fe44dad9f5ed52755dc256,2025-02-06T21:15:21.923000 +CVE-2025-0161,0,1,a15f4af26b467f3befeb42d7d89cb5b102ea3450856fc5b0055870671062ecf8,2025-02-20T16:15:36.333000 CVE-2025-0167,0,0,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000 -CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 +CVE-2025-0168,0,1,672abf2d0c2706634fe4bb9aed6e21e39877d106de6646523a4be2bba3d7dc78,2025-01-01T14:15:23.590000 CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000 CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000 CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000 CVE-2025-0172,0,0,5e6c9a2cc035d62fed9c1b881e3bba0314c8fa73fea7e2b9997776b0e54bdcfc,2025-01-02T18:15:21.327000 CVE-2025-0173,0,0,731afa965422c2d9a2e43fe904067708e38f3467dc0fd4d0890751d7cb963d6d,2025-02-10T14:44:21.583000 -CVE-2025-0174,0,0,b96eb7ec7356477cf2a10d16ac490891645b5d85786bb5a6645ff5d35f496492,2025-02-18T22:15:16 -CVE-2025-0175,0,0,610ba6c51786e3f45871a3d86f83a4e4dcded95032b8f2bd05a11f366aa642d1,2025-02-18T22:15:16.190000 +CVE-2025-0174,0,1,84f1fc787fc1b255e628f687b3e953e478c0ebbcf6d43f7054046ca50c1fba65,2025-02-18T22:15:16 +CVE-2025-0175,0,1,bdbbff62e59a577df978c25986bbe74d2c369444cdb18d004fda301a341568c6,2025-02-18T22:15:16.190000 CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000 -CVE-2025-0178,0,0,89e50502ff0cbfc26ba7cea81071ad18d04e59873702eed17df9408444fc6db7,2025-02-14T14:15:32.403000 +CVE-2025-0178,0,1,fa4aecdbab2bf6f6394dc2df9bf8c55c7d75d01fd2b6cc09da6f0392b1ff3701,2025-02-14T14:15:32.403000 CVE-2025-0180,0,0,45564097f8949edeaed9ca9ee45d4b95a2a515d148fe7f516835a6a631636cf0,2025-02-11T07:15:29.277000 CVE-2025-0181,0,0,3daa095a8ef29b155e27eb528b6494dc885d5fb57d0193f8fe2a690199fb3ae3,2025-02-11T07:15:29.827000 CVE-2025-0193,0,0,4b495b56d409bb2765dbaf3314ca8b3a799ee7c0066963e20e79ccdf36f04c1e,2025-01-15T11:15:09.280000 CVE-2025-0194,0,0,ea5b846283dddc32441a679fd768e96aa19b3c1d104aaa33d0e1c65fbeb54de6,2025-01-09T07:15:27.667000 -CVE-2025-0195,0,0,4a31363a70a4527ce2e7dcee4bd65277485625f8cdc86358a3b4c344e22b0b11,2025-01-03T18:15:17.317000 -CVE-2025-0196,0,0,458f6c452cca173c50823549ec3211c7f71e44d78eccfc5dd05b05e882d53952,2025-01-03T19:15:12.793000 -CVE-2025-0197,0,0,6c5400440b0f9e49929925893dc9ec65ab159412a9c28b32b37aab9499c0ea0e,2025-01-03T20:15:28.873000 -CVE-2025-0198,0,0,e0434b685f3c0b2d8b346f075c44115eb14400547bd444c7c7ce380d36c7f6be,2025-01-03T21:15:14.053000 -CVE-2025-0199,0,0,865eff50876368f6ac555513ef5b5fdc0dc9570302fec6e10d6fc34ec2c217da,2025-01-03T23:15:08.707000 -CVE-2025-0200,0,0,1c56f86e27712fa129121bf2c2fd0e92b6fdb9217c52909f73ec929344fbe1a0,2025-01-04T03:15:07.020000 -CVE-2025-0201,0,0,30d561bbfd9ec1b18fbccd47b917b093d8cbccc70befce1eb07ea9e1538c205f,2025-01-04T04:15:05.620000 +CVE-2025-0195,0,1,646d83ff864390cc0fc3fb90825e279b7e5ec5f4da65b91310c2b6cd97ad7098,2025-01-03T18:15:17.317000 +CVE-2025-0196,0,1,18fff9b1fa5d541c7d3ae9ec71e39c186ae8f3efd4ad6c32682376b4257ba775,2025-01-03T19:15:12.793000 +CVE-2025-0197,0,1,42b836cbf22a648ab30dfadfe9c0cdc9fdfd936514747dd33291e865d223d20b,2025-01-03T20:15:28.873000 +CVE-2025-0198,0,1,0d9f94ac8483ff87d3ab884a98b791ead3b10914295c4281db486a8bd54f1c6f,2025-01-03T21:15:14.053000 +CVE-2025-0199,0,1,74873377ace264d8f1a307495538c8b97005525f769594b9480ed8554fea083d,2025-01-03T23:15:08.707000 +CVE-2025-0200,0,1,990c18d301a1f9561d4f50d8c35ba68aa905314a053f0e243fdbde3501386653,2025-01-04T03:15:07.020000 +CVE-2025-0201,0,1,a9dfe572dd200a69b585fe03e28d2a0823c1102c1795d99a90e7abad62806f02,2025-01-04T04:15:05.620000 CVE-2025-0202,0,0,4c4572616f5f93191d3ca13fa7d12bcd95c17e726cd3cc4bf6f102513e2b629c,2025-01-22T07:15:16.570000 CVE-2025-0203,0,0,a5f6177ca59532137b7b1f2b25e590caf5585a2f4c15e38814775e99d2a98cb0,2025-01-22T15:47:10.633000 CVE-2025-0204,0,0,c001082b579b79c29609669bbec6a0725a6fcece40acb248427f26e9b7e4a830,2025-01-22T15:42:44.060000 @@ -279044,7 +279044,7 @@ CVE-2025-0297,0,0,0eacedc5d569a6e4cd93d6fc57977d9ca29c3a72fc215125fc7066f16dca1f CVE-2025-0298,0,0,38bd8b504935de17b14dec7825327a650ad8a3d464a7f511fccd61b0c6cb74ae,2025-01-07T17:15:31.770000 CVE-2025-0299,0,0,3081f6deab5547666aabb0e346ae06d6f615099839721c542410106d67cb7c77,2025-01-07T19:15:34.743000 CVE-2025-0300,0,0,8b048794f60fe275045fdbb30c1864513f09183fd67ca00f819acbe6a078dfaf,2025-01-07T17:15:32.090000 -CVE-2025-0301,0,0,cda9ba0b82510401c2a22912601ff18ed3f9b7d844758d6122fa1a90dc462c4a,2025-01-07T18:15:21.460000 +CVE-2025-0301,0,1,2477c65f5e3d890f4b69eb8a9a90e04c22ba0f7b4f174d53cdae88bb4bf1da42,2025-01-07T18:15:21.460000 CVE-2025-0302,0,0,520b4ce71044c2e5dd315ae70c4e78b808744ca684e983c2820d810ca427b2fc,2025-02-11T17:25:36.827000 CVE-2025-0303,0,0,427e73f8656e75f13eb1b1ae61974ae7fcbdff3a8a9b74fdeed4977c74ce26a7,2025-02-11T17:25:01.207000 CVE-2025-0304,0,0,43b635378f7d41d7ad8fab43684b25af88aaa82c7d23dc9598f346a0a6654f13,2025-02-11T17:24:47.520000 @@ -279062,21 +279062,21 @@ CVE-2025-0331,0,0,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694 CVE-2025-0332,0,0,10e294c3bcb66386a9705e885fda97504f486a40642545ec52dba01d6b68bca7,2025-02-21T12:03:31.920000 CVE-2025-0333,0,0,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,e3a8c3debfd678ee7c1344f925152dfd8cfa42591be5b844f5f2a9504bc9f616,2025-01-09T06:15:15.610000 -CVE-2025-0335,0,0,ba6bd83ac72a18cacfb4c8aed3dc5b6304b883b41ec133eb940fb09de3e363fd,2025-01-09T06:15:15.850000 -CVE-2025-0336,0,0,4043fb76d696744bf28ebcae268d568809361da636e9237c0e97b1fdbcecfb6a,2025-01-09T07:15:27.860000 -CVE-2025-0339,0,0,cbbfea6db0802da47d039e5c973152ba413cad2d917d267fa4913f6c5b7b2f83,2025-01-09T07:15:28.080000 -CVE-2025-0340,0,0,9f8d7dfd4d7674caee1cd6596de44a56e721410bd02446351bb9cfe3109bd378,2025-01-09T07:15:28.260000 +CVE-2025-0335,0,1,ec031a1973cebb0e5eef8d03c0d4bdd7ebb611e334d40e4e8fe93f73bc0d1066,2025-01-09T06:15:15.850000 +CVE-2025-0336,0,1,bb91510d2532c90139ca8ff5b2380505f670c1f4f46badd5231ee12701d6289e,2025-01-09T07:15:27.860000 +CVE-2025-0339,0,1,ebb4065aac85a3a21e829aecc65d9cc87d522576682ca67360f25223e12e55b8,2025-01-09T07:15:28.080000 +CVE-2025-0340,0,1,1236243e46a64cb0bb97e31f5ab637189c9780a953a1d6d04462da61667f4dcc,2025-01-09T07:15:28.260000 CVE-2025-0341,0,0,34691be6c91dee5a7eddd15393d10444959b571a53ae5dc2cf37690cab93d762,2025-01-09T08:15:30.060000 CVE-2025-0342,0,0,c0ced5aaf34287279d842270e764809b2ee2324b19427e671c3863b96f97c211,2025-01-09T08:15:30.310000 CVE-2025-0343,0,0,2f07750fbab5848d7fd769193ff51e5044832fbe65109094687a56b43364aa58,2025-02-18T22:15:16.350000 CVE-2025-0344,0,0,01437ae923f1cc2bbba7f217401e4d3cbf96038b1beb917f0e2b7fe28b7c2e1b,2025-01-09T08:15:30.517000 CVE-2025-0345,0,0,c3d5fb4ce1a2ffd9e41165f9ffe772836159a0e2b94ea1d233a347865b0f3929,2025-01-09T09:15:09.220000 -CVE-2025-0346,0,0,3ca882ed5f0f6ff30f77b6214e7e7bdd383925e6a59aee9ebd80a0c7383e3bae,2025-01-09T09:15:09.393000 -CVE-2025-0347,0,0,ec55ad444ba1a81cdc39b917c4d69e23fb6f894614506108703cecaf8b681d74,2025-01-09T10:15:07.170000 +CVE-2025-0346,0,1,74fa913a66321213946dd2f256aae491e1ab8d607275c4124367d825c8023664,2025-01-09T09:15:09.393000 +CVE-2025-0347,0,1,27c9fe17b02d328429a37335b6c1a1a5fa9020308994401e409408fef48673e9,2025-01-09T10:15:07.170000 CVE-2025-0348,0,0,caf29c7d10aa1d0bc868897d1f5fe71d1c997b913af05adf015858af50a20840,2025-01-09T10:15:07.700000 CVE-2025-0349,0,0,5c5bde0373ec0c26c713a0d565cd6e4461e0dfe3c3d54fa435cc26640f811d63,2025-01-09T11:15:16.547000 CVE-2025-0350,0,0,568075e13fb305f34efa279da3968d622f1d523cffbec586aa7d1232c4534cda,2025-02-04T20:36:53.180000 -CVE-2025-0352,0,0,f5da0815992f94ec0adf1d19334f2e7405f2e7e98b9f72b2256e1c03a1139d72,2025-02-20T20:15:46.383000 +CVE-2025-0352,0,1,4d57a96110bff70c485f7e77ebcc2662cefe4fa4e98754c6a362772f336511f2,2025-02-20T20:15:46.383000 CVE-2025-0353,0,0,fefe78eacfc73b3da0e296010fc7bc87595c20639bad926c14a54ed0a611d0ba,2025-01-29T12:15:29.477000 CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49f1,2025-02-17T10:15:08.767000 CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000 @@ -279117,10 +279117,10 @@ CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc7136 CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0413,0,0,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000 -CVE-2025-0422,0,0,e3c5a06c0c96e5b0131758ea8d9f32a2ee2c48b0c3e97a36b47be9b84aecd05b,2025-02-18T08:15:10.147000 -CVE-2025-0423,0,0,c05e49f8bc53a5bcbcc1c2ecd8ffe5916ceff7106cf7d8443073a918e1f8cb6b,2025-02-18T08:15:10.360000 -CVE-2025-0424,0,0,d05eb660349a1243a1bbacf43923c5dac99d9efb16a2f8cb5d47ed724d5e60f2,2025-02-18T08:15:10.490000 -CVE-2025-0425,0,0,0197be9b9b61d28cf57a84b48764c854a48a9c5583689fbdfa0627c74d94c9a5,2025-02-18T08:15:10.597000 +CVE-2025-0422,0,1,797a2fd736c6ba0fe426618e3a0bc8198327b7db0c5020d6eb6c72ad96b25275,2025-02-18T08:15:10.147000 +CVE-2025-0423,0,1,e413f48054466744da1053302efe8bff2ab921e4df82fdcbd8b4a2f4c085bdac,2025-02-18T08:15:10.360000 +CVE-2025-0424,0,1,9a520dc2673525383feeeab75e842208e189cd50a4d96840df051266447b2795,2025-02-18T08:15:10.490000 +CVE-2025-0425,0,1,fb291ac86c2ab5e9fb0dc024f63a14d3e9ca529bc92aec5aa5f41c4119d45757,2025-02-18T08:15:10.597000 CVE-2025-0426,0,0,3066c25cbdc0db466cbcd8d2b93cf410724b054db8536dfcb0c3e103d2688218,2025-02-13T17:17:19.863000 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 @@ -279167,14 +279167,14 @@ CVE-2025-0480,0,0,0cb09a8f6ce0b89170992f0c154f24058b4f34598442baf21a60641247a527 CVE-2025-0481,0,0,ea23d14dcc3acce7aaf6b481730febc16b60b2cfb742b3ce32274b3236e29b50,2025-01-15T19:15:26.807000 CVE-2025-0482,0,0,51755e11e1fe85bcdf8c3ef7c747a7a90c189e81d239d3c797b168fc9a111599,2025-01-15T21:15:14.653000 CVE-2025-0483,0,0,121ceb10d05ea57965d73fd7de54dea21193e629abb8500fadaeee53de942954,2025-01-15T20:15:29.040000 -CVE-2025-0484,0,0,92d63d2b50ec1984b131e9463fd102abf018e44374062d31835457a5d554d3d4,2025-01-15T20:15:29.227000 -CVE-2025-0485,0,0,5dfbf9e60197c677be8996c393b954ccd6f5c08903b3e5a026b6b02b15a407fe,2025-01-15T20:15:29.400000 -CVE-2025-0486,0,0,f674e5967d2ad379c1d35c08c0d5d0cd79e16dc9ca92b0757a840b020e89fc38,2025-01-15T21:15:14.960000 -CVE-2025-0487,0,0,9a6f935b511f835cdcb3153dfd2ce2cc55e17783eef32d34026b854d4ebb41e7,2025-01-15T21:15:15.160000 +CVE-2025-0484,0,1,5d5a4a9d3f7b9844e6338826315829b71863445188b7471986092b7338301e03,2025-01-15T20:15:29.227000 +CVE-2025-0485,0,1,1c51c241c0b181d219b13061492d35498f2fe23f7a294b89a9b2d76f14884dc0,2025-01-15T20:15:29.400000 +CVE-2025-0486,0,1,ffc4b4d939ea32a294130084f2e1d9ac9b92efe1feb63eae5d70c0f8a3575cdd,2025-01-15T21:15:14.960000 +CVE-2025-0487,0,1,064fdd3baedef30affb712b3282f839a4264ed9261f2f202bfe3e2044ca760a9,2025-01-15T21:15:15.160000 CVE-2025-0488,0,0,5a2c8f931caf677c96dc18607ae260506970639c6e34580d9069775d9be6fc5b,2025-01-16T16:15:35.347000 CVE-2025-0489,0,0,a24dc8200140f72a873da603310104369ecbf6fd64e7830d413cb9f47b4c7d0e,2025-01-16T16:15:35.517000 CVE-2025-0490,0,0,1f384416061d2dbf3f188e10aae42ad077e67eabf02b270fb3286b559e5f665e,2025-01-16T16:15:35.653000 -CVE-2025-0491,0,0,a2df37225351b197908dab4eef671d4122bfdb72a19e53971029c11f697c589c,2025-01-15T22:15:26.990000 +CVE-2025-0491,0,1,a74681010c0dcf626dfe7004c22d4a12c280458c5f2e674aca67f97113f68a1c,2025-01-15T22:15:26.990000 CVE-2025-0492,0,0,84421fce7cc144b94f0258c9d48e69eeae8d312d182afca6c8016ab8e7304bc8,2025-01-15T22:15:27.157000 CVE-2025-0493,0,0,fdfc8e0b7f438cb924061cba763cc9775cadf54d53fcaa6b7c0c5eccbf337244,2025-01-31T05:15:10.087000 CVE-2025-0497,0,0,423124bf24ced39e339476c6d2a6bb1ae8c797c5f19787cb8347a4dcc77d9d50,2025-01-30T18:15:32.493000 @@ -279183,7 +279183,7 @@ CVE-2025-0499,0,0,42871b7d04896bad08e4e2a0f52be498a4b936aaa56513408d624ca2987d2d CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed205,2025-01-29T19:15:18.870000 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 -CVE-2025-0503,0,0,1c28203001e43c279e03305b394a02204f5941f974df8145add898a6abc17980,2025-02-14T18:15:23.870000 +CVE-2025-0503,0,1,c6d64822222ac6c06145cfb239458ff6b1c737aaa6432c3c27c69233b3ebf7a8,2025-02-14T18:15:23.870000 CVE-2025-0506,0,0,ba986da4eedc5b7116688c6e242efdc143017424666b261a5d72ef024c0a20aa,2025-02-18T18:15:28.670000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 CVE-2025-0509,0,0,913ed89216296740c4c407c24a56b36bddc347f56451a23b8f05b7d47d26ebb6,2025-02-17T12:15:27.370000 @@ -279198,20 +279198,20 @@ CVE-2025-0521,0,0,ae94a1fe73318139f9da2622de592c6e10d25105d56f65a8078c6428a35bf2 CVE-2025-0522,0,0,049494dc5db0d63aea89474c83a4309664a2b8074bd7164b1ed7fff81c86960f,2025-02-18T19:15:23.177000 CVE-2025-0525,0,0,c288f27e7cbfee2400ae138222cd0f0778e1304ba3ca58c91a31add13accca58,2025-02-18T18:15:28.850000 CVE-2025-0526,0,0,72c048b07f37484ff5411cf9170da2e1d74699bcf31208d52953a5f6b4d6ef19,2025-02-18T18:15:28.993000 -CVE-2025-0527,0,0,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000 +CVE-2025-0527,0,1,535d17cae67b0f99682675b0d97259af22f1df8bb2bd9628c1d9b5a86ecec337,2025-01-17T14:15:32.840000 CVE-2025-0528,0,0,e3f7a40f975e109bf5214cfef482edb88f65284729988309787cc2f9ee957859,2025-01-17T15:15:12.430000 -CVE-2025-0529,0,0,b7599e714e3df556905823f6cbc3ee4b0615bbfc883d87e213cfa26e9ecdbabb,2025-01-17T15:15:12.670000 -CVE-2025-0530,0,0,880ebd5c2e3e16a0178d5956810c2f8d863e8c374c27881fd797cbb15a4aa313,2025-01-17T16:15:33.937000 -CVE-2025-0531,0,0,4b60c2c1860877e99541b9d489b8f336ac72e7ec80c53e83f54ef57a3ad8cbc3,2025-01-17T16:15:34.250000 +CVE-2025-0529,0,1,9e4659907a3be108e9f4319d6777ccccf94be0d12658e2b4f7118bbb6ce49614,2025-01-17T15:15:12.670000 +CVE-2025-0530,0,1,e0ae4b2650fd92183a204eebeca69e9f33acbfd23fc1cb4079b33d433a264f65,2025-01-17T16:15:33.937000 +CVE-2025-0531,0,1,049525179a4829b714ca5515970cc9ba2d51e61d337e9c530ecc7d45d7bcdbe5,2025-01-17T16:15:34.250000 CVE-2025-0532,0,0,e13cfbfb42c9094cf8c5a6935bd3b0d442799ada29316df86f31dce0e09823f1,2025-01-21T16:15:14.560000 CVE-2025-0533,0,0,1dedd3e4a1234a5a47eb7b62083704d58f5b3df0c80e59037ac80e845228d0e2,2025-01-17T21:15:10.487000 CVE-2025-0534,0,0,34983a4241e36f3fc78b62b2b2d44b507f8674acd51eab0825ea4c631744e146,2025-01-17T21:15:10.650000 CVE-2025-0535,0,0,104e981e15294dcff5cba7f6eadb4a5b0a5c7a8c4d210171d1e7e3c26467bb96,2025-01-21T17:15:16.677000 -CVE-2025-0536,0,0,450b477dc0d2d4fab7e064af8be5e0569f64a4fa6080592520dccc9dc928926e,2025-01-17T20:15:29.583000 +CVE-2025-0536,0,1,c01d5d2a07fcaafd10e4397d5a3ddfabd1843d2d3ca667044439eb52a9404455,2025-01-17T20:15:29.583000 CVE-2025-0537,0,0,894ca9fbbe384493d64f2a37b8b72d96a2834b74c07eb0b8b0a38b49bc831647,2025-02-21T21:32:41.437000 CVE-2025-0538,0,0,ae333bde31df5a949ae8fada123983011702b82d63cde2237c7aebffccba8f78,2025-02-21T21:22:54.457000 CVE-2025-0540,0,0,4df88905a96b8b4cb78de73746446aceffb96c461677802362e17d3281aba7d9,2025-02-07T14:58:25.477000 -CVE-2025-0541,0,0,2bcf4b49dafe0ca8072dca95d533896ed37e1521635c2f052072b52c75beca7e,2025-01-17T22:15:29.337000 +CVE-2025-0541,0,1,eebcca736351c790b33d073ffb15589f95564ecb6d690adbf6855680ac0d891d,2025-01-17T22:15:29.337000 CVE-2025-0542,0,0,20d694a09804286361feeafaf90a4c3710af9ee4f076a4817f46453b45a4bf83,2025-01-25T17:15:21.030000 CVE-2025-0543,0,0,97c8d3fe60003fabb6ebf6a84fa27757230cb958341ec2b8d0886e83538320e0,2025-01-25T17:15:21.720000 CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 @@ -279221,9 +279221,9 @@ CVE-2025-0558,0,0,27ffe131a6321b0cb805cae5fc680fb74b1dcbc47a4ad8efbfdf40a5f678d3 CVE-2025-0559,0,0,0a800171c944689ff17e82031a900e5ceea035631c8364601a835471cdd72821,2025-01-18T14:15:25.420000 CVE-2025-0560,0,0,e77afe8274e70825762583db5d3f4f7b4102d4740927e5bb9870063ef31b46fd,2025-01-18T15:15:08.343000 CVE-2025-0561,0,0,e6edebce5792adf85a502374fc32d0205e36f9e2623af0020250ad96c2210605,2025-02-07T14:58:43.060000 -CVE-2025-0562,0,0,e5aaaf44b32efc0666630cfaff96c171c72d4cee7e5cb5692b5ebff44d9e90ad,2025-01-19T02:15:24.380000 -CVE-2025-0563,0,0,ef7f44d10f793d1a3544b68b3af5562459dc53b1a17c78226f8657e7c2bb608a,2025-01-19T02:15:24.560000 -CVE-2025-0564,0,0,650024fd0623317926e582a4bc38450ac7a271a00a83ea4a9c09178300ec9577,2025-01-19T04:15:07.090000 +CVE-2025-0562,0,1,f77985c2e7fc601d6b11cc9dd21c2ed7b92768a374cec126e28edb6f46cbefa5,2025-01-19T02:15:24.380000 +CVE-2025-0563,0,1,c7170d4f44fd8b796d41fd0a2affd8d7a58ab9d63fd98e94bd91f9bbb985b015,2025-01-19T02:15:24.560000 +CVE-2025-0564,0,1,421f55643a6f851802cb02bfaa49f8c662d6cba28b3a54680cd88b0ff4f771de,2025-01-19T04:15:07.090000 CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000 CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000 CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000 @@ -279248,9 +279248,9 @@ CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b4 CVE-2025-0588,0,0,d2fa85707b0a520f26e49cd106b0316ac9358a5318ae8c21637a975b482ec3aa,2025-02-11T15:15:19.673000 CVE-2025-0589,0,0,011f5314ba330effc1b70ac831c8799f8f01d30011f03d50ea7f87b83c919e4c,2025-02-11T16:15:49.667000 CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237d6,2025-02-18T20:15:23.477000 -CVE-2025-0591,0,0,108a322fc8864bf59143171a497126c3fae4b8bc99c96e929cad289a15c67aa9,2025-02-17T00:15:08.987000 -CVE-2025-0592,0,0,9c3e5d0ff9cc82391565af486c296ae6493bbd4a2a7ae16e355a2a28eaf964e2,2025-02-14T21:15:16.543000 -CVE-2025-0593,0,0,c6a547b5cc74d50c18b27627e5aae76ed907e58cd955b960e2bc11cb240d5378,2025-02-14T21:15:16.680000 +CVE-2025-0591,0,1,5ca336db928308102899197267a68ce943ef2127caf2d3907c9795083e5911da,2025-02-17T00:15:08.987000 +CVE-2025-0592,0,1,22a052da0b840e173f2eb455163615afee93b1d33ede0fc738dde7ebab003b6e,2025-02-14T21:15:16.543000 +CVE-2025-0593,0,1,9f5d88f277affacaa2c754d76b4ff87935a4a3d130a2772ff884da387ed67030,2025-02-14T21:15:16.680000 CVE-2025-0604,0,0,dc946f3b45eac1c2c9970fb51178c4296c8c05d608ff98e71aad731de2b62daa,2025-01-22T15:15:14.827000 CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000 CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000 @@ -279258,14 +279258,14 @@ CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488 CVE-2025-0615,0,0,ebbe675921592ae8cbe2172db6e2765a464d273fff841eec1146e0ddf51f2dff,2025-01-21T12:15:27.737000 CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af4e,2025-01-29T11:15:09.330000 CVE-2025-0619,0,0,4df0f1bd81c8d5a23d2b8c9afb7f80cd01c44a5decabbf0e0132f5e604f5fb23,2025-01-23T11:15:10.700000 -CVE-2025-0622,0,0,52c7344ba74f3f90303f5233d8ecf10736f62a5ca9e92aae49baaee25aaad811,2025-02-18T20:15:23.570000 +CVE-2025-0622,0,1,a6a193274731f6c7dfaba57b90f3e73d71577adcaea95e1ee069d69beb79d1f1,2025-02-18T20:15:23.570000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 -CVE-2025-0624,0,0,9bed9ba7d76bbaa8591715c68a7604b582d8ade50d506e310cb332e68c34af4a,2025-02-19T19:15:15.120000 +CVE-2025-0624,0,1,e574dbadcedb62d6ec5fc83ee445f795570d6b514ffea1920d6ad509cbc9be05,2025-02-19T19:15:15.120000 CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000 CVE-2025-0626,0,0,0077dccae97439405bab713571a124bd093984b1ee0c361ef3ff1afd6c248462,2025-01-31T17:15:16.323000 CVE-2025-0630,0,0,a203846e431374935835f3b6e314fad6940377ee142abf426ce77275aa7cba26,2025-02-04T20:15:49.940000 CVE-2025-0631,0,0,a91b2711b77974f80919f9c5b372be80fd124e74c35c8b96965898a857e3e98a,2025-01-28T19:15:14.270000 -CVE-2025-0633,0,0,cb8a197e6c4c53fc2cbfd67d19d376a8624ac2f322a88243266a770a17e4624b,2025-02-19T07:15:33.537000 +CVE-2025-0633,0,1,99b5597a4d6745e0fdc49c871283cdb64a4adc9d1a5288ea05a1df36fe7875e0,2025-02-19T07:15:33.537000 CVE-2025-0635,0,0,70c8222d27016e17aff5c1d526075d61ce18278ab51b947a8b84bf01759f271d,2025-01-23T11:15:10.890000 CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000 CVE-2025-0638,0,0,d2f28f2eed7bea7b9f8ec19bd8fd1769a6b74ef8696049ed8fd676bfab511c4b,2025-01-22T16:15:29.977000 @@ -279278,7 +279278,7 @@ CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd74 CVE-2025-0665,0,0,32d62a31dda68c00a725e820e49c088e5a4c0cbb7a3a5fc704b21339eef4d91c,2025-02-18T19:15:23.280000 CVE-2025-0674,0,0,f9a5b719b45bd5bb8c1b4e4a7f4ed3325700578bc985184c525f090e2005e85a,2025-02-07T00:15:27.017000 CVE-2025-0675,0,0,c83ba7f801d9e9425c42312877c598809734ea9e1738367b5911dd154e894a10,2025-02-07T00:15:28.030000 -CVE-2025-0677,0,0,77460fdea38af4fd30362f209785dc5f816f1d138ba38a35a5a982c61f554c56,2025-02-19T19:15:15.280000 +CVE-2025-0677,0,1,ea88300cfbdd0b4ea81919aa9db3bbe60bbbdde0392ab3fce43e61c4637967f3,2025-02-19T19:15:15.280000 CVE-2025-0680,0,0,12c78670909e60210afb321c5c55c759452f5848b71a1a0162a282c763d5033b,2025-01-30T19:15:14.147000 CVE-2025-0681,0,0,938db0e5190e161ed989ccb4c84d5297432f7561de8078fdf9969ec60d4620a5,2025-01-30T19:15:14.300000 CVE-2025-0682,0,0,82dc327006a11cf9eb8ed15c2db6bd7a0cc541bc0cc289fa88e6bc57635c989b,2025-01-25T06:15:28.740000 @@ -279303,8 +279303,8 @@ CVE-2025-0709,0,0,156b4593a93fa854ef60a86f01a55e00fa0c092a95e57a097f43efa6d6f6b8 CVE-2025-0710,0,0,d434afd262bceee38318c1978d6fd83eef213e4c7163f6e3a198919727021a6b,2025-01-24T21:15:11.420000 CVE-2025-0714,0,0,7a5ace77913ec81f29c63850fa9378895a034df434a64ef2c1dd7b18a728bf62,2025-02-19T09:15:09.863000 CVE-2025-0720,0,0,602262593ab5841efad088d2b78c277a4b7966a622beefaf31478d2cb3826706,2025-01-26T23:15:21.547000 -CVE-2025-0721,0,0,9b15b019b479c4479137e55c74f2da2652b1f56c2d67e45558507ea73a96e795,2025-01-27T00:15:26.317000 -CVE-2025-0722,0,0,d286657780f2322cec5dfe4e8af4674bbdc5e8a8b778a753270cdbdd213a2c1d,2025-01-27T00:15:26.517000 +CVE-2025-0721,0,1,936508f0de6654a4af6645bfc2b3d64c9486b7c4e295b4efbd101ca5908b6424,2025-01-27T00:15:26.317000 +CVE-2025-0722,0,1,e919cb019d641988d9ed9adb1c88dd5dac34c22dec702b9bbb017834ed4cfc74,2025-01-27T00:15:26.517000 CVE-2025-0725,0,0,933a9ff65143c6df56b3e49502ce5d61c7538865f62de87a7e6b7da33078c72d,2025-02-06T19:15:19.733000 CVE-2025-0726,0,0,212658285d0dca65eb38afbe2d0cc022419c14eff42b3a61d47e964a9493cddf,2025-02-21T08:15:28.417000 CVE-2025-0727,0,0,bb76426d7360ab591b4341810574104175a8b841230e45a68fe25f6f54b22f96,2025-02-21T09:15:09.010000 @@ -279347,7 +279347,7 @@ CVE-2025-0795,0,0,78c31d616d37a01317d5bb724bd6c565c80d9cf22aaf5d4fae4283f153b591 CVE-2025-0796,0,0,f761e4ee9090b929108a57155497189521139b54b85523bfa7225477c9e9a330,2025-02-21T15:47:52.213000 CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cbf9,2025-01-29T02:15:27.010000 CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000 -CVE-2025-0799,0,0,af43bf4a5768ce0bfb94d428736daaedcdfb3eccbac5f00bb0b5a7f9f2fd815b,2025-02-06T01:15:09.580000 +CVE-2025-0799,0,1,24d7e10897e858e097e83298564d3196763b9824077dbf2b4283317ae2c0fd13,2025-02-06T01:15:09.580000 CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224bc,2025-02-10T14:11:58.423000 CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000 CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000 @@ -279360,15 +279360,15 @@ CVE-2025-0814,0,0,6e84b81253656a1d32a82ba911740347214b0ddf70b532a879c2dbfdc544f5 CVE-2025-0815,0,0,7de889e4d3bd0a2a91237ff690c09d713b31f9d5f2a51b5b2591129d680ff441,2025-02-13T07:15:11.160000 CVE-2025-0816,0,0,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c34291,2025-02-13T07:15:11.353000 CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000 -CVE-2025-0821,0,0,eef623ecbc4f931b67c977737dbf8b956ec963ba6d7dfab149142eb36bc3e525,2025-02-14T11:15:10.230000 -CVE-2025-0822,0,0,19eb63234ef431f63c50ebd89131653cdb608481cafa3dc46ad8d59b634f7d92,2025-02-15T13:15:28.847000 +CVE-2025-0821,0,1,c0f9c17d34dd02f439cce895873742df5bc79e8c6fc655f0e6995bd60a46355b,2025-02-14T11:15:10.230000 +CVE-2025-0822,0,1,4dbfe0c9d89004216dc5d62de0243d8cb98f1e9066121799187ec9e56830fb59,2025-02-15T13:15:28.847000 CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0837,0,0,01e74bd6a538b225c25e0ddb96358a3be7f6e922db9f297c9866ebad58b8fb7d,2025-02-13T05:15:14.623000 CVE-2025-0838,0,0,b3bedc01b96cdbe25c8f6922cea4e94abd529b95831b6c6b3a257c0f4033b9cb,2025-02-21T15:15:11.890000 CVE-2025-0840,0,0,dcc73de0595740e9bb877d1b68b6e13f7a74ad4d50a26f82e22ce56d8c04db6b,2025-01-29T20:15:35.007000 CVE-2025-0841,0,0,d34ffb164e9f6e4e065c3a7bf9858f8af34d279265f630e92f70d22138303c3f,2025-01-29T21:15:20.973000 -CVE-2025-0842,0,0,817f7fca87e6acf8de7da5acb91e6b0b68dcf3f7c69a8b83dc023ca38974b3a1,2025-01-29T22:15:30.283000 +CVE-2025-0842,0,1,919c3cc310b757a59c0da39f6dfae0b3cc8dd5398a5154738619d1178827202b,2025-01-29T22:15:30.283000 CVE-2025-0843,0,0,6fdf3fe66f4d86304c784cf4fdd64d147888b8fe4570e7d1845ef3b7d1c9abbc,2025-02-04T17:16:08.127000 CVE-2025-0844,0,0,a7cf600392830d8d2a126f48d06b8b91ad72d1fa6d813471c2a18439ba70c1d1,2025-02-04T17:17:18.457000 CVE-2025-0846,0,0,a5652316e4d2a87c8e4e7eada54d0a2ca9765b5059002cbb6848bf67345c7f05,2025-02-04T16:49:08.027000 @@ -279382,23 +279382,23 @@ CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000 CVE-2025-0864,0,0,f624aa3dae4420585b7ecd223f0cdc2320b0f2cdeffb279c09c255206ab70361,2025-02-21T15:32:38.470000 -CVE-2025-0865,0,0,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000 -CVE-2025-0866,0,0,3255655eeba447d8936ae6bd9253ad70311926c87296ef63be450f30c50c2dad,2025-02-20T10:15:11.980000 -CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000 -CVE-2025-0868,0,0,2c448a5ed3ab20073b56135a44718b4d9781c8edb3d0e307328b67014db43ddf,2025-02-20T12:15:10.893000 +CVE-2025-0865,0,1,dcbc5e15715dca7e642aadc3c3cb5ed6c859fb30f2ec25e7762f785312929b6b,2025-02-19T08:15:21.853000 +CVE-2025-0866,0,1,98c552b22782fa8a578d752540254c33bb53071d5c3659aeef8fd23edad83ed8,2025-02-20T10:15:11.980000 +CVE-2025-0867,0,1,4fde11566279a15e445605316c6a028d3da8ac1ab7e4268f517e24d9af6fe0a0,2025-02-14T13:15:42.620000 +CVE-2025-0868,0,1,b42d21086a2b185262e5aabf1ef8fd626b00c40149917da94767dee32aa037e8,2025-02-20T12:15:10.893000 CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000 CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000 CVE-2025-0871,0,0,dd996ab8d2585030114b224f83df5a23f791f2cd7e1f4d3d28ceff15bb663996,2025-01-30T15:15:18.253000 CVE-2025-0872,0,0,9f3c8a418b52c3ad3302c201afe2a6adcd89162530131111ef81bf0ef5e85f16,2025-02-07T14:07:40.797000 CVE-2025-0873,0,0,9bf3802a68222268194ab3d10499a7b12aebfeb0c397a540d686feede1f0efea,2025-02-07T14:05:17.653000 CVE-2025-0874,0,0,b8572537da2e045e2829a07f0a51ab0f5b85adffa940a3aadd3fdb4cbae9a4ca,2025-02-21T21:36:58.723000 -CVE-2025-0880,0,0,c12e2a46de37af2c312b8e3728a724b2552e715b0e742ce54a8ac8366d35c82a,2025-01-30T21:15:14.487000 +CVE-2025-0880,0,1,24d8c49575ad0d3d042d95a8b0b0e3964083eec8a36994050f5d19dd0e2ea94c,2025-01-30T21:15:14.487000 CVE-2025-0881,0,0,c0b87ae49840b2495e4993b7143628de7aaa51e127538c05ffa700ec31c486f2,2025-01-30T22:15:09.950000 -CVE-2025-0882,0,0,f8cdd5be4a5ead42b24a22ef4df5e88faf0b516030bc2a511e27ba50d819cc7f,2025-01-30T21:15:14.820000 +CVE-2025-0882,0,1,4d1cd77ec49546f34f96ca74e3bd7ccc80b07208638756dae2390188e62a6e50,2025-01-30T21:15:14.820000 CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000 -CVE-2025-0893,0,0,872c69097c7b2ec13b302ffd3b210287444f3dcfd1f7ff02519c618f95b70473,2025-02-19T18:15:24.127000 +CVE-2025-0893,0,1,6db1785577b11d9c0f80255d5dcae1d7c0eabc239e3cf19e2ae2ac23422990f0,2025-02-19T18:15:24.127000 CVE-2025-0896,0,0,ecb21883de9b1361a3658cc48f44fdef2f626a3624bc2d70212f10094545a767,2025-02-13T02:15:29.470000 -CVE-2025-0897,0,0,cade221d6eb479db908dde72749d854eec08ffca27791d62f68eff32758aed4b,2025-02-20T09:15:09.750000 +CVE-2025-0897,0,1,83b68bee139401f3bf44f87cfac31402a9f653407c26f4e8a8e179a34e47c4ed,2025-02-20T09:15:09.750000 CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000 CVE-2025-0901,0,0,8576e90f3f88086e5daf580b6c523f255280985c9bdf2649941334bc2c0fff8f,2025-02-12T19:00:52.577000 CVE-2025-0902,0,0,d3b3b12c4b0c7e57e30c3d4cf431b37a3914287ec889acdcd9941b6c82bdf01c,2025-02-12T19:00:34.533000 @@ -279411,15 +279411,15 @@ CVE-2025-0908,0,0,d299598e6a9f28ce78543471bc7557b8f443bf108ba075d719a9c0a22f15b6 CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e70,2025-02-12T18:59:31.043000 CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000 CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17 -CVE-2025-0916,0,0,9f634049c98a708569d7f2be6c0fdaeeb2a62cd7e2136bc12c84981688ac3796,2025-02-19T12:15:31.630000 +CVE-2025-0916,0,1,de516223b02ee3f0517c383d547ec6a77e88f67c8e90871cc64fda4715ad9f5b,2025-02-19T12:15:31.630000 CVE-2025-0918,0,0,3a735425a74a1c0bbfdbd7a0fbcbdab0443a6b145783519e1d180e6751979379,2025-02-22T13:15:11.687000 CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000 -CVE-2025-0924,0,0,aee87ee741a81d5e3594f3d82c18001c32a0f8c18175f96bf3ced22a7e7ace42,2025-02-17T05:15:09.410000 +CVE-2025-0924,0,1,9598e74a732c746fceed1aa0bcd6b6fbc2f157a0c9bcaf34113edf829448ad65,2025-02-17T05:15:09.410000 CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 CVE-2025-0934,0,0,d8e0246ff2efc1b37a4d2ecfb87caa8fb3d271a34e502eac17b8e8e5be8b0f3e,2025-02-18T18:49:12.210000 -CVE-2025-0935,0,0,4892b6ddf9de8c08a2def271507f8b9a6082ba4602bb2223678f98953998cf06,2025-02-15T09:15:10.583000 +CVE-2025-0935,0,1,bcdb15a8ec70279c56b6d4aaf89ae9c07c726d7626a3412d376b08c71c88fbef,2025-02-15T09:15:10.583000 CVE-2025-0937,0,0,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e91465,2025-02-12T19:15:09.687000 CVE-2025-0938,0,0,48d7b602c8da430d9ec862aa287f133d1b7490f6d69b5ae38b3ee95dfcfec97c,2025-02-04T21:15:27.543000 CVE-2025-0939,0,0,762c206abd21032a2362d7d03f8696dc3cda9bf876a13f8c73ebb711762a318f,2025-02-21T15:38:36.803000 @@ -279435,8 +279435,8 @@ CVE-2025-0953,0,0,048cc197ca970de5fde847ecab581986b58675b3dc4db0983287b715bf9673 CVE-2025-0957,0,0,ce96b57dc5a1d7911b2973eca447d8c2a84bd9409019560a93b413d929c8b35e,2025-02-22T14:15:29.710000 CVE-2025-0960,0,0,7d99f6e3510e94dddcebd5fc3388664132c2f2132e2b612ed8279ce23b89027f,2025-02-04T20:15:50.103000 CVE-2025-0961,0,0,51398360322c1646c196e54ab1a92e1f37267b5b266c9b18c4da19ec7b68c1a4,2025-02-10T13:15:26.413000 -CVE-2025-0967,0,0,48a999283e5df37f2ad381f76667fdb4991732db2f436607d24ac0a470ce1d15,2025-02-02T16:15:27.693000 -CVE-2025-0968,0,0,fc3ae027b7fa4024d1c6ee2555b9df72939ab520755bc83ac78b74d8987e94b7,2025-02-19T12:15:31.770000 +CVE-2025-0967,0,1,71552d75295ced35f1d65ac4060c71172ce683340873a9eb7af4e83e292bea78,2025-02-02T16:15:27.693000 +CVE-2025-0968,0,1,1e2628537847998167923e0490c7b5779e5eaced693bf291655dda90f8e68d1e,2025-02-19T12:15:31.770000 CVE-2025-0970,0,0,2a27a49496d76d3df2d4a989b2fa9a3dba48fa46483104ac0df4144daa8a058e,2025-02-02T23:15:19.027000 CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb15,2025-02-03T00:15:27.797000 CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000 @@ -279450,14 +279450,14 @@ CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e0421 CVE-2025-0996,0,0,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000 CVE-2025-0997,0,0,d60982b4727f69c406a2b69a152e99650b0a7ac4a2979d7c180af9b049e9fee0,2025-02-19T15:15:16.407000 CVE-2025-0998,0,0,b98f0b713604f6d6debd775ef9a03f9f9afc3c7e8c1e50ee3e2f779bfe4f4608,2025-02-19T15:15:16.563000 -CVE-2025-0999,0,0,85c0b6642f2732a770f1855e0bb25a8b444abae15838cf3064c5b92c368c7101,2025-02-19T20:15:36.007000 -CVE-2025-1001,0,0,9fc14014231a0b608d60431a4e27ea68b12ded9918e6ac751dd7df6c2e0665e5,2025-02-21T01:15:09.533000 +CVE-2025-0999,0,1,e9856f174d17b1debf1bb79523bc7cc3edf68b971efd35f304f9fb5eb168251a,2025-02-19T20:15:36.007000 +CVE-2025-1001,0,1,ae4c9d6a58d2ec5a3e63582653dd6babd1ac822adcc732d69bc048ca27e36e68,2025-02-21T01:15:09.533000 CVE-2025-1002,0,0,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f595,2025-02-10T21:15:21.830000 CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000 CVE-2025-1004,0,0,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000 -CVE-2025-1005,0,0,97e80c2f89c5e160cce39e83fa7ef13a9325fdfdb9706abd6a322ead72dbefb2,2025-02-15T10:15:08.740000 -CVE-2025-1006,0,0,21197677a24f1eccd1434e78fdfa3fcfeb5cfb1b426d570066644793a036de8f,2025-02-19T20:15:36.163000 -CVE-2025-1007,0,0,9f58e9f8dcb0dfafd40422a755b6dd838264ac08d3139ea382726a554d1827d6,2025-02-19T09:15:10.117000 +CVE-2025-1005,0,1,80438b67dbfe8d1e31da9cbb8559dad836f198ede3beb9152fa69a193c43327e,2025-02-15T10:15:08.740000 +CVE-2025-1006,0,1,9e4ea695eea6c339e8b510f1e6bf2e2f117c10b7d96127670f81c4e1f27ef0ec,2025-02-19T20:15:36.163000 +CVE-2025-1007,0,1,ed6224383de68702234b9f134cbc7ba9469a17e584b73db9a54e2542264cf8f4,2025-02-19T09:15:10.117000 CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000 CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000 CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000 @@ -279472,29 +279472,29 @@ CVE-2025-1019,0,0,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17 CVE-2025-1020,0,0,cf2c558f0a30d0c315344260ca52b6874799bcd8941b5300ae30cd6ec90d92d0,2025-02-06T21:15:22.943000 CVE-2025-1022,0,0,6e0bbfd94dedae55deabfe77a158c108c89075d5003cd8db6b7f154724b291e0,2025-02-05T20:15:45.470000 CVE-2025-1023,0,0,3d7ca211f2845b56c811ba42573b04f2b32d2538fff5ede6dadf5b8df8ad3d9c,2025-02-21T15:21:54.417000 -CVE-2025-1024,0,0,ed4a0103ce1a587d6b8e89274d412a572e44ce4224afbc332cb8a5ea9879c094,2025-02-19T09:15:10.280000 +CVE-2025-1024,0,1,0b7ed7cc5fcf3f145b8b838bebdab31afe8aea226da70f6d6d4dadb25e275b1d,2025-02-19T09:15:10.280000 CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000 -CVE-2025-1035,0,0,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000 -CVE-2025-1039,0,0,dc35f96e066d0f1c0e4583992324060e73a8fefc79481a755adf446f58a96b39,2025-02-20T14:15:33.627000 +CVE-2025-1035,0,1,72fea0a2d80ae07fdc30e5739a98c27b4b9464bbe1b4b8593a6bca9675ecb8a3,2025-02-18T12:15:16.087000 +CVE-2025-1039,0,1,42efc14dcc69ddfcbf0852df3dcc7e782fd82b14db0d5d4d81eace11bf1398e4,2025-02-20T14:15:33.627000 CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000 -CVE-2025-1043,0,0,c607b275d7254bbcb4ccac200e10fd3b263d060b985922e80bbb9468afeab30b,2025-02-20T12:15:11.030000 +CVE-2025-1043,0,1,7001752ad3735284c92da690719993a3516fef3fe8fc3f65454702cddaa0e483,2025-02-20T12:15:11.030000 CVE-2025-1044,0,0,9f8be6c10874ff2755d0454f22f2307f6446f5aad49de046e6d1d7bccf9d96f4,2025-02-18T21:34:01.863000 CVE-2025-1052,0,0,dd0f54ac7a99856d7d318fe87955632258ed518980dc0996f06ddf7223075097,2025-02-18T21:32:45.863000 -CVE-2025-1053,0,0,029ef95d4ca404a127f35d558b999def9d0d35c7fe97a6a586ce48f5dbe97960,2025-02-14T04:15:08.903000 +CVE-2025-1053,0,1,36afaa022dcf9fa61ff59093a9ebd90d365b1b671f9492c24c0d145581f6c1dc,2025-02-14T04:15:08.903000 CVE-2025-1058,0,0,f0fad2f3f49afeee020cd5166bcf442481ddfb4558eb17fc96aa811a077ae5a1,2025-02-13T06:15:21.480000 CVE-2025-1059,0,0,0ab1d4e680647fc777b1f82262b0090b83c24b4ef86b71d82e6bf1295dac9761,2025-02-13T06:15:21.680000 CVE-2025-1060,0,0,a3af803539184a670e8a1150c8d0a2bc56d4cd2cc859a7263777d630bbc1a271,2025-02-13T06:15:22.213000 CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000 -CVE-2025-1064,0,0,3476c323fbb99f00363316e4eadec811e94f110d7f8898624f63fa6bc0b178c6,2025-02-20T09:15:09.903000 -CVE-2025-1065,0,0,7a62f98369ffccf4b00a81d8982feffe5ffb0f550549018fa41283fbe2ed1658,2025-02-19T06:15:21.507000 +CVE-2025-1064,0,1,500ef5063a1dcfd1d0d371b2736d518324e33316060bf1c6b50d05c5b5f0c0fc,2025-02-20T09:15:09.903000 +CVE-2025-1065,0,1,91e01129540d7e7c24b479977792864ebaeaee2a2b34fb9700bbb79776ce5735,2025-02-19T06:15:21.507000 CVE-2025-1066,0,0,3fc22615f942b72b8cf5d09f7bd097e7cf373f3b0fcdec9d31e667deb7a70a15,2025-02-18T19:15:24.243000 CVE-2025-1070,0,0,5146e4f08b2531ff82fc620bde7cb0c34c86b4487a1fbc38c78ecd1432016151,2025-02-13T06:15:22.463000 -CVE-2025-1071,0,0,7cf48f5c0704f7102ee404aa34c514af5ccf3668a768a5efc6948bb3495dcf52,2025-02-14T14:15:32.560000 +CVE-2025-1071,0,1,7142cfc8cc7ab9d0dd5414936b1efb97baa218470ab4a83ee432e541f81ef9d1,2025-02-14T14:15:32.560000 CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000 CVE-2025-1074,0,0,1377d1b0ab3296a33846cd316ab7610f3b7b42a12867cb031730fad4726b7a65,2025-02-06T14:15:30.050000 -CVE-2025-1075,0,0,b9890760d1f9da8be37b0ea9ac5eb4b3e3178e3338d18497828b678282b4b2d7,2025-02-19T10:15:09.043000 +CVE-2025-1075,0,1,55e208bd34436a701a3c4e0c5700676045c9f192d962f4a57d48ee6ac3fc3b13,2025-02-19T10:15:09.043000 CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000 CVE-2025-1077,0,0,735be86b3f6fc3d707f047f96e1dd513fa1d8afd61d55b887dfbb34478c5ed44,2025-02-07T09:15:08.380000 CVE-2025-1078,0,0,45cc25c666904d6c96dae20f5f19955cbc17db65c9b5b7f07b6396203ce702c3,2025-02-06T17:15:21.040000 @@ -279521,13 +279521,13 @@ CVE-2025-1114,0,0,08776686bb1020fc2e5b3b4601e411908ccf47316245572027365404f7e1e0 CVE-2025-1115,0,0,93d9d490db8f65e6d9fe600a161957920a2ef1f3333e07357c060c69119e0510,2025-02-16T09:15:08.897000 CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e2d,2025-02-08T12:15:39.660000 CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000 -CVE-2025-1118,0,0,45ad430fe59bd1b414b3d2de501a165fb0ed644f2bef166901d6c78f9f2e6d71,2025-02-19T18:15:24.280000 +CVE-2025-1118,0,1,08dbece94ae19fdcd18b85fa691f3f9bb7825229c46002214642d54efce1c781,2025-02-19T18:15:24.280000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 CVE-2025-1127,0,0,964bb8e082be5f4c3ffe02b7d66d3573c4a806865108fd7e7f64bea0f60eef31,2025-02-13T19:15:14.153000 -CVE-2025-1132,0,0,a54d6d00723bbeea5fc156acc54289b0e557a1f1b96ae4af380b54c8586a4ae0,2025-02-19T09:15:10.417000 -CVE-2025-1133,0,0,077b3b4fa4c5c74cfca1b9886406871d5d029081fc0f7c73cd8b5fa07fa2c5d3,2025-02-19T09:15:10.550000 -CVE-2025-1134,0,0,c96645df83383e6ea20c2c4fb684ee084917bc1d0fed815f4b11bbaeed7ba4dc,2025-02-19T09:15:10.687000 -CVE-2025-1135,0,0,b7ed9a1e2697abbe26b8e6bcf33a5eccbddc8e91b444cb8fb8af449ace3fcf99,2025-02-19T09:15:10.823000 +CVE-2025-1132,0,1,3424c330466090d5297bd63dd5fe1aae7e1a6ca50282c14840e1ac3ef43c3c89,2025-02-19T09:15:10.417000 +CVE-2025-1133,0,1,9f79f2995beb7832e570964f0d4fe6b70b4d4055c401db38d148651bb480025f,2025-02-19T09:15:10.550000 +CVE-2025-1134,0,1,0e3e808b725a6fc9954c97d1b5ee01f95958a0e92a4cba7aa26855000bff3aeb,2025-02-19T09:15:10.687000 +CVE-2025-1135,0,1,594151f16fba6e8e4fe6f06ec53c8d7468b16004a34134a330d25661836ecfa5,2025-02-19T09:15:10.823000 CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a73,2025-02-18T18:15:29.750000 CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000 CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000 @@ -279545,7 +279545,7 @@ CVE-2025-1156,0,0,63f659c664780669befb323dbfaf50336d4de536f23cedf7903aa737a21aa0 CVE-2025-1157,0,0,a206788cb4fbbf65e1bb0cec173b38841b013b053694d19ca76247067cf723b2,2025-02-10T21:15:22.300000 CVE-2025-1158,0,0,62773d64730482cf69afc1e9bff0a11243764d0c298b1a874d7ef2a6b32319fa,2025-02-10T22:15:37.080000 CVE-2025-1159,0,0,19a0036bd88070e1e95d8ee26c655747cb8510ac9a9b4838822239ae43731b9d,2025-02-11T16:15:49.820000 -CVE-2025-1160,0,0,813fc2ae77df0f9a7b591611ea1dc0d4addb1d75b4bd6effc1175b65af7f6e6c,2025-02-18T18:15:30.120000 +CVE-2025-1160,0,1,808b297d238cdaa18b10f3880117c5d957ed68c8a9350ac617b08a32b3e3b8e6,2025-02-18T18:15:30.120000 CVE-2025-1162,0,0,05f2fe2633f20c8b4e4c9478dcb932c19e8a944f98f76412e7687c038b939d05,2025-02-18T18:15:30.347000 CVE-2025-1163,0,0,0bfc52e8c2d65c1c7189d51828a8bfbb7aa129666e27c922aa7ae87c824a1049,2025-02-11T16:15:49.973000 CVE-2025-1164,0,0,547ef17bbcc7e2e002cdaf360903d023f2da7f36e6b67ddd9cb8b2f85ea02033,2025-02-11T16:15:50.100000 @@ -279553,12 +279553,12 @@ CVE-2025-1165,0,0,1886bedfeb77a30110b603391f466b1db5cd60c4975e01459203f5a7ce5922 CVE-2025-1166,0,0,b573d7756490a49505f4af46492cdcaaa7bc38f4ea886c902f0eaea7029fe998,2025-02-18T18:15:30.743000 CVE-2025-1167,0,0,cc711cc8cd4aa0c150c36c7b220b69f5b43646086fb2fe84a7021c8aba7a93ed,2025-02-18T18:15:30.940000 CVE-2025-1168,0,0,a7cd0398ba73b0d35d93dc779587da27ff53b481f56c03909c8a65e17b663c50,2025-02-18T18:15:31.127000 -CVE-2025-1169,0,0,0a59a82bf783f5b8e27c6775343df945f8312e3cfa7292fffd225ac919cbf561,2025-02-18T18:15:31.317000 -CVE-2025-1170,0,0,bb3b79d15607fbd7c966744a12f28338a0af8bc33bee173fc482da6a176bf05a,2025-02-18T18:15:31.513000 -CVE-2025-1171,0,0,3e94253923e8ff44d213cab4b64f9a86d8cbfa94f3fb426c2700ab51a6b2434d,2025-02-18T18:15:31.700000 -CVE-2025-1172,0,0,cf08703b66582ec9de3e473fcab67a2dbafe69d53a075dc9b8254b1bcc7063ab,2025-02-18T18:15:31.893000 -CVE-2025-1173,0,0,3256d2a06a1e205d73caa7c7b35a941bd06320937c6ee57d5e3a1dfb4b5dac94,2025-02-18T18:15:32.097000 -CVE-2025-1174,0,0,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000 +CVE-2025-1169,0,1,367569300d5f4417c8bacb000b03474625c89bf283efefc264f983b08283c7a2,2025-02-18T18:15:31.317000 +CVE-2025-1170,0,1,574b226bdb4ba09acfeabe57c4e9f0c91a52f290c0ee365954b21514687c3a13,2025-02-18T18:15:31.513000 +CVE-2025-1171,0,1,9024f5f9e92bfca328c42f8c70ac33472215403139e487800a49abe273b31859,2025-02-18T18:15:31.700000 +CVE-2025-1172,0,1,5978d04cf5ed55f085c6e6e8ab076105d328a32d2aa25e49e98e031c7bf97aca,2025-02-18T18:15:31.893000 +CVE-2025-1173,0,1,201fe28b2decde88a60fdc02d9df1ac49d48aa031340c5b15611781ae792b73c,2025-02-18T18:15:32.097000 +CVE-2025-1174,0,1,c65765992111c475cb190381c7d7aab4ad789e773444c9f7d3fe0f405c1f6e94,2025-02-11T05:15:13.810000 CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000 CVE-2025-1176,0,0,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000 CVE-2025-1177,0,0,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000 @@ -279567,12 +279567,12 @@ CVE-2025-1179,0,0,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112 CVE-2025-1180,0,0,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000 CVE-2025-1181,0,0,ca3c1011601b0fae06b99a2c26a8cd106fa387c5be46410c165b6082b079962d,2025-02-11T15:15:20.393000 CVE-2025-1182,0,0,8e271e74e78bb304bae883d9033bfab3d4bd2205d8549a0b17477d8e591b3926,2025-02-11T15:15:20.523000 -CVE-2025-1183,0,0,2e368e0a0c3d5bd4d908f21074d3c7aea18e9a09f1e180746a9622d0fe53bad6,2025-02-18T18:15:32.287000 +CVE-2025-1183,0,1,55955b958357278068d540b5493848f5918d9b4613dbe3d9043e45f654ab9665,2025-02-18T18:15:32.287000 CVE-2025-1184,0,0,90a76caadfd7aca36e8f9000c3958f8b35637fc9892e529865f6817cee8b4473,2025-02-18T18:15:32.483000 CVE-2025-1185,0,0,cc25ee2f77a3103fcd68a3f1611fd1f716189b46d9cae5c522939b670d5fe60e,2025-02-18T18:15:32.680000 CVE-2025-1186,0,0,8086a12ea65738a60ab99220576d2e18e33f078a2bf72100e8b879a5e3eef2f8,2025-02-18T18:15:32.870000 CVE-2025-1187,0,0,4d377fdf42828c943e4e7e7e9bc0ee6d4b95eda485220a10fe3d04dafc88feff,2025-02-18T21:28:37.800000 -CVE-2025-1188,0,0,705852bbbd5f869ccd9a3fec289796fb3a53a8119c986f44aa0b13a8e84aa3bc,2025-02-18T18:15:33.103000 +CVE-2025-1188,0,1,1d4ccda009103f8c240eb8f479b595608115ab6512ba1b95a9e03f5f14a8e9dd,2025-02-18T18:15:33.103000 CVE-2025-1189,0,0,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000 CVE-2025-1190,0,0,bdc8e5317e46e46a9ca4a9bb55f67f9139555824a181f8bdaf33c4b7f757c764,2025-02-18T18:47:00.127000 CVE-2025-1191,0,0,1c6bbb235a5b5708d13f9a9dc19f35d51e2568dd188a3fd7f6e46662095fe78f,2025-02-18T17:51:51.260000 @@ -279580,7 +279580,7 @@ CVE-2025-1192,0,0,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc3 CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,b9506d643a21ea855d005ee72e5735db262862843667216a45836e6dedc7ba45,2025-02-20T20:37:54.487000 CVE-2025-1196,0,0,95c1e31ef90a550a862949d3771de7036e2dc6a2ff04ba572597899517481c3f,2025-02-20T20:38:49.990000 -CVE-2025-1197,0,0,3ec7e3ce10870b4cb1fe9aa96075e785feab0d5efeec7b33e0431be8a88a48c6,2025-02-18T18:15:33.303000 +CVE-2025-1197,0,1,3f73439f317bbb7f90aa8413320a66537018b5852d35e70b266744be94a8e5cd,2025-02-18T18:15:33.303000 CVE-2025-1198,0,0,f6207b50eb6e80b33d6cce685120110cd12848ecf71b1003965e650eb121e529,2025-02-13T02:15:29.627000 CVE-2025-1199,0,0,53991dbea06a5b0800e8d25e504a12a841d823a239457fc0e48265a3904ab288,2025-02-18T18:06:10.360000 CVE-2025-1200,0,0,96b433ad7e26edb6f2f9acbb0eb46fcf07f61e221c5bf356eca3408db2bb3def,2025-02-12T14:15:32.090000 @@ -279597,8 +279597,8 @@ CVE-2025-1213,0,0,2b7e70e47f8a65f033caad3807af6c64741ecb841fb41a9781c263ed91f0ab CVE-2025-1214,0,0,570b6de5ce068661fd900040490763a6a2aff52883cdffee187d7e67c3f71c23,2025-02-12T20:15:39.200000 CVE-2025-1215,0,0,8ed64c4cea73bec1cddd1a2a6008416951076fc76020e0d97ec001cf6bd35d72,2025-02-12T20:15:39.773000 CVE-2025-1216,0,0,164f15453cadee8b1ef141164e20a61cdb9617e764303cd0a4fe4230725306e1,2025-02-12T20:15:39.907000 -CVE-2025-1222,0,0,8b2d91661240eec9308211a9746cfa7fd5f6c09218a7574e3f401d4ff0cc7429,2025-02-20T01:15:09.707000 -CVE-2025-1223,0,0,f8e46630ae17f3cc6d05cf04b482c0b48e16e8f3f90922493824b655ad9a325b,2025-02-20T01:15:09.837000 +CVE-2025-1222,0,1,85938c78cb30525407aad8492d36d6cdca6133133313c4eee0c73431e834be90,2025-02-20T01:15:09.707000 +CVE-2025-1223,0,1,e3bd6b62df687fcc509ca0e3c143b29dc3ef8385d351eccdbcfbec4b8b3bfd50,2025-02-20T01:15:09.837000 CVE-2025-1224,0,0,dbf9ca25612f3b15663509f5a8c0ad24581ded6705dd4635bcfc69168f7d2196,2025-02-13T15:15:20.500000 CVE-2025-1225,0,0,b84393f2cecfe0f2937bfc6c2d96d8aecba40fa1e0b4eaa3e5689fd294d1fdb2,2025-02-12T20:15:40.203000 CVE-2025-1226,0,0,4474226f547c434d76495d8a78597f2407b4a7ecd22a98eb405419ef19e7c568,2025-02-12T21:15:20.470000 @@ -279607,79 +279607,79 @@ CVE-2025-1228,0,0,124ebf8819c0dbf913466ed64d287a05caa1dddc24a54a22964b4c02dc5d72 CVE-2025-1229,0,0,630ee2eae5a84b1160c556fac526b8f774c86604564d0cc69caec674365bdcdc,2025-02-12T22:15:41.667000 CVE-2025-1230,0,0,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448d5,2025-02-12T11:15:11.230000 CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef33383e,2025-02-11T15:15:20.643000 -CVE-2025-1239,0,0,c03f227179bbef01c78d8a3eb8a6031a3df07089f04e6aee8231b8da6bdd3a94,2025-02-14T14:15:32.687000 +CVE-2025-1239,0,1,6a31294ac2475a5f4cf013905a0ebd1264b78acdf12a9a65f2d79fa7affa2205,2025-02-14T14:15:32.687000 CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000 CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,4873e23ffda0d795b5208f2bbb0bbb9ab8821cf32651b326d7afc0c6c00e584c,2025-02-19T19:15:15.437000 CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000 CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000 -CVE-2025-1265,0,0,16236827cc1831ef2c53dfd7b571069eeafbd1b3479efe7e317d16df995ca41e,2025-02-20T20:15:46.537000 -CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000 +CVE-2025-1265,0,1,8b96eb635d74048f7915847b63097d4febc56f3fd9332428d5a4385c9760ce44,2025-02-20T20:15:46.537000 +CVE-2025-1269,0,1,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000 -CVE-2025-1293,0,0,de22ea463bb11f59b8d001bee87aa35e3db1395d25b26c300642e262a14ba018,2025-02-20T01:15:09.950000 +CVE-2025-1293,0,1,dbd776d425a4170ebc67e8f467d76fdb1a678c6cc6717d2977a3876685bd7d30,2025-02-20T01:15:09.950000 CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000 -CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 -CVE-2025-1328,0,0,5679f4d1fb42d96e89d2a315978dab8dea6fffe2e65cd47be423fc2942444d0c,2025-02-20T10:15:12.337000 -CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 -CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 -CVE-2025-1336,0,0,1d4332a43e181efb84f487de4a15195bff051d66dfbf23e944c2a28a29d70a13,2025-02-16T09:15:09.347000 -CVE-2025-1337,0,0,3fb4fd92ce9eb4ab893d657cf4e65cb90f24441679bce73cf357765516690d6d,2025-02-16T11:15:08.203000 -CVE-2025-1338,0,0,e4858627d5b15f5a42c72ef7bfb61ece178b4c7bf6a8e3bbd9b24bc2581c61f6,2025-02-16T11:15:09.530000 -CVE-2025-1339,0,0,d4e323ee96c3c4bba4a59429c645443db325cf6db89704cebcea62b9c5f4107d,2025-02-16T12:15:08.173000 -CVE-2025-1340,0,0,78afdb04c2b4919abb81cb49f3fd474851adb52959b9ac1cfa9fca0a042c1fa8,2025-02-16T14:15:21.130000 -CVE-2025-1341,0,0,7838ddb01ef868fbd34dbd01f3687bed0ca3d9c8221cff3a4fd8381a764860e9,2025-02-16T14:15:21.893000 -CVE-2025-1352,0,0,ab1cb0fadb1cda3a606d58709a21380ec7be19d2291c2f10fb161a98095b1c75,2025-02-16T15:15:09.133000 -CVE-2025-1353,0,0,a316f11e73501222d7275028224ec2135788f80ecfa55a4dc98afa0b590b3f15,2025-02-16T15:15:09.320000 -CVE-2025-1354,0,0,3d7667bfcb2c0b251ddb0a6e2cd2d09c76acedbca3edf8c1b754b38382240774,2025-02-16T16:15:19.253000 -CVE-2025-1355,0,0,2b32faeae86cf10a841d554d3f1028e038f2f84a86d16604e50e5f2d459277b4,2025-02-16T17:15:07.973000 -CVE-2025-1356,0,0,ad47206c360f81c88d742a140cb46365165054af6533ecf378500f5e98562fa1,2025-02-16T18:15:07.383000 -CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857bd,2025-02-16T19:15:09.500000 +CVE-2025-1302,0,1,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7bf8,2025-02-15T05:15:11.683000 +CVE-2025-1328,0,1,b04e2e55cc79aad69ae280f3793e22af8d5fa2d02f4015a83b59c321621ba29b,2025-02-20T10:15:12.337000 +CVE-2025-1332,0,1,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000 +CVE-2025-1335,0,1,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000 +CVE-2025-1336,0,1,52b671ad306b4ecb46d70d614db810e12817bed0fe7bd8f45f84b0afe49f7a9a,2025-02-16T09:15:09.347000 +CVE-2025-1337,0,1,c4c492d772586fa1c48efe595d648980d569f69f4fd95dc2e4940745b9e69a01,2025-02-16T11:15:08.203000 +CVE-2025-1338,0,1,c975d3da6628e3378fc507e6a4d32fbce12edc6163c403068da9f6fd48db4a16,2025-02-16T11:15:09.530000 +CVE-2025-1339,0,1,8f1957eed8ce41b8e7470cc3d0baacfd9956a9ddc7b746b6c49360dfcc427cc3,2025-02-16T12:15:08.173000 +CVE-2025-1340,0,1,4067af28c7bb270a8ac8df173a9485595afb21f9632d3436eb374277f441c582,2025-02-16T14:15:21.130000 +CVE-2025-1341,0,1,182a7680c7744a4f8c49752d8802ff05fe23bfd57440db85ddb0f7a0939e246d,2025-02-16T14:15:21.893000 +CVE-2025-1352,0,1,c9c4f62ff64c76e666d069862859170d5af1290747a406cf9c7fbe3d8aa99284,2025-02-16T15:15:09.133000 +CVE-2025-1353,0,1,0b66fc4bf3be48d7c756d2092909bfbcec43a3f29397e60e589fffcc2fdaf099,2025-02-16T15:15:09.320000 +CVE-2025-1354,0,1,10edd7ee72344f07faecd4030260231c8fa75bfa03beae4ac136d3be476dc882,2025-02-16T16:15:19.253000 +CVE-2025-1355,0,1,14f2e5fb0faa68d651f341cae6f4b8e585317a2e9191120cce1008122aafa2ed,2025-02-16T17:15:07.973000 +CVE-2025-1356,0,1,53cd7f24f81f273aa7d091f2b718afa8c3c6df3e99a0593673541d8f3820f561,2025-02-16T18:15:07.383000 +CVE-2025-1357,0,1,ffe1cbd496f3e52bcfbdd22bcce37a5464af37704eb83fcafef96b7d52ca263a,2025-02-16T19:15:09.500000 CVE-2025-1358,0,0,4d6b176561a122e28555e921478a072441121d17ebc8ac0b01ef4350bb45d13a,2025-02-18T17:15:19.737000 -CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000 -CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000 +CVE-2025-1359,0,1,b99f7473aa7cfcd569098b4cb83ff4c6a04b01f9fcd92b905a157768bfc87302,2025-02-16T20:15:08.817000 +CVE-2025-1360,0,1,994bc9aa07c4ee5429d5cceb1ff3106cffab6b1d34db591b83a12e6dfc2017a7,2025-02-16T21:15:09.970000 CVE-2025-1361,0,0,e77b22a19638f8547451c7f6624660e8ccc3d24ab0dabba372f722fe848e7063,2025-02-22T09:15:24.033000 -CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000 -CVE-2025-1365,0,0,266b893d22f80eeaffc950fc5e5107cbf76b85b1dd425ff9e622ab0ee02beb92,2025-02-17T00:15:09.140000 -CVE-2025-1366,0,0,27d217412c230d14f7fea472a75295f779bc457c8773cd971395f03e9546e238,2025-02-17T01:15:10.280000 +CVE-2025-1364,0,1,345890d3d1383d2fe017bacca4769d508f2a6d87551ff933326f62c680118038,2025-02-16T23:15:09.087000 +CVE-2025-1365,0,1,be8b647171229f455e5795ec87beda13c408a4aa3847e9c23cacef674534b764,2025-02-17T00:15:09.140000 +CVE-2025-1366,0,1,155b929dcb4254657e101d69634110ea20f615e096b00155b163d11c9906a2d2,2025-02-17T01:15:10.280000 CVE-2025-1367,0,0,99ee16cc3da1d39e5da1701b80b92e3af6c6319a91a302b62c5421e5c186e446,2025-02-18T20:15:23.930000 CVE-2025-1368,0,0,b1802fe477e4f2588bb89b3757813267d9fbab1f0f9cf708cd07b07f5f242caf,2025-02-18T20:15:24.037000 CVE-2025-1369,0,0,ffbbdb1349f4e888ecdaa0c1646c7a616fd34c4a1634b0441d5b881c4d523c85,2025-02-18T20:15:24.143000 CVE-2025-1370,0,0,4b05cea0c0621542a8e7314184262694fdf134cce0af1aa3502d7b484362bbef,2025-02-18T20:15:24.253000 CVE-2025-1371,0,0,c91ac02921222d4b204ab6467e0f31fa1285abfa158495adcb0a1a8893ef50d1,2025-02-18T20:15:24.360000 -CVE-2025-1372,0,0,7bd9cbee44da9690280c00d51a6bae4a791d035cefb44fae5dfec5b23c1c2f2e,2025-02-17T03:15:09.573000 -CVE-2025-1373,0,0,b51154a9a004f1fd27d3158858d9a3700c61f60084062e4248400a4ec2256f83,2025-02-17T04:15:08.447000 -CVE-2025-1374,0,0,b7fa05f0c4c2d66fd4f270cc4250c2b3257c8dc0e6f850c49a3e1698d2a969f5,2025-02-17T04:15:08.643000 -CVE-2025-1376,0,0,9cb77eaa81162f231e769e62670da692672bd5970c49c962e7dfd1fdd0bc00ba,2025-02-17T05:15:09.807000 -CVE-2025-1377,0,0,84dbd56dc863bede5cc83182ed6a5edcda6cbf59030317e1e5400d3b48957f28,2025-02-17T05:15:10.090000 -CVE-2025-1378,0,0,7b9abfd951882c59db8337f9925f5cb5ff8b160c284ba7a02d59e3bbbeb92335,2025-02-17T06:15:13.277000 +CVE-2025-1372,0,1,1137a934676f529c0129b2a2807c1b7f0d1f8f75f7c3e117457a236db2e5dd2f,2025-02-17T03:15:09.573000 +CVE-2025-1373,0,1,e7ae83ec02089c19c048dcb5fc64cb25c0d96381c845fc2537004ce54701e86c,2025-02-17T04:15:08.447000 +CVE-2025-1374,0,1,ff85373904e5ae6bc1c1614e5969a1c35cf94773102a757dcdd75d14d089563e,2025-02-17T04:15:08.643000 +CVE-2025-1376,0,1,551bc1a7368ce6255c4c061b07fc9317972eafc8d97c534efd96bc40abbd823d,2025-02-17T05:15:09.807000 +CVE-2025-1377,0,1,960f8674d0db4d3c8cb65dbcb7c089008670d8d958f6fda23c8d18a271482bd6,2025-02-17T05:15:10.090000 +CVE-2025-1378,0,1,b6c86eeb2d019f6592bc24f5f0a31b93740d1fb2c08f68f6d64ded5629ca786c,2025-02-17T06:15:13.277000 CVE-2025-1379,0,0,9ffa3a1d005a8a84495880f846051bae600c81fae89599ec1beb486c8fd6f395,2025-02-18T20:15:24.460000 CVE-2025-1380,0,0,fbb61511f7843dd704830fd599f39b4a6142ffad1189b3c41e5dfbb2298f99b4,2025-02-18T20:15:24.560000 CVE-2025-1381,0,0,95844f51073a4347ab6ff3a4821fb5fd4438ee6e0f5f67293a583f0ea704ba1e,2025-02-18T20:15:24.667000 -CVE-2025-1387,0,0,3471c5e221fd26cc82d790d0348e17ce666394a812c51ab6ee55856ad41c6d05,2025-02-17T04:15:08.807000 -CVE-2025-1388,0,0,6166d0831a99cbb271e76281dd624232fbaf9903152209f7151545224b25416d,2025-02-17T04:15:08.960000 -CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7bd5,2025-02-17T05:15:10.317000 -CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000 -CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000 -CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000 +CVE-2025-1387,0,1,6b2986e05edf8fe9b0d7fe083446ecc6a7e919c7e5df9116b6a5391b40f9cb45,2025-02-17T04:15:08.807000 +CVE-2025-1388,0,1,23052aa0936bc34bfc567851db2bcccb0595bc656aa92cec3067f7eaef4640e0,2025-02-17T04:15:08.960000 +CVE-2025-1389,0,1,0e06dfabe7c7a8feaea552cbfd34889cfa3de4ba9ba3bd15e595915d7a1ab4b0,2025-02-17T05:15:10.317000 +CVE-2025-1390,0,1,9b0849b5f477331c0a59a6c9cd4f8c700f46a084be6db7387005429c80abce58,2025-02-18T03:15:10.447000 +CVE-2025-1391,0,1,6fee9eda29ef94ebb6c29d27c38776c5f8bb1fbd11f215f0e687819427cb5001,2025-02-17T14:15:08.413000 +CVE-2025-1392,0,1,8e4405371022efbf780ff58db6d926727305203f058fec61ae92b5e8fa805a81,2025-02-17T16:15:16.120000 CVE-2025-1402,0,0,d705975e2d4d051899b63fd949106f689e6c20cfe60f25e8d672a004176300f9,2025-02-21T12:15:30.607000 CVE-2025-1403,0,0,cdf9a8de03213e0ac7f7767452341bf79edc3d976615c3099248fc0b29544461,2025-02-21T18:15:20.550000 CVE-2025-1406,0,0,4b4d1ff21a0ba0811215bc35d6774baf51e77603ba63fc9e650d11b6ceed4f86,2025-02-21T04:15:10.347000 CVE-2025-1407,0,0,70f77407081cff4de8b8d13a9badac21a5019470fe2d018139382b1f1331d1e8,2025-02-21T04:15:10.510000 CVE-2025-1410,0,0,f4fa6259cc030a3c18635b5a57715bd57396d86c3ee145748700746fe04576c9,2025-02-21T09:15:10.200000 -CVE-2025-1414,0,0,b6f2fa5b41b9076d018bd1d274a1717bfb4b17a7162b38316b8f5f46b587bbc9,2025-02-18T21:15:25.440000 -CVE-2025-1426,0,0,b67c79264aa66cdef5e5d9ec5a4b31cb1b09b1607a3ca51cd7f8f759ad39f482,2025-02-19T20:15:36.467000 -CVE-2025-1441,0,0,dea0748ac4805add0b5a620a8c550d3c2cb9f813ccabe70b3df2355bbf5d5eab,2025-02-19T05:15:12.050000 -CVE-2025-1447,0,0,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b0697,2025-02-19T01:15:09.407000 -CVE-2025-1448,0,0,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000 -CVE-2025-1464,0,0,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000 -CVE-2025-1465,0,0,2910b362fc4eb01a626127c50d683f7ea305894f7d9657ebb7cc043987c8c3ee,2025-02-19T16:15:40.667000 +CVE-2025-1414,0,1,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 +CVE-2025-1426,0,1,4a8cd471295100a135e3f1ec50bc3f2c2b0c11be304dbe11e606b36ac015f623,2025-02-19T20:15:36.467000 +CVE-2025-1441,0,1,1a8d7925760ab15d6de1f722cbb1abd9befdb71560d55b0f11dd7282b2ec419a,2025-02-19T05:15:12.050000 +CVE-2025-1447,0,1,94d813a2a765cca7833281fda7977d5974397f1e3ddfd630be22d2387da03e88,2025-02-19T01:15:09.407000 +CVE-2025-1448,0,1,c01bebc87ceda949e53960d4081cc94f0b041bbdc7b484616330316226fc1342,2025-02-19T02:15:08.833000 +CVE-2025-1464,0,1,d9cc73e2e9d26228c790e8ecd2213add7d739452f4a19e301a068d9caaa20e2b,2025-02-19T14:15:30.337000 +CVE-2025-1465,0,1,bdcf9bfa7fd1e0af82a5b56b58aad79a5298458b671a31685b7f60de618bf01a,2025-02-19T16:15:40.667000 CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c00,2025-02-21T10:15:11.243000 CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000 -CVE-2025-1483,0,0,76cafe28555a10dbbf45546d6f75e89aec9e95ad54aaa4bc0e47714c7e682b94,2025-02-20T10:15:12.537000 +CVE-2025-1483,0,1,ce3e2374c8ceeb73bbc31bdc8dbf6b8de9bfef289bdc35ff175139154a83c52b,2025-02-20T10:15:12.537000 CVE-2025-1489,0,0,33b499615f5a9d47836021ac5ca54335451238d68926a899e34dbf51c4c427a7,2025-02-21T12:15:30.740000 -CVE-2025-1492,0,0,4cf0d4c2a3031b043d71ffc226830ce9ea797081b5a3ae5a1323a931931fb733,2025-02-20T02:15:38.553000 +CVE-2025-1492,0,1,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000 CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000 CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000 CVE-2025-1535,0,0,c8067c833343598442009f0c070dbd08eddedc896cdd41576fc32acd051fac52,2025-02-21T12:15:30.877000 @@ -279703,10 +279703,10 @@ CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19 CVE-2025-20045,0,0,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 CVE-2025-20058,0,0,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000 -CVE-2025-20059,0,0,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000 +CVE-2025-20059,0,1,0304aa8cefbc3b7773b05fc1982abd8d4aad2f54dbf23c30fea8d478e79caf85,2025-02-20T15:15:13.957000 CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 -CVE-2025-20075,0,0,b30b32e2f08da502fea0698f2946161a425eb310144fa5e17bbcbe0fe4f71804,2025-02-18T00:15:21.107000 +CVE-2025-20075,0,1,865d0029597f4a22c4fcd4b586cb53f270de05228e3eb9e2dbd853b62417cb6b,2025-02-18T00:15:21.107000 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 CVE-2025-20094,0,0,cc9826181bf1f83e2cac160833fefdc5cca091c7fe9a0c6abd476a3468c0bc65,2025-02-06T08:15:29.837000 @@ -279716,9 +279716,9 @@ CVE-2025-20124,0,0,3b222e4debebf19647313be14570cd157d1c9b474f2f1fb6db3f2d02720f9 CVE-2025-20125,0,0,4c965c93b17f55e1ee6990c432e90b6f767d7217d5ca1f99810949fadd043cf7,2025-02-05T17:15:22.610000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000 -CVE-2025-20153,0,0,8a0c118fecfde278e395d37650e56a488c35c552b597d26c46f7395365ab23a1,2025-02-19T16:15:40.860000 +CVE-2025-20153,0,1,27e618611d2581fef068f4943f75a3e92738a26e1ae15dcee7d2b31ed61da6db,2025-02-19T16:15:40.860000 CVE-2025-20156,0,0,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000 -CVE-2025-20158,0,0,5a0703ebcc6e8c9261c7522dfd1e4f046c7f1bc67251a75a9860d63c2aa09237,2025-02-19T16:15:41.017000 +CVE-2025-20158,0,1,87aa79760ad4588c9c0abd65ef4cc5b9b47e26a1886540c744aae2525b5b50af,2025-02-19T16:15:41.017000 CVE-2025-20165,0,0,9f7b026247b5eae4a58783714ebe8eb2d48f865473657f5e720d75dccad8e306,2025-02-18T20:15:25.050000 CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000 @@ -279739,7 +279739,7 @@ CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3 CVE-2025-20204,0,0,a4e9ba7d17901e18de8b9e3a60210eaecc0b2b310b697e9225923c362d7831c8,2025-02-05T17:15:26.077000 CVE-2025-20205,0,0,4278aa005556418073946cc1ae2642befa148c4c7c75ec9371531ea83b7f1629,2025-02-05T17:15:26.243000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 -CVE-2025-20211,0,0,ab1049982f8a4ac46b9f050aa2c9e173ce4badc4048d39ecbd7e35ed3dbb8983,2025-02-19T16:15:41.163000 +CVE-2025-20211,0,1,cfa2b0b0ddf2ba937715daacde5e96b59604ea57db587b104b458dc7a684762e,2025-02-19T16:15:41.163000 CVE-2025-20615,0,0,7bf2f14d71ca066d1f71371dd6af37fe50ec1afd8739580fa516ac8ff703a51f,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 @@ -279790,9 +279790,9 @@ CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93c CVE-2025-21091,0,0,14a5f94bd4155cb401565e2a5aae76cc90c7a8d9e7b6e7f408f118d52738b6aa,2025-02-05T18:15:30.613000 CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000 -CVE-2025-21103,0,0,b6d1fa36e078291047471a4019ca1c4957d97737dc18368f9adb3746c2dfa968,2025-02-17T14:15:08.597000 -CVE-2025-21105,0,0,af3ed371268bbaf4c4254c19f89c22d9034887d546e8231180a05b599ca0a738,2025-02-20T12:15:11.233000 -CVE-2025-21106,0,0,dc48ca894010b90e2eebb6fe93e39a18e6c6f41f53656ff1ed6cf2df4d15ffed,2025-02-20T12:15:11.373000 +CVE-2025-21103,0,1,ae3784345d7ead1679a45e5e431b8e2a04a662333e5a73b43136c8aaca06f924,2025-02-17T14:15:08.597000 +CVE-2025-21105,0,1,4233dbb93466b6b3a4650ecd1c6c27a3d007447ac2f2a9ca1df4db2a7407f84f,2025-02-20T12:15:11.233000 +CVE-2025-21106,0,1,dba8593dcfef564c6b49df2656d7e44d8c1c9c140f6143802686f89c25a62002,2025-02-20T12:15:11.373000 CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000 CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 CVE-2025-21117,0,0,3c59ddab13aed7617d82cbb9fbab3c190cbfe8b424cc570d2e879fe06ca6cee2,2025-02-05T14:15:27.417000 @@ -279815,15 +279815,15 @@ CVE-2025-21136,0,0,1471b8df9400bf2a614051a2204be217d0d5f426f818af5f4e13aa30b875a CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372fd84,2025-01-21T17:49:47.150000 CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000 CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000 -CVE-2025-21155,0,0,d61fdc656cd96a945fd7b9af2ee9252f6430df0e0dd253980f49fb5bdf069ec3,2025-02-11T18:15:27.583000 -CVE-2025-21156,0,0,f7e5756ac01ea682f9bd1c548f18df3c6bce1e9d9a66aa25d33e5bdb8df36343,2025-02-11T18:15:27.787000 +CVE-2025-21155,0,1,1ee49d33bfabef78343cc7af8c527cca0e5a2529c9eaeeb2555c43789cd90432,2025-02-11T18:15:27.583000 +CVE-2025-21156,0,1,3dee0f6c65f1bd094a761214b4f97ccdafcdcd8576589694bb708cf58dce07fd,2025-02-11T18:15:27.787000 CVE-2025-21157,0,0,04d80e0b8e19a2dff097acf5fb55024efe8d9eda9c1a5f1f72ba1cd57a2dd41d,2025-02-11T17:15:24.353000 CVE-2025-21158,0,0,4e1dd4d606a00549db5c70d9381cddaa7991b2ab0df43b4187cb4c170c343e2b,2025-02-11T17:15:24.487000 -CVE-2025-21159,0,0,39f949a60f051798b6eb4983ee36ef9900d379850f2ce060cdd35794e287fdd8,2025-02-11T18:15:27.977000 -CVE-2025-21160,0,0,9994a4952a9e9afc62f746c15aa6f20f23635dfdfc899516b4fe7c52f199bb7e,2025-02-11T18:15:28.163000 -CVE-2025-21161,0,0,ba90da9d0cbc60acec84e1d77e27aa2d753d3d0fa919584c0c1fde75f16e275e,2025-02-11T18:15:28.347000 +CVE-2025-21159,0,1,a9ac97f778d3919ed16980e049dcd2cfb997abee99305add810e8411b6f150c8,2025-02-11T18:15:27.977000 +CVE-2025-21160,0,1,b298e9dead90b56d68690fe8f94f6532c5140473ae9644b8fc7d33c5fbd6d42e,2025-02-11T18:15:28.163000 +CVE-2025-21161,0,1,1b902802049c73c55ff4a183777bbf90477f90dc91e3054767f24f30480cd2e1,2025-02-11T18:15:28.347000 CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000 -CVE-2025-21163,0,0,ed3ba58c555afae11b9f7776f959ad83d274a64ae1ca8ee7ba7a4047c0117bce,2025-02-11T18:15:28.747000 +CVE-2025-21163,0,1,a8e834f1ce087f417f4c36cbfcd18f99636cddb18ced97873a9e42cb60c639d9,2025-02-11T18:15:28.747000 CVE-2025-21171,0,0,3c9f6942085918a90e9231b06b07eff9b6bf5a4b6913504e83e61dbac7d978ef,2025-02-05T20:07:01.797000 CVE-2025-21172,0,0,c4b86213875e6603d2ee53fd6b46e908496cb95e2ca90c3d8db30a098c51eef2,2025-02-05T20:03:33.053000 CVE-2025-21173,0,0,ad7a0687adbbd12bea1660d0b0ef666d021874e57d663931aea070a6cab1470b,2025-02-05T18:56:08.103000 @@ -279961,7 +279961,7 @@ CVE-2025-21321,0,0,d4d04e43c9c7fb6525f2965fa6daa0b0763cac5e81f6f3f0f13b65d580f7d CVE-2025-21322,0,0,36afae68f9b6dac0a27406f76009dfe495c605cb1fe6c331fac0678ef1b2abae,2025-02-11T18:15:33.027000 CVE-2025-21323,0,0,3579efad4e0f21cb5d5e10181ff8bd15434d6e106723a06738697ae24cf26962,2025-01-22T14:47:11.963000 CVE-2025-21324,0,0,c2e9c6050aebc2d5fce46b1fe10ad3769c28070faa9ed2d2a8db1006deedf2a2,2025-01-22T14:46:51.207000 -CVE-2025-21325,0,0,adc6051fb96c54b0fdba83aa37ed2ebc8b7e0ef6be77c8748e4973fce8d78fb4,2025-02-07T15:21:31.407000 +CVE-2025-21325,0,1,1e9ac8e59ea270ba0213d9228cab1f528312c5bc6be8058bf3244a2b7017b22f,2025-02-07T15:21:31.407000 CVE-2025-21326,0,0,a5e6f1ef9b9a2944d2bea648da839845d2d7762f68463063bd25e92cfb364e2b,2025-01-22T14:48:07.620000 CVE-2025-21327,0,0,6bd622b4cb196ab3d63971ece1faaac22132cd2a79e6a25e00781b3735394834,2025-01-22T14:59:37.587000 CVE-2025-21328,0,0,c55b285a694d6e2b58155292638f31c2f5766a335ddfa572448875697271530a,2025-01-22T14:59:12.047000 @@ -279990,7 +279990,7 @@ CVE-2025-21350,0,0,afdf915978914de12ddb47f8080382e5c3b27b9e602062b6fd9ccfc1c9cd2 CVE-2025-21351,0,0,48fcf1f43b1c92276907ee87c085abb066108b8d3a5f6a626a70e01ac00f8d1a,2025-02-11T18:15:34.113000 CVE-2025-21352,0,0,a81d34aef4d981cd5666fd3fb8eca70146e26df755619e866a1140df31ff66cc,2025-02-11T18:15:34.310000 CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000 -CVE-2025-21355,0,0,d398c7f08b482432ab80689f7a1c15596b3ea3eee999a2d8c554ff351cc20f49,2025-02-19T23:15:12.963000 +CVE-2025-21355,0,1,82b9bb6fa9b16fc3d581cfa9698ff1e423e9e4837d592d93c1d250739ce70c0e,2025-02-19T23:15:12.963000 CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0b95,2025-01-21T19:37:28.987000 CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000 CVE-2025-21358,0,0,6b3b006fde15330f98a3679d6649f7d69255f6979eb0e6604e227fb2cdf13add,2025-02-11T18:15:34.550000 @@ -280144,7 +280144,7 @@ CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c CVE-2025-21604,0,0,0ed8064b9182950e530cb7b2f52528d7c551930e7450b1b19d40475d7a199d1b,2025-01-06T16:15:30.927000 CVE-2025-21606,0,0,96601cbde3c001e957b824bee33aade0518cac700d01b4fa6698bd49de4d74cd,2025-01-17T21:15:11.420000 CVE-2025-21607,0,0,1209306172347dde01f13b6689a1616e491e8e2e568e8703f282009eb4f87675,2025-01-15T16:15:34.463000 -CVE-2025-21608,0,0,3d8759d19198a433a6c22aac53e345cc21ef377b917921344bfa8c2de5ecab8b,2025-02-18T19:15:25.220000 +CVE-2025-21608,0,1,08ab881f5761c838e614bef5690313a7280bda7f7217eec423ffa231038bc5c4,2025-02-18T19:15:25.220000 CVE-2025-21609,0,0,3c2fc9da6be905fe106ba75040e21828a0454c46abf195fca7a6951c7de8750f,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000 CVE-2025-21611,0,0,8e422e5fc6d4af0b6b34d70cc0908397e091aab260ca691c03a0f88c30af7c40,2025-01-06T16:15:31.413000 @@ -280233,7 +280233,7 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1 CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000 CVE-2025-21700,0,0,3fc056d46af8f0b78d97452f108ed5d658c922ab699c8a2bb43cbeaf9fbd76c6,2025-02-21T14:15:54.717000 CVE-2025-21701,0,0,d7c054d565dcf2a6e8d7012de1892a0a2fe63adaff9755c9d55124b93699efd4,2025-02-21T14:15:55.747000 -CVE-2025-21702,0,0,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000 +CVE-2025-21702,0,1,d363aa73cef2e84d05fef6ef479e127c11617ea6c3706bfabd35a9d26103dec7,2025-02-18T15:15:18.530000 CVE-2025-21703,0,0,1b70a75eeb992a0cedbee9d2af799a85c7fa5ad6d64038ed6ea31d816ef224ad,2025-02-21T14:15:56.627000 CVE-2025-21704,0,0,e026f221b6ea2c6334913aa4f1134eade120f5fc4a007942f64f63ed42e111bc,2025-02-22T10:15:11.263000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 @@ -280261,7 +280261,7 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8 CVE-2025-22204,0,0,15823536a3679737b5ef36e2f772e366706e0f48ba530e66ed64a7380917346d,2025-02-04T18:15:35.247000 CVE-2025-22205,0,0,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000 CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b266,2025-02-06T11:15:10.797000 -CVE-2025-22207,0,0,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000 +CVE-2025-22207,0,1,cadb651bb65bbcff9732fd0600719f2be03a1e19cb97c53633866d5afdef6643,2025-02-18T16:15:20.467000 CVE-2025-22208,0,0,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c0595f,2025-02-21T13:15:11.400000 CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 @@ -280281,11 +280281,11 @@ CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b43 CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 -CVE-2025-22284,0,0,b4bba2f887fee4bfdb2af344b89b13eaf225c237a8dd321f1b42e5bea3b2bd75,2025-02-16T23:15:09.280000 -CVE-2025-22286,0,0,5ba2132f63de2bf6bf17c54a7abd6a97c5204d9dc24b1842120329793c4bb4fe,2025-02-16T23:15:09.427000 -CVE-2025-22289,0,0,e8af2ef048e85afd8c9fcf9616e053c47d8b638d34a72304e5531e6ce2744277,2025-02-16T23:15:09.567000 -CVE-2025-22290,0,0,4c77257ac665fbe18fc587c52e2a8624f9d87a9dc7a3d3829754b7863ff2b7d9,2025-02-16T23:15:09.713000 -CVE-2025-22291,0,0,364f00d902f60116ab8199384bd27f18167d0647d6ccec59e6b0460ad6388b23,2025-02-16T23:15:09.877000 +CVE-2025-22284,0,1,370c5c60e996c4b6559ca9bd6a1392b16df8aec67b8cecdd196304ea4ccbf961,2025-02-16T23:15:09.280000 +CVE-2025-22286,0,1,44135cef202ec1b1c9d4f0252ad614abd14631ba5cdbd8f36ca1d7fd4944fbe5,2025-02-16T23:15:09.427000 +CVE-2025-22289,0,1,c7670fed37bc75554b393a65a800a4550d1fe20759eceb18daee859ae095fb32,2025-02-16T23:15:09.567000 +CVE-2025-22290,0,1,11c6475a176a46f29a3ea5b9e5748f478a39d13a5b52077f0beabfd7d422b15f,2025-02-16T23:15:09.713000 +CVE-2025-22291,0,1,b0dac8744626f6cb57212dd9a8d645bf56d06fb786d10125c0900cdc15f60642,2025-02-16T23:15:09.877000 CVE-2025-22292,0,0,0a179a28798372b1354b5887532a0aacfe8816e7abd0dc207ba7b50b06093bc5,2025-02-03T15:15:17.677000 CVE-2025-22293,0,0,0fb85e30408666f4049ff5e391f5eb0edea1a607b8157160cd5e0e00489520e9,2025-01-07T11:15:13.473000 CVE-2025-22294,0,0,fd3c530f54ed4c49be0865300ce0d8ca3b1fb9d97860cd5c24499f717ff48c10,2025-01-07T16:15:41.137000 @@ -280492,28 +280492,28 @@ CVE-2025-22618,0,0,c19d0c974c1e5e33f6d26b1c1e9e7666054e0a20c6f455c24ab32d4bd2226 CVE-2025-22619,0,0,94078c2e9a44454365aeb387ac2d1c51351bb08f1b9ba4f80444a5076273dcd6,2025-02-13T19:44:19.580000 CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000 CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000 -CVE-2025-22622,0,0,8b4c82fcbc47b89df336e33d6772dec0ee9982d3b30816e5d8a35cac0fdcc0d3,2025-02-19T04:15:10.550000 -CVE-2025-22630,0,0,79b3801f8ae7e0fc2c6a6c47d25a128abd9fd0016caa673d59d6e5ab1ad69955,2025-02-14T07:15:32.750000 -CVE-2025-22639,0,0,1d384823c10ffe5023799b5e360ec42a153bd848562aed6770e0af17e75e00b2,2025-02-18T20:15:26.010000 +CVE-2025-22622,0,1,a17fde34fef88dfd64eac5d9ad181049ae5c9c1d06109d360781ad8823ac8fab,2025-02-19T04:15:10.550000 +CVE-2025-22630,0,1,65b344426847ac6a4e95d84540acfcdf1858b38747b882234f69839751f9e2a8,2025-02-14T07:15:32.750000 +CVE-2025-22639,0,1,368f140f591fc620491067013a3666481f08290e683f966a03204dde9114fedb,2025-02-18T20:15:26.010000 CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000 CVE-2025-22642,0,0,11c66884fcc0c5b60dea8fd453f90eae4e8d1cdd88bcbd39e4c0551736d3dc74,2025-02-18T19:15:25.350000 CVE-2025-22643,0,0,65c625211e7e886c19d6b17e08b20683447546e65838c862a04bf47449cfe4ca,2025-02-18T19:15:25.483000 -CVE-2025-22645,0,0,e2de689f2cc2e51988bf622372a0c394b54952b2f476a0e9bf0a34cb68a0274e,2025-02-18T20:15:26.570000 -CVE-2025-22650,0,0,1cd1a393e622c0b9ace807698a86234e3cfc19bb9aa9416e0e77fb7a99e499a6,2025-02-18T20:15:26.720000 +CVE-2025-22645,0,1,a6a3d78757cfee1187cb845c7196f5b04310841c79facdc0e64730f1bc1d94fb,2025-02-18T20:15:26.570000 +CVE-2025-22650,0,1,398faa564cbaf29266e324adcd3000bb96efd5d783dbe738e03edac22aa8f128,2025-02-18T20:15:26.720000 CVE-2025-22653,0,0,9c567e055653dafad6942fd8b868f59c075bd7f242efd581fde5462b3a64169a,2025-02-18T19:15:25.627000 -CVE-2025-22654,0,0,a9c9c5440b9c2a8019a766ce1dbf11a9b49be6b898bf7992e98625013e70edb5,2025-02-18T20:15:26.877000 -CVE-2025-22656,0,0,d258cdeb25e709fc10450c6a671179dbb0acc9532737e6955b54c6937574b47d,2025-02-18T20:15:27.037000 -CVE-2025-22657,0,0,f5aa88996b04ce8100ba25f03d8a1363aa1b07721e0de56898a3e821705ed05c,2025-02-18T20:15:27.190000 +CVE-2025-22654,0,1,08ff7755439106dc22a14608c30b02f4570ccae560f0dedb81372c8ef6b31155,2025-02-18T20:15:26.877000 +CVE-2025-22656,0,1,2395e8a07838fe647327bc08d65b90eeac53bcf3477a750aac288550cc049839,2025-02-18T20:15:27.037000 +CVE-2025-22657,0,1,13fa23650dadaf64dede5b14071ed9acf6bbce110958326bfec0833b8db56f46,2025-02-18T20:15:27.190000 CVE-2025-22661,0,0,5209e5b0f9c7939e902aaa866620e423d90372564b55d2924e42e42f27d6a81e,2025-01-21T18:15:15.707000 CVE-2025-22662,0,0,962ab222d5a96ff811aa7aa96d0d9f516c663f85299dc1f3c1080c9811010ad9,2025-02-18T19:15:25.753000 -CVE-2025-22663,0,0,583b568c167d7bf176eba2119d6f7260a5426182559d0ab7e761149de989de25,2025-02-18T20:15:27.343000 +CVE-2025-22663,0,1,9dfdd8ab8ce2ec429cd30b7e526cbc0aeb340292b3894d410c2617b322ddee7c,2025-02-18T20:15:27.343000 CVE-2025-22664,0,0,f7d6e496e62415f46b76c8ef55e71f4304d572ade17c6569a88c324811b52af0,2025-02-18T19:15:25.890000 CVE-2025-22674,0,0,4c62711247e33f87026272b579a8a4aeb1faa8374abc3fdf8f1eb2eaf5535454,2025-02-18T19:15:26.027000 CVE-2025-22675,0,0,976876d8bada85ddb7f9b01306108b5dc8490f124ee847cc17386ccf664141b7,2025-02-18T19:15:26.160000 -CVE-2025-22676,0,0,48e02aaad355c0bdb0907a6c2df25f41b0f21c07115005edeae3afc845a9abfa,2025-02-16T23:15:10.037000 +CVE-2025-22676,0,1,6ef067b8be00f64d83e00c4ac97d257e0478bd0293835a57c548149d7ad4b7c0,2025-02-16T23:15:10.037000 CVE-2025-22677,0,0,56fc462ed8efabd49ce1f0e6a2628b8d9f5f9d1ccf265bfcaae01089635695f7,2025-02-03T15:15:17.827000 CVE-2025-22679,0,0,2f277aaa5fffe9654d22cc8647fce7a692ea020ff267ecc8af7b0ff370e0d5e1,2025-02-03T15:15:17.980000 -CVE-2025-22680,0,0,5cb3ecb75be0eadcbe65062db3cf58ca5282cca85735608b6507a64e06bf2290,2025-02-16T23:15:10.183000 +CVE-2025-22680,0,1,15576fc14943e1f6fca9b62787602bfab9983d24c735c79099a4ca926d87577f,2025-02-16T23:15:10.183000 CVE-2025-22681,0,0,c6253ce9e47d2abb4a9c5ac568731bc49b4a1189b4d90c246688c3e0c830614f,2025-02-03T15:15:18.127000 CVE-2025-22682,0,0,e77a6f2b7a3ad5225b4f62f23b09f955535ba4028e42f80eba37f5290ba6dd2e,2025-02-03T15:15:18.270000 CVE-2025-22683,0,0,a8b81acc9187a933d45ffdb39d80319520ea252f8849dd50e1ad8e1b88f28b14,2025-02-03T15:15:18.440000 @@ -280521,7 +280521,7 @@ CVE-2025-22684,0,0,4c0faff6a51bf22c6057b965974a65d8b3cdec97cab52f5d2b607780797a5 CVE-2025-22685,0,0,0aca1e462c147586a6ae88d5cff70e9389d5f88504020905ad7bc42c58db56f7,2025-02-03T15:15:18.717000 CVE-2025-22686,0,0,e7aedb7f26c8e953eeabe70988ee957926c38e58630395561780d2b497945e24,2025-02-03T15:15:18.863000 CVE-2025-22688,0,0,92e6b7ae109ab9a018062b886e106633218ca644a2c59e2e57282ed813f67e0b,2025-02-03T15:15:19.007000 -CVE-2025-22689,0,0,cb0acfe4ea0a2d94f2b0e766e86bc956edb4d3dd0cec18126c6c962c45e9e291,2025-02-16T23:15:10.330000 +CVE-2025-22689,0,1,9fda677937fa11831a4352e358c5db4b7d29c7eb9c36d6229bdf5aa6e910bd6d,2025-02-16T23:15:10.330000 CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000 CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000 CVE-2025-22693,0,0,c893eff5f2226b03055b6c9c68aaf4bf3303cc144b5968af874a6d7eb6cb2993,2025-02-03T15:15:19.467000 @@ -280529,14 +280529,14 @@ CVE-2025-22694,0,0,96b1bc67077d6724bed157ad909e382f421512dbde661698a81e8882d1d6a CVE-2025-22695,0,0,0a8a71d8bc1a4d3051f4475b36e68c6610b345ec6ee024bc91b765df5cb592ec,2025-02-03T15:15:19.770000 CVE-2025-22696,0,0,a78ad16e71ffcef32da6e8beedb19b7429b4548fb7904e608e5ab76d1d2bd28c,2025-02-04T15:15:21.643000 CVE-2025-22697,0,0,892d6dfabc8c44d4f376760c48fa855f3962a55474d0da844d42da0488882d87,2025-02-04T15:15:21.793000 -CVE-2025-22698,0,0,3a6ed00106448583332168a10909ea54dcf698d744cbbf70313c23002a5311d4,2025-02-14T13:15:42.757000 +CVE-2025-22698,0,1,9e59b2a1fe040dc678ead0cf3b4cbc1a648e3884d1123a87e06ead5898ecf388,2025-02-14T13:15:42.757000 CVE-2025-22699,0,0,aa251ed374c7131b82fa13b089f71f242ba87a24bd93b88104587dc53b3887f5,2025-02-18T19:15:26.290000 CVE-2025-22700,0,0,88aaedc9c5edb573fa30dda68b0167b132ed36dbb1f26784a49841ff4734d88c,2025-02-04T15:15:22.140000 CVE-2025-22701,0,0,9a84f2ae3e62c1e3d064a4669384e54a23193f984d548418408b1656cee0bffa,2025-02-03T15:15:19.933000 -CVE-2025-22702,0,0,be512040e2397e9247cddec65e107b7b4af93143d312e60cc34cadba3a958cc8,2025-02-14T13:15:42.893000 +CVE-2025-22702,0,1,356c7f424b3738ce584bb0111faa419ee1d0d6128b62f58c52aaf3156d162eff,2025-02-14T13:15:42.893000 CVE-2025-22703,0,0,c6c215534ec02bd948a6e66678f9a3e8a481ce13cf9e54fbb5e8cb2c8da2042a,2025-02-03T15:15:20.100000 CVE-2025-22704,0,0,414149081451a41091726c0400b017c0c9bbdce68febf028bdf6499ccf05d4a7,2025-02-03T15:15:20.273000 -CVE-2025-22705,0,0,75b97a82131adc62686663c03a6e361b2828d70563e1eb9253291a05578df0d9,2025-02-14T13:15:43.020000 +CVE-2025-22705,0,1,28398f9b467289c0a7867180167ac8f07e113e0d45590b3ed6b86947b8adb5ba,2025-02-14T13:15:43.020000 CVE-2025-22706,0,0,426d0c1b0527ee1d623f40f809dfb7f93a7c42b34ad1ff79a058926eac7018d0,2025-01-21T14:15:10.640000 CVE-2025-22709,0,0,3f8492adc78070ddb38f727e841374c07eca9b418229f22b07bd0ce34a8b5f25,2025-01-21T14:15:10.823000 CVE-2025-22710,0,0,40f6e9b73df3fa17e0d165ff493773064dddeba801cd97e03af654cab32baf6e,2025-01-21T14:15:11 @@ -280642,7 +280642,7 @@ CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 -CVE-2025-22888,0,0,f5d32f8dd85089b4081119504cdbaa08e62536c566f34b631736ce9146eeb63c,2025-02-19T06:15:21.687000 +CVE-2025-22888,0,1,f7c5331c561f904eb22361c39eef1b15a67d443c06790d321ecd5b6286014fc4,2025-02-19T06:15:21.687000 CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000 CVE-2025-22891,0,0,34a57f6019ba9072a9a6b4c9f86ff3b9d6f2414d47e8b5c13c1861a56f0b44ab,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000 @@ -280663,9 +280663,9 @@ CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000 -CVE-2025-22960,0,0,909fd4543561b179cf19e362db8b8b06eacc11dd2ff530093e36ef46d4e67f11,2025-02-13T23:15:10.960000 -CVE-2025-22961,0,0,977c2fe378865dcb0b1e64b0c10fc2188b8a7bb82cfb2af8a0d422ceddc01711,2025-02-13T23:15:11.047000 -CVE-2025-22962,0,0,edfa6947f0850e24eb9cdf90af6759e9e22a516ea9c64433cee19e5c5eaec8ee,2025-02-14T16:15:34.803000 +CVE-2025-22960,0,1,744fb252a3ba84e23c5f280db7b14361506334b92f4ff5cce622de97d4dcb10c,2025-02-13T23:15:10.960000 +CVE-2025-22961,0,1,606400b37cc64b2ede47464265e2232f7088ed78d881daa978231e97f31679dc,2025-02-13T23:15:11.047000 +CVE-2025-22962,0,1,cd5e7657533e9ab36ee97a16b664b89e49f477e076ca1aeff12ec5874b215bd2,2025-02-14T16:15:34.803000 CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000 CVE-2025-22968,0,0,d3d48189e9b72af1c9aeb72931ff25b490499842dd9dca10fe5551a85839cd34,2025-02-18T22:15:18.143000 @@ -280689,7 +280689,7 @@ CVE-2025-23015,0,0,45b302f2cec3cbe0c8e5d07505c76b93a083cf4972c8927214f2b54e92bdd CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000 CVE-2025-23018,0,0,56e80d02e024f696b384ef49ed4d211481ba7fbade5b33c2ad0870cd52e237b6,2025-01-29T18:01:47.313000 CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e82d,2025-01-29T18:02:06.240000 -CVE-2025-23020,0,0,1cad767f2302c7908ad3edcfc982475af1f01ae8b6a8dad5900e7ee9940543ba,2025-02-20T03:15:12.630000 +CVE-2025-23020,0,1,25923bb14a1c6995cb5e401bf55760ebf3529321cd6b5a181b1b763453c28634,2025-02-20T03:15:12.630000 CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000 CVE-2025-23023,0,0,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000 CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000 @@ -280799,7 +280799,7 @@ CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 CVE-2025-23403,0,0,82b06e110d3ccd8c4d0bfc3742d0bc8ea53cc32814babb7763c06a537adabd76,2025-02-11T11:15:16.420000 -CVE-2025-23406,0,0,0697e08c7f212b286b17523f0a64ed0d5e5826076f22b9355dfd8ce23e8d359b,2025-02-14T05:15:12.567000 +CVE-2025-23406,0,1,702066a3a1f62106503d1ca03a4fdc1dc65eca10b986d5bd982d332e1bb0e8c6,2025-02-14T05:15:12.567000 CVE-2025-23411,0,0,d5f7bb7224f39d14b2dbf54b46dff651a924fc4bc3c91dc75a0e3dbbbbf2e5db,2025-02-13T22:15:11.913000 CVE-2025-23412,0,0,3faa269bcd3c90e82676b0efb29c0ad0e841370c3bd284f2de04616b2954d5d8,2025-02-05T18:15:31.580000 CVE-2025-23413,0,0,7fb7f2975e478cd02eba1010c27b44fc375b6470dc15322ce018425eae06f806,2025-02-05T18:15:31.930000 @@ -280811,10 +280811,10 @@ CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 CVE-2025-23426,0,0,2229e7d1ff76d0c5e969c3251982ab349229fc474aaf0fa42cebd6f9eb1f7a85,2025-01-16T20:15:33.877000 CVE-2025-23427,0,0,1ab1fc81c6d9ecd522651b87bcc6522c6506303e1906de8f32583cb95508df8d,2025-01-24T11:15:10.140000 -CVE-2025-23428,0,0,96790f81b2ff012628c94b13869ef9fab1722e78294b61a1c34464d047c68267,2025-02-14T13:15:43.160000 +CVE-2025-23428,0,1,bc8413d339c63a327e9125bee470da13a75ea581e4ad21574cb19bb136ad676d,2025-02-14T13:15:43.160000 CVE-2025-23429,0,0,2e8256da44ff61177c4f2a5d237cc05baadd69659454e348a75499c81473e2a7,2025-01-16T20:15:34.057000 CVE-2025-23430,0,0,d6a6f32e23dfcc5842a2f98f2cef617f4db5d83551088778a76b915d16293a79,2025-01-16T20:15:34.287000 -CVE-2025-23431,0,0,bf6953edf5c2b910ad8a104e1b5fc49aaf5c870b66d7abd19a79088768b94452,2025-02-14T13:15:43.300000 +CVE-2025-23431,0,1,dba3ebc63549029ec51b9f39e9d57f13f60b5498e379eaa3550b81a86aac3d77,2025-02-14T13:15:43.300000 CVE-2025-23432,0,0,e754a47d3de4a683f85700167b4d6315e5e70c68f0936fe6c95c5e783cb9730f,2025-01-16T20:15:34.467000 CVE-2025-23434,0,0,f44f7ad85e29b672c8bca7ccf3a8ff077acd5c80e8883e15c08b84c2d2d93953,2025-01-16T20:15:34.607000 CVE-2025-23435,0,0,6945949396459e98e52f3a5c95f90747ab0b3d87702a11bee1fbbbd38b17e9e7,2025-01-16T20:15:34.770000 @@ -280836,7 +280836,7 @@ CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1 CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000 CVE-2025-23470,0,0,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000 CVE-2025-23471,0,0,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000 -CVE-2025-23474,0,0,0207f611c7ab5b62333e86c57ed7ef9b20ebf3ecb414d397a31cd508f156ef5b,2025-02-14T13:15:43.437000 +CVE-2025-23474,0,1,300255e8accd83a88b8f8bafc4d881c53c1e8d4399c2b5f4465920be78d5065f,2025-02-14T13:15:43.437000 CVE-2025-23475,0,0,bee00c7417c73e1b37a63fcab4cee0ea39305a10e2073977017caf018a8c6266,2025-01-22T15:15:15.950000 CVE-2025-23476,0,0,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934c03,2025-01-16T20:15:36.990000 CVE-2025-23477,0,0,5c6098808319de4505951baebf1a586e4793ae0be4627c3cf65438e22beac475,2025-01-21T18:15:16.570000 @@ -280844,7 +280844,7 @@ CVE-2025-23483,0,0,4bc6ad2f14d9de9a0797c4da2efee9475ed740963c9329c34f76f07dc0903 CVE-2025-23486,0,0,db15fe8e353e3dbb641397d86d33ed6d64f36b2de802bd430384278f6b43f617,2025-01-22T15:15:16.093000 CVE-2025-23489,0,0,a8502fb4e83bb7ba28297e2543a85c84c18f12fcd380f120406bbfcdc0815675,2025-01-21T18:15:16.740000 CVE-2025-23491,0,0,b6e04909bb37731409bf7190d1070864f039d5a61566e683ba212ff3dd649d05,2025-02-03T15:15:20.640000 -CVE-2025-23492,0,0,8a46db664f6db7bcf4263c0eb590e687b5ddae37615d88aaa05e1c68e8825387,2025-02-14T13:15:43.573000 +CVE-2025-23492,0,1,78b8098809b37aa921b40fbbf9edb33d9b0ab8b4fdeb3ab8323b72e73e2218fd,2025-02-14T13:15:43.573000 CVE-2025-23495,0,0,d9a0cdbb453046f78521503adb7f92c01ed64245a1eea664c6e0347d070f697f,2025-01-22T15:15:16.230000 CVE-2025-23497,0,0,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000 CVE-2025-23498,0,0,636b120a74cbfb3524538ea103d8fb93424975cb4826227d74647c0da497f2d4,2025-01-22T15:15:16.370000 @@ -280862,8 +280862,8 @@ CVE-2025-23512,0,0,e86f11dc0e50a02bdc0d99b58f1ba83ef676ca0586a75df06c6165a1959d5 CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4f06,2025-01-16T20:15:38.193000 CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 CVE-2025-23522,0,0,5852e7950af307e368eaa84dbad2a68c2fcedda8bde1f4b6e5689bc8014fb4d2,2025-01-24T11:15:10.290000 -CVE-2025-23523,0,0,5babe2ab81b65162ae8b8e240f01fb33a8cdbc8d95651f2879fe1c6d737ef124,2025-02-14T13:15:43.703000 -CVE-2025-23525,0,0,bc8d9f33b0bf5fa520b9e3e0d689ac4fba09b21497a947fea30727043707139a,2025-02-14T13:15:43.840000 +CVE-2025-23523,0,1,a2d44fd35976a5686df0acc29c51f07ddbe0c3c2614997268328b8ced1227426,2025-02-14T13:15:43.703000 +CVE-2025-23525,0,1,8a3527533060aff06c522a2218ff066eda4547b73de1855f36dd0468aa144fc6,2025-02-14T13:15:43.840000 CVE-2025-23527,0,0,2616a2828036793cafecf099ff69e00f486a89855e414df730486d37d346642d,2025-02-03T15:15:20.807000 CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 CVE-2025-23529,0,0,b38c5bcca5430635b24ab570fbf9d55781bea0bd4a1b3b85f466b119ace5bddf,2025-01-27T15:15:11.813000 @@ -280871,7 +280871,7 @@ CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd CVE-2025-23531,0,0,85d4cc0fc745eed60372f92f67e456ced56a3415abb96da8db1f6166fe626ff8,2025-01-27T15:15:11.963000 CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000 CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 -CVE-2025-23534,0,0,06433720ed8454104926d27a013a83fed6815ccae8d40d79d91ad65e34513caa,2025-02-14T13:15:43.980000 +CVE-2025-23534,0,1,4d76e195a3625a540e63fa63c460d33114cf38230330a4ca2e24c3d32fa5024d,2025-02-14T13:15:43.980000 CVE-2025-23535,0,0,c4c4e7b4c3cb9320eaf3f6bf1ebb93064af87ea92072de8b0d212ee5158c55d2,2025-01-22T15:15:17.290000 CVE-2025-23537,0,0,79e57ef42623bfacf08bcf48f182a917b206d07a7014897deba86aa5721ba1be,2025-01-16T20:15:39.070000 CVE-2025-23540,0,0,575604080a7e41dafefd577008aef472e583d091e6d52248a1f21517385238a3,2025-01-23T16:15:37.577000 @@ -280889,9 +280889,9 @@ CVE-2025-23561,0,0,dab2762c1dcf37050b4bf31dc30aa603b8a241d893f00d9a37f79c0f4ffda CVE-2025-23562,0,0,6516913ed80f1c2cc88fcb4ddf0a4ad7854ee1cade6aaf482ce8507c93182fe7,2025-01-22T15:15:17.557000 CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf8fd,2025-01-16T20:15:39.947000 CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000 -CVE-2025-23568,0,0,924820a0f97412cca77f7c2f2c7ae0b7f59b95008174175d26cb65d742a58289,2025-02-14T13:15:44.123000 +CVE-2025-23568,0,1,4f533cc50dcd93ef6ec721ab4174cc4e68d9929510f4d75dd6f45442a857c8db,2025-02-14T13:15:44.123000 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 -CVE-2025-23571,0,0,aa56e7cd2f0f65e052fed908bc0e0d1119d70e5a69bd961841e1b1c3e4bf491c,2025-02-14T13:15:44.330000 +CVE-2025-23571,0,1,9e6f0d9275f7c2f25054646b26d287fa5c7701d0b2d4c5a105cb885e64e377c4,2025-02-14T13:15:44.330000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 CVE-2025-23574,0,0,693be34be21aa389e45f03519c1745c4eff22d58bf3f0cdd7ea8e91da34e3735,2025-01-27T15:15:12.123000 @@ -280910,7 +280910,7 @@ CVE-2025-23593,0,0,aaa3e68323492fd453c38c81980209bbeabeeeb1c6f76a55c668815c2570b CVE-2025-23594,0,0,cf7f1fa31ac3cd50b92d1b9320d9426ae367e4be88f52e990dc79ec7fc8b6b6e,2025-02-03T15:15:21.980000 CVE-2025-23596,0,0,c0c87db7b414295d6b37258b125c64c14eac275967c68ddf6e89f0af7a37c04d,2025-01-31T09:15:08.060000 CVE-2025-23597,0,0,cea463851f9e84dc4dd23a6193771cbf7bfb7af0f728bfc9f3248f50d515c2f7,2025-01-22T15:15:18.230000 -CVE-2025-23598,0,0,dd597c278695a1fe80c90225cca35ef2897dbf84917e62f6b09d8a5aa905705e,2025-02-14T13:15:44.483000 +CVE-2025-23598,0,1,bf4fc564fba78d23fa02c18c100e355d0a929c9cfb41a3d549db26650fb60f2e,2025-02-14T13:15:44.483000 CVE-2025-23599,0,0,d05df5cc8092b2ef3ad2303b9842c8e30b1f9b745e52850641df822505ef2a9a,2025-02-03T15:15:22.127000 CVE-2025-23601,0,0,46c1fdfdf28a66086beaafaaeea851de5230b874b48166effa2de17c132d6628,2025-01-22T15:15:18.363000 CVE-2025-23602,0,0,d30be2a2699442d6075f3ffc9305b161d70bfc2cca96a60dac61452b8d1a5a89,2025-01-22T15:15:18.503000 @@ -280946,19 +280946,19 @@ CVE-2025-23642,0,0,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa376 CVE-2025-23643,0,0,b353edc36c329787ccb2df45790b0cdfde93aca21e629f256a43abc715ef88b9,2025-01-22T15:15:20.153000 CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 CVE-2025-23645,0,0,e62f657067e8d88007fe5a70d97e75c188280f95e35db06015627e1330284af7,2025-02-04T15:15:22.873000 -CVE-2025-23646,0,0,69ed883b04a505167de3f7cefe760c8e88ac9703ae64fc5e256919a6f780032b,2025-02-14T13:15:44.617000 -CVE-2025-23647,0,0,c355f8ae6a210dcf5a2c31b2d1daa68f3e79b986e7d74d24b104ad3067e57caa,2025-02-14T13:15:44.790000 -CVE-2025-23648,0,0,cac4478ce2284aac0350bfb1c681e6fa5c862d355efa491b7878739b501b0164,2025-02-14T13:15:44.930000 +CVE-2025-23646,0,1,a898993fb3ea8cc7d75b1b03e7e0e4a35d3041cee3e9a900d08128a79944fc72,2025-02-14T13:15:44.617000 +CVE-2025-23647,0,1,ff139b2cb7716edce3aed8af2a5fb1547c78915bbf783e81e04e133e9839a0b9,2025-02-14T13:15:44.790000 +CVE-2025-23648,0,1,cf54d953b1e742210b80adaa42a6c1350d12b27ae300ed5c9d56a7466b25fc6f,2025-02-14T13:15:44.930000 CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 -CVE-2025-23650,0,0,84a677b4f9e04b1c46a8501650cd47d918fb14cc024522e103b7e21b6abd2e7a,2025-02-14T13:15:45.063000 -CVE-2025-23651,0,0,1f718c568f2d565b1124772359f3f41eb5791b3a5fd26544466b429546746a53,2025-02-14T13:15:45.200000 -CVE-2025-23652,0,0,77c0c9d0ba641ecbea53ca390255ec1c6ab8c6cc4b832b8238466f8950277a46,2025-02-14T13:15:45.333000 -CVE-2025-23653,0,0,4df0a4bbe0585eca047fc23eac50162c6f76d9430b524f5c81c3606c364ac979,2025-02-14T13:15:45.467000 +CVE-2025-23650,0,1,dade7ee99c48f2114c1cffad7621d1663b21f99c187aa1f3f4807dddaf5e39df,2025-02-14T13:15:45.063000 +CVE-2025-23651,0,1,1e7a463329ea7f05e3ef8526031165cc58d76e80d9940507805d3555f39fb774,2025-02-14T13:15:45.200000 +CVE-2025-23652,0,1,0ff1b176ff2d70083a8910379e2e4e7272bd446524b6670e8c9be1f23c810ae7,2025-02-14T13:15:45.333000 +CVE-2025-23653,0,1,51a18b4bf1edc9969d0abcc68c328f21c663dadce24da0169c32800126f6910d,2025-02-14T13:15:45.467000 CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 -CVE-2025-23655,0,0,f17b80ee56f5ee8a1a5a6d588e041d8eb1fc93c3811fab38fe0b44b1f7c20a8e,2025-02-14T13:15:45.610000 +CVE-2025-23655,0,1,b1b4cd5dc1921a2d6f195cf7d4d2dff45f681fd885fafc2028fb693d98db1fd3,2025-02-14T13:15:45.610000 CVE-2025-23656,0,0,97e221d0e76175e25d429555113f1ee1530bd9533a3d9111b2c321c58200f416,2025-01-27T15:15:12.267000 -CVE-2025-23657,0,0,155385cd4f051f952000ffdd4465309ced870670b9d1b020a6949dc5b332f7c4,2025-02-14T13:15:45.760000 -CVE-2025-23658,0,0,628678ec71b8cbd4e4a976d7ec229e522000ee4d871b284e6cbaf2498a5b152b,2025-02-14T13:15:45.900000 +CVE-2025-23657,0,1,381956e1a2b3458180339167583017072b4e0ff0e6e050d736c82b83c83d36c9,2025-02-14T13:15:45.760000 +CVE-2025-23658,0,1,7d5c1b9a9040d9967d9476cd9bb8868c579bfb317cd4ba817351dfaf17b3f817,2025-02-14T13:15:45.900000 CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000 CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000 CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000 @@ -281017,15 +281017,15 @@ CVE-2025-23732,0,0,a319b2653140b4341d08717a159e17e281e96faa4531ef7eaf2b0aebc3064 CVE-2025-23733,0,0,ba14d7b711147bcf408bf8e6bd2e361fbeeaf786be070e9273bee40e739e6a4d,2025-01-23T16:15:40.073000 CVE-2025-23734,0,0,d08399ebf6e8fdb4054e549d4b1f5dfafe09daa5e675446b005341c5933da542,2025-01-24T11:15:10.967000 CVE-2025-23737,0,0,607d60dbc000683cdb744c3f8a0ff459baac89a608490796576d67926bb66926,2025-01-24T11:15:11.103000 -CVE-2025-23742,0,0,30a08bc8286592b43458418774bca0a91fe7b4ffb0c017435dee0be6528032d0,2025-02-14T13:15:46.033000 +CVE-2025-23742,0,1,fa7a00142a571021dd505f4483738e0eb0e5f7f9fdd55083c8db184370d9aaaf,2025-02-14T13:15:46.033000 CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827cf0,2025-01-16T20:15:46.550000 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 CVE-2025-23746,0,0,c56dd2cf7a0062e75fcd4ee99e1079e2b8a6e7e500841295bc6a9d4e9cd8930e,2025-01-22T15:15:22.783000 CVE-2025-23747,0,0,11189b08f0b32d1a33e2a07404303abefebf771e15b3f51ebbf518ed937cebb4,2025-02-03T15:15:22.557000 -CVE-2025-23748,0,0,88b9c98497ed7c35eb111804ab84a854fa86d55f11c558ad9183cfcdd891b8e1,2025-02-14T13:15:46.177000 +CVE-2025-23748,0,1,35d6600a0080dc9b3b456f538c1118e3fa2613f678954c91f4f7c525d0ef5f4c,2025-02-14T13:15:46.177000 CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000 -CVE-2025-23750,0,0,9f59e3c2ca7b4a13eeea0bff58d02695687f8c14bf32f5f0a184df811860e76f,2025-02-14T13:15:46.313000 -CVE-2025-23751,0,0,291cebb4a065bacf1fd465f0e119318ee283f34db55352c5ce3d06eb86ff6df3,2025-02-14T13:15:46.450000 +CVE-2025-23750,0,1,93894269aa8cfa1af824f82cef6eca8f0cf24b0b4bb850e39f9c7df5fbab2e99,2025-02-14T13:15:46.313000 +CVE-2025-23751,0,1,1f5e35912ad3eef4e9a31a38269120ed298e121a9bc0ed52192648e77e3239b7,2025-02-14T13:15:46.450000 CVE-2025-23752,0,0,2500631a89072de355d82cd9d0c12e88188eee2a9b43146cab8ef211fe41e0db,2025-01-27T15:15:12.570000 CVE-2025-23754,0,0,a8976bb97c2ae00c11653e47f47011f7edf0df2e28ad66f466282475f032adde,2025-01-27T15:15:12.727000 CVE-2025-23755,0,0,25f04dc206db1f71f9a2018ea14d136fcdb89733c2fde78659dbf54e9d738404,2025-02-03T15:15:22.697000 @@ -281036,12 +281036,12 @@ CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e458 CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 CVE-2025-23764,0,0,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000 CVE-2025-23765,0,0,2796d242b4e694c96282a5c8ffeecba3b80388403b475a6ae706c6a35a37e943,2025-01-16T21:15:18.700000 -CVE-2025-23766,0,0,c2b56224ac0100f6f55a3dde190afd1feceda7b0c9390dd6a24baf2fc95910c8,2025-02-14T13:15:46.583000 +CVE-2025-23766,0,1,572665262f830d35ddab17b85392b06834bac0792899d13e37dbb206f3cb5bc2,2025-02-14T13:15:46.583000 CVE-2025-23767,0,0,76b955d01b413ad0d12074ad466dc5f46f00daa50de12aab124eaa31dd6c7055,2025-01-16T20:15:46.967000 CVE-2025-23768,0,0,c920b5460eede4e28ad5a6bab1c476ba3bdb6f23c66470e8c98ff4291178165c,2025-01-22T15:15:23.040000 CVE-2025-23769,0,0,53257e72a10317cafa19e00a8c5a5b99ad2fd2ea1f55ca7c7353c473a7d37d32,2025-01-22T15:15:23.177000 CVE-2025-23770,0,0,b107f9a81729d03ca29a129f8fa439c6c2e86696ac80ab6dc074436a78cb1d5b,2025-01-22T15:15:23.303000 -CVE-2025-23771,0,0,d2bcaca24979053765f4dfa48fc38db64a77250e025a359a5f41c4f1650ca0ff,2025-02-14T13:15:46.727000 +CVE-2025-23771,0,1,0bb015b0f73d4c06fdf63c19faaabdec7029ba8eab31b459a056b96785535cee,2025-02-14T13:15:46.727000 CVE-2025-23772,0,0,982ec2219b56005812368f626d4b56d161e9940f6a430166e5a95ac8a677bf4d,2025-01-16T21:15:18.860000 CVE-2025-23774,0,0,25f03790ef1a65d4e7ed495f6611d37faf391b93f8f6bdc23573d19f85630a1b,2025-01-22T15:15:23.440000 CVE-2025-23775,0,0,881e3af0467c920e3a0da1ed882de028f641d7f31ac26735099153067f58bff2,2025-01-16T21:15:19.007000 @@ -281054,11 +281054,11 @@ CVE-2025-23781,0,0,cd0c15df451a42164f1d2898bc0c8ae13644ba06ec604b656c9b563ada24e CVE-2025-23783,0,0,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cdf1c,2025-01-16T20:15:47.100000 CVE-2025-23784,0,0,8849c29c56fc0e766cbf1f375ec984601e4c88563ce3850301d1477aae092371,2025-01-22T15:15:23.713000 CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000 -CVE-2025-23786,0,0,874142f9815c79d993f8b84d4608e33c3d22dfa1a2bc9281e2f9df1e15f2fb44,2025-02-14T13:15:46.860000 -CVE-2025-23787,0,0,63d23669accbbbf870646fa85932f133b6641db583377b772efb61d5d73be350,2025-02-14T13:15:47.003000 -CVE-2025-23788,0,0,683d6489189ca437d857e2fb36992a9dffcdcb201fee522d927d3938b3bdf8f1,2025-02-14T13:15:47.143000 -CVE-2025-23789,0,0,32e915a6f8de1fcef482d52af8d0789fed8ab41e0f3b9231c926cda5d60dea25,2025-02-14T13:15:47.280000 -CVE-2025-23790,0,0,b005658417702795cb91ece658a22bd3aeb7eaec5a5092319787e3176c07702b,2025-02-14T13:15:47.417000 +CVE-2025-23786,0,1,0c926a273f1be25781a107319732ec1d423cfa926703cb3e74ffd7b403435c37,2025-02-14T13:15:46.860000 +CVE-2025-23787,0,1,aee390deead454b349de7b8ac4525c18dc66661c7328de7bb5248fd5d5ae96aa,2025-02-14T13:15:47.003000 +CVE-2025-23788,0,1,c5e9bf3b8a0260fa2a55686c14d3aa645da671eb89d7fece30adf4322657c5de,2025-02-14T13:15:47.143000 +CVE-2025-23789,0,1,63242297fc3deed5e88abf0dcb99a99affe4843574357862632c516aebab9849,2025-02-14T13:15:47.280000 +CVE-2025-23790,0,1,37369bf8199c1c2e1094bfee255b350a99ce92978969c98d28ebe084104086fb,2025-02-14T13:15:47.417000 CVE-2025-23791,0,0,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000 CVE-2025-23792,0,0,3a1dea12e76b42cb372190ab685cecea7a553c8f2a71bf9dcb5f8fe000fca6bf,2025-01-27T14:15:28.510000 CVE-2025-23793,0,0,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000 @@ -281105,19 +281105,19 @@ CVE-2025-23836,0,0,5c76aa20fa64580f07d9530831e0cb5c7e88e1287b55c63d0300b02146b3c CVE-2025-23837,0,0,371373d70784fb5e2285584d435fa34d3363a28bafc09c0ab1690ff32190677d,2025-01-24T11:15:11.240000 CVE-2025-23838,0,0,4752ed20e3dc714416037d00b281cddc275d8df64a4c888dd8f3b3d43e89086b,2025-01-24T11:15:11.390000 CVE-2025-23839,0,0,c711cdfd3a6cd8df3981e46ebebb623db7f4f50ebcbba001c1ca48594578b44f,2025-01-24T11:15:11.523000 -CVE-2025-23840,0,0,e5b0984fb71be0968ed90480ec3d330f2c4aaa2509c5dd5bd67f34d8b556326b,2025-02-17T12:15:27.973000 +CVE-2025-23840,0,1,01b2d784ea9245d28f424ed133162d3cff737a8e5385d7475f9cc9020d654b48,2025-02-17T12:15:27.973000 CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000 CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000 CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 -CVE-2025-23845,0,0,fc17fee2a7781ea5c8ea3d18cf4d8167acd9c56f0f534b9dcf11a7aa5d345869,2025-02-17T12:15:28.127000 +CVE-2025-23845,0,1,ed80fecbb245072845e03d4b09153a607faba140bb6b52841de9c1ef47c396b6,2025-02-17T12:15:28.127000 CVE-2025-23846,0,0,ea1add75e4166af75969247fd7072cf309971d9564e41b3b3aa5ab3aed42b97c,2025-01-22T15:15:24.570000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 CVE-2025-23849,0,0,7076f9fcf4e7216b0f5ca136c4ea4a88f8fc78bd3d3c6b722ad7847e399fd28f,2025-01-27T15:15:13.087000 -CVE-2025-23851,0,0,fe42d2303391c5b1574a81f84d1f99c2c8c2dc93f76a002ef47916b882efe22b,2025-02-14T13:15:47.550000 -CVE-2025-23853,0,0,886fafce00c081221ca06e712e1cbb59a0489da984fe2e26d0fa98fc76c6d5c6,2025-02-14T13:15:47.700000 +CVE-2025-23851,0,1,ee1a63ce9a487c85548899c3852a76cc6f8e1e54f6d59e6c30bc7c2c497c4515,2025-02-14T13:15:47.550000 +CVE-2025-23853,0,1,e2cb73b4a2415563dd35f5bce100e4597ca4a6650896c4edde32c5a6fde62105,2025-02-14T13:15:47.700000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 -CVE-2025-23857,0,0,5ac7dd8998166b605fdef5ceda297c4427e53c85c464fa040bc1ceccdfd9887d,2025-02-14T13:15:47.837000 +CVE-2025-23857,0,1,7f7c744679dd6947d0ca7d1273fd75fb6dfb59656abac47b65614e92c2b50ea4,2025-02-14T13:15:47.837000 CVE-2025-23859,0,0,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000 CVE-2025-23860,0,0,68c2fb44fb8ada24220e6a3afa3fc47dfedf0ddacb9f55359fb799e87e5c89d1,2025-01-16T21:15:25.810000 CVE-2025-23861,0,0,f02923f8288238a7c8d2644033afd089fdda6178201a2de961581fdcbb2bc812,2025-01-16T21:15:25.967000 @@ -281159,7 +281159,7 @@ CVE-2025-23899,0,0,598182d1621caa24bf3c481ede2ce2b83897d5764a80f40ca9f00a668f077 CVE-2025-23900,0,0,68aba21ddce77b08fbaa0dad71c040e65c232f030b0b325ddea5744be386b9b2,2025-01-16T21:15:31.857000 CVE-2025-23901,0,0,bf3c3b7205ed6fc1b684ded669be915dd1c9b905481743bdf15fb28a8c514c0e,2025-01-16T21:15:32.027000 CVE-2025-23902,0,0,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb7023083e,2025-01-16T21:15:32.173000 -CVE-2025-23905,0,0,91ef2c26939e7e0cae31fc7192325d0c01e84d41a9eaf04b90f56122d4557bfe,2025-02-14T13:15:47.973000 +CVE-2025-23905,0,1,79077d965c4565cc14be2905904f6770673c45533ee37b80cd34c74c23875163,2025-02-14T13:15:47.973000 CVE-2025-23907,0,0,62f2d830555983225c93d67a33766339f0b5f5b8104b470ef809680dd862709a,2025-01-16T21:15:32.333000 CVE-2025-23908,0,0,4b396a8852131d43d79fe1137cb49df2e0d52a86fdb32e54e4afe34ce1d8d3d5,2025-01-16T21:15:32.480000 CVE-2025-23909,0,0,076770cf61637e2194048d503e6efbb5af30e3d945de88d9df8b24a008808b14,2025-01-16T21:15:32.637000 @@ -281214,7 +281214,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 -CVE-2025-23975,0,0,2fb4af907b806c6d7037eda5780ad6979e217794bc41c9a52f4d50b2ce24b7de,2025-02-16T23:15:10.477000 +CVE-2025-23975,0,1,fd492ce4e29e82b105b5956d4a60af42f493c44d2ea36a6371db0d7843baa974,2025-02-16T23:15:10.477000 CVE-2025-23976,0,0,a29eb82e0663b02bfaa3596cfe2622c511331a5578d509b2b4b465f1a7a97d91,2025-01-31T09:15:08.530000 CVE-2025-23977,0,0,4d0f94ce84075ba723583d9d09a43737047f5d4a006604c1cf44bad3bcf53c59,2025-01-31T09:15:08.687000 CVE-2025-23978,0,0,12cd27921605bbe68c80af2d7542b500f0b94f840fdfb9147cbd42a4cab4c233,2025-01-31T09:15:08.830000 @@ -281357,7 +281357,7 @@ CVE-2025-24400,0,0,fc2d35dcc02dfde6472cd44ddd220493709314070b1167c1ac10abb11d37e CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,68e26c7f774f1a67deb809321d2f4df1ab6809fd06c2450b0641f4bec4c46098,2025-01-23T16:15:41.333000 -CVE-2025-24406,0,0,bbea76f9e0a377bb16e6124c0ca74a6e8b01c54c1c02a33abcb51f6487f06738,2025-02-11T18:15:41.300000 +CVE-2025-24406,0,1,e3e2c1fa9a45a4dd068581e464b785b0e1cb7ef7eff46fa09db61262563cc263,2025-02-11T18:15:41.300000 CVE-2025-24407,0,0,cb0342d069e0a50af8bb4fee74f715e09841d37101d7b1a219ff580902452820,2025-02-11T18:15:41.497000 CVE-2025-24408,0,0,ecf8b2fa3238f755897db08ea45e1803efb045709caba455d61de9278b5b480e,2025-02-11T18:15:41.677000 CVE-2025-24409,0,0,f4173349d32a19800196ad54477c0cc05286ee273d22683d6a5fabdc686bc9d0,2025-02-11T18:15:41.860000 @@ -281433,20 +281433,20 @@ CVE-2025-24547,0,0,9bbbbb0170cdf42c7de6ad37f0762f4ac79a39517bc2a7a976e9bfd241d0f CVE-2025-24549,0,0,cc40b6e26688d19744c9ccf5aa4c960233861d1a46718a8675844d0dfee836e3,2025-01-31T09:15:10.027000 CVE-2025-24551,0,0,d775a091c05a4cd23de74d357ab793fc5cd8516ad1919b9c63ca6b0683b031d3,2025-01-31T09:15:10.170000 CVE-2025-24552,0,0,596feaaeabace159c1f5102fbb31f50177633fabd1b603a34028a9791861e2c4,2025-01-24T18:15:33.257000 -CVE-2025-24554,0,0,b22ff18fb734074f931ad8215cc1eb51523f1eb1d09ba9475607231ee833e954,2025-02-14T13:15:48.113000 +CVE-2025-24554,0,1,59ccbb1503cdee4bf9f006987cd7459c6025c286041e2eba9e293fd92f092e35,2025-02-14T13:15:48.113000 CVE-2025-24555,0,0,948444e837e33ec5e61cf9d8b68736658e42eabc8f745ab714b850383f1d6168,2025-01-24T18:15:33.440000 CVE-2025-24556,0,0,6ea5e8a5447bcc14ba5473102f123444dde32621fa8b8e2054b21cc654544ca0,2025-02-03T15:15:24.360000 CVE-2025-24557,0,0,c9608fe9d08b3e8c60623778dbf4af1106723f97e1e1925624e6372467bb5a63,2025-02-03T15:15:24.660000 -CVE-2025-24558,0,0,e68381dd9ea50e80e3e0b5f99bfd63992f98c3b87300aee513385b516203eb12,2025-02-14T13:15:48.253000 +CVE-2025-24558,0,1,d552b30af2bea37161ac87d9740d0cc167e301c5094058558ba87c53a727d57b,2025-02-14T13:15:48.253000 CVE-2025-24559,0,0,93a09a93c8b8e837ca137d2be563d230587bcdef90015379d241a77a7507d9e4,2025-02-11T19:37:35.493000 CVE-2025-24560,0,0,e855e7354468fc64dd6c934f4b633710f9b017db99b23bbabcbff771a86d3058,2025-01-31T09:15:10.323000 CVE-2025-24561,0,0,e108b8e04b24701d81f3320bc3ed91fa3a5576110654c195bd4895b17ab0e6eb,2025-01-24T18:15:33.623000 CVE-2025-24562,0,0,79f4d0c5626bbfba74d0ae7b275ccfadc70fe2b0621ed8fa7804b5c5d88f79b5,2025-01-24T18:15:33.810000 CVE-2025-24563,0,0,96ad72fa5c9eb5679a39ca7c109577890419e147a384dc256ff4b933d244b534,2025-01-31T09:15:10.467000 -CVE-2025-24564,0,0,bb6db03dda96d1f6c256e308975185719c81ba12bb440537094083e9061ae309,2025-02-14T13:15:48.393000 -CVE-2025-24565,0,0,5795ee135e1260a2b508f002c912e94a33c595488e565be1bd2aa8fd34667267,2025-02-14T13:15:48.540000 -CVE-2025-24566,0,0,79223db980565d0afd65d135eb7a2cb01e922e2ac185a92e7d8294a2c081a968,2025-02-14T13:15:48.663000 -CVE-2025-24567,0,0,655a998cbcdf5ad6c0e28cce9dd1cf8e0557b6484b43cf6fb6d1d111512e01f2,2025-02-14T13:15:48.800000 +CVE-2025-24564,0,1,329564b000504cb32d3dafac1c67c1ce7b3be89b8ce2253a9bd4f015f75b74a9,2025-02-14T13:15:48.393000 +CVE-2025-24565,0,1,b3fb493a4f6ac5b138a21b357f03b05b300d8302156699dfb6bbd309a6bd714e,2025-02-14T13:15:48.540000 +CVE-2025-24566,0,1,17c92805c5648cdbd4352d6df535d360a9ea3ca0695496672df44866b3fabb6d,2025-02-14T13:15:48.663000 +CVE-2025-24567,0,1,80395c0393a382ca7a4f02141cbdacc6378e1ef6af132142e189f656249ee70e,2025-02-14T13:15:48.800000 CVE-2025-24568,0,0,fc8da236bea2c36c5a9ac5a19be1bda5c80f535eacc254788e485040ab41e526,2025-01-24T18:15:33.987000 CVE-2025-24569,0,0,f2a3217eb250ba0bffa9f2c282a936174c42242cddc160fa42b30d240e4fbb43,2025-02-03T15:15:25.590000 CVE-2025-24570,0,0,f17997f5a9075a2546c1b40ebcb67481ca0472bdf9d2075dcfcf6d8ca3524ee3,2025-01-24T18:15:34.147000 @@ -281467,7 +281467,7 @@ CVE-2025-24588,0,0,1faf1db2c22cba9af693fe3cbaa545e96089409d18ce5347c551a8624facf CVE-2025-24589,0,0,b85c10bc35bda6003444da3a1e9b4af85d2fcdc02f9c52178826de0f932d0894,2025-01-24T18:15:36.013000 CVE-2025-24590,0,0,6d329557bd921dc7666d0060887bf7f29ec231517d3f0f298abda15e13f82d81,2025-01-27T15:15:13.947000 CVE-2025-24591,0,0,b7971fa84f05c3bb78914287a19bc99b1f1dcac753da4f83dbac16d5be9b1e85,2025-01-24T18:15:36.160000 -CVE-2025-24592,0,0,3deb4923f23dfa55f69770f5b3acd317b54d2da56639a04e6721970b4e20adef,2025-02-14T13:15:48.940000 +CVE-2025-24592,0,1,26d7fc18984c121aa5bb1e65357db5def004264f75eff8da579ac43a1c9047f1,2025-02-14T13:15:48.940000 CVE-2025-24593,0,0,755396b47c2f347b932dd610e5ab4f3682e12a817f74aab1e5387ab62cc20592,2025-02-07T20:12:44.647000 CVE-2025-24594,0,0,70d3e9f240cfda56e930b75c6211c3cc09718619b7ecb5df938afe6f725a25b3,2025-01-24T18:15:36.330000 CVE-2025-24595,0,0,a04860ea5672fa1850cb5548af7bd0207e0db1cd35614b525ce1a7267f3e75dc,2025-01-24T18:15:36.497000 @@ -281482,17 +281482,17 @@ CVE-2025-24603,0,0,f7ad495dbd8281a5e335280fe84127fec449c788dbd01e8d715d5c27c3312 CVE-2025-24604,0,0,73d28ae8aca0ad80ef56204fc54c189cbd66bca569b11b6383e33cf145ba296a,2025-01-24T18:15:36.823000 CVE-2025-24605,0,0,9b7c31397af90dc4e7d33874eb25cda252292d4fff8d2900991c3dfcff51e7ab,2025-02-03T15:15:26.473000 CVE-2025-24606,0,0,24d6e6f0194a93c382ab34fd85c4f746c792431243a7ead856055961cdd091fc,2025-01-27T15:15:14.587000 -CVE-2025-24607,0,0,1fe1a485c801190f196a2d8d48c359be0730845c75c9f8aa50d8b450f750ceb3,2025-02-14T13:15:49.083000 +CVE-2025-24607,0,1,325972e264ac0af0c15361d556e94fed914cbb256726a26306b21942c43369cf,2025-02-14T13:15:49.083000 CVE-2025-24608,0,0,0e48e7db8a46b4ff94fef4a0c781d80fd6e887d0ff20c179b1a0da2adcbb41db,2025-01-31T09:15:10.767000 CVE-2025-24609,0,0,3d80aca3f0eaf7c465960e5b344ec8d552113f41eff1a6ebd44fc894090fe45e,2025-01-31T09:15:10.900000 CVE-2025-24610,0,0,86da48c82a4f9f85dbf9d45e30dfe292a84c241b5638c25e2fe05226546ed0b3,2025-01-24T18:15:36.980000 CVE-2025-24611,0,0,9d61202d4b14cdbf6284d0cab64f0641b993d4424dfac6e382e2c239a8febacf,2025-01-24T18:15:37.133000 CVE-2025-24612,0,0,58e4ac3a89fc0208bd49e782a847287736fc81f9c0e6f9bf8fb0bff4a495a514,2025-01-27T14:15:29.063000 CVE-2025-24613,0,0,2b278b63080ff51fa5eb4519d92ec87aa48b013c4356a2e5db62b588ea81343a,2025-01-24T18:15:37.277000 -CVE-2025-24614,0,0,1be788353d950ead2ad12fd0b37000ac019b08829655ac20e00ba76a83754214,2025-02-14T13:15:49.217000 -CVE-2025-24615,0,0,30a6aa7097fad5f555730fbd6e8d2a9c2350d2ea786559bd36ab851e96b50700,2025-02-14T13:15:49.353000 -CVE-2025-24616,0,0,edb2ea2d7a08b6a7c63696eeb5cb97294366ff619aa486f7c72615f8283f5683,2025-02-14T13:15:49.490000 -CVE-2025-24617,0,0,7dd8c3a19d922b12daeb1d55ff0aa2d836073f47fd67545ec045110172b14cbc,2025-02-14T13:15:49.633000 +CVE-2025-24614,0,1,395c32a3c2460a955a41c5b61395c2adb6b90e9b99471188b390c1e901654dbd,2025-02-14T13:15:49.217000 +CVE-2025-24615,0,1,f62f121360b2909248c5619dccca5d143eeab64fe4422afd8109cd3893fc8877,2025-02-14T13:15:49.353000 +CVE-2025-24616,0,1,78dfac6fd05bfbf283e490336f93ed0ffec35037d4662d678dc484bb01476860,2025-02-14T13:15:49.490000 +CVE-2025-24617,0,1,6d393f7780473e78fdb4353eecee6d1973ff07531a25248e1012e75eb1235db4,2025-02-14T13:15:49.633000 CVE-2025-24618,0,0,a5f6f3160a6a75d9f173a96a6834161f30c514b68875c3d26116ca9f5fdfafbd,2025-01-24T18:15:37.430000 CVE-2025-24620,0,0,b444442cc1b23af3af8ae533f2aed8473d4d75a376ebfe4727e41bd7d72161cb,2025-02-03T15:15:26.697000 CVE-2025-24622,0,0,40b10bf41ce4b777512f2bfa275634ecc97858c1be10f89ac72c62de5b5c8685,2025-01-24T18:15:37.577000 @@ -281511,7 +281511,7 @@ CVE-2025-24635,0,0,8e4daee5d6abd4b07f5297619a43f9752ba41f45d1919dad64440f82e4b51 CVE-2025-24636,0,0,725d94dc13d3e626545af0422430a59e8b7442528fd0fd9293d44daee9239f59,2025-01-24T18:15:38.507000 CVE-2025-24638,0,0,e48134150970030c3cb3060c0d946973b40396a1f1098b9d2fc1d7177d027eab,2025-01-24T18:15:38.670000 CVE-2025-24639,0,0,f981277e6e45c4921c865d8fe7730f9502c0912e737af8a13ba2ec373c1a232b,2025-02-03T15:15:28.190000 -CVE-2025-24641,0,0,1552989169b60285ffc2f8ada1fb4bc55acd607c2293de04bf5d1bc1e9b06e14,2025-02-14T13:15:49.773000 +CVE-2025-24641,0,1,2b179c02a7e04ad904139ca78d13ff6d92ed39a6dd53abbe196379c57b739ea7,2025-02-14T13:15:49.773000 CVE-2025-24642,0,0,4dc479a9530b981fc4c0621da7e2f61c3cc6c221fc2dc01e78e812f5fb0cfe1f,2025-02-03T15:15:28.370000 CVE-2025-24643,0,0,c39f8417362e7fa071c7af10f3262cdab1baa88c1f3bef487d5e04ac68d6b843,2025-02-03T15:15:28.537000 CVE-2025-24644,0,0,0bdd39e9b2500320fc6b4f440934d0f58b6da41428daa2df1308fcb73162baca,2025-02-11T19:53:56.887000 @@ -281553,17 +281553,17 @@ CVE-2025-24684,0,0,9345eea3aa88c922a21dff0adeef1b361647e003bc24a746a3e6fb5150e10 CVE-2025-24685,0,0,40712b2d90c320886482a8863fa905af11bd471df37c7ce8bf83d2dd2cda1281,2025-01-27T14:15:29.333000 CVE-2025-24686,0,0,97742af3eda9d56646da5ea63ea29d8b115553c2b1043bb2326cc5cadc437206,2025-02-04T15:51:54.843000 CVE-2025-24687,0,0,11d3d0659ecf4c039f736e74dabe04e8b6a481e88fe64abc5509f1c1b498a5e0,2025-01-24T18:15:42.283000 -CVE-2025-24688,0,0,18a06201499df224c64bd34e1bab7ed1ea47e505464cf8f373722914f05f4ff0,2025-02-14T13:15:49.910000 +CVE-2025-24688,0,1,0a46344abc5ad2776d5f26fd0ff571570248a72b0504ceda27615c29c8613a93,2025-02-14T13:15:49.910000 CVE-2025-24689,0,0,70a27061e8b0633b0958a705695b21ab3e50470132d440b4823f73ecd6b6d393,2025-01-27T15:15:16.073000 CVE-2025-24691,0,0,a9ecb50c9c5d82c8ecfc70917b5c56e667dfa57f33c8e4cb10ee7b326b2f95b1,2025-01-24T18:15:42.433000 -CVE-2025-24692,0,0,f770d885824494c7db4c483e338517775456355d212602495dcfd50f880b1081,2025-02-14T13:15:50.050000 +CVE-2025-24692,0,1,4741c020f8f48bd986b1f8a0f0ee0a24623a235f96ee98e1e030650415491022,2025-02-14T13:15:50.050000 CVE-2025-24693,0,0,c7bef0dbde3fa8449c3a078a65549f5280577af242006cc996d29313a11fb18f,2025-01-24T18:15:42.597000 CVE-2025-24695,0,0,f61c171f77cef62d0dd2aede8b4b5d725bd7ea8ff8a025771bdf23d5a72f8ca4,2025-01-24T18:15:42.740000 CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149632,2025-01-24T18:15:42.900000 CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000 CVE-2025-24698,0,0,ee9ed28bb6a4d45cbe5d6914ce763041875739a745cdfb0d75cc00a562396221,2025-01-24T18:15:43.050000 -CVE-2025-24699,0,0,78cbb829085143c94c0f48b32b82aa626ad925a6fabc632d10ce8548b56c52b8,2025-02-14T13:15:50.193000 -CVE-2025-24700,0,0,8c75a3e183a0a0bbf63e5ae68b62f169e1e21f410cd1cfc8f533832c01fb8518,2025-02-14T13:15:50.330000 +CVE-2025-24699,0,1,04c908bcff8c7755f6e4e604bae75ae8644823684c2de3e3b2631eeb24ebef94,2025-02-14T13:15:50.193000 +CVE-2025-24700,0,1,22894089b9ca15128956d1dbf8a9615ba6f9e99d6c63e436e45311b7b8f8a09e,2025-02-14T13:15:50.330000 CVE-2025-24701,0,0,3286a9d08a955762787b23c92470d2629e626a4bb3688501e99db53a7da2cb4d,2025-01-24T18:15:43.207000 CVE-2025-24702,0,0,7c38f7de4d5427e8c69c77b42285f55828f36aa11705bf9605c2b3dfb09c1912,2025-01-24T18:15:43.360000 CVE-2025-24703,0,0,c81e700a35d26965a42879460c2d791d33f2244efc35bbb001b57e90d10f15e1,2025-01-24T18:15:43.520000 @@ -281634,7 +281634,7 @@ CVE-2025-24802,0,0,7dd003e792c772d8d409000d77fae7f13160cda3e1a330b0895620a7fc320 CVE-2025-24803,0,0,fe008de1670d752b88603be7275331d65ec4b62f8fa4ecdcde55edf7b911384e,2025-02-05T19:15:46.207000 CVE-2025-24804,0,0,02d18037eaeb1381e664f001332da6db5511dc7ada5361921f722c1c2db334f2,2025-02-05T19:15:46.350000 CVE-2025-24805,0,0,d4af857e51dcf82a508fb39999b1c3ef58f60bf41c569739cac4b4e9ff451531,2025-02-05T19:15:46.487000 -CVE-2025-24806,0,0,3615a80d11e6d5be762749831aafa9affc57f87da9591fbb247c0bfd6040a946,2025-02-19T18:15:24.467000 +CVE-2025-24806,0,1,4a54fa92eabb31dffbf56be198c3da836d0bdf9da6b977aeeb8ee589bb6347e4,2025-02-19T18:15:24.467000 CVE-2025-24807,0,0,4f25fdb831d136a8bb01cf6e1cb78254f8ee6bb89343164d5968c2910e78b68f,2025-02-21T15:26:57.507000 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,ffb489ebd0b78eee2cb2623897d29c3c6f63b8d9575fa93eac16db339b1da16f,2025-02-11T11:15:16.907000 @@ -281647,7 +281647,7 @@ CVE-2025-24829,0,0,7efc0c94ae292054ed83b5517e6eda6a14703f283b7f8ef2e7ee76b6d97d3 CVE-2025-24830,0,0,149ce554396e6f6a2d01866c124b61e24002e40c9d6d50b44720c1d2e3007d9d,2025-02-18T19:15:27.847000 CVE-2025-24831,0,0,c92da556f0147b9019570da06039147ae8945532d2deb083de9ea344daaf5414,2025-02-18T19:15:27.963000 CVE-2025-24836,0,0,da95ab8528e6c549bba778d1d67c04ab75f1d50ed423e85181f04464f9165463,2025-02-13T22:15:12.270000 -CVE-2025-24841,0,0,b90ee7fc7dcc14ca371664adcb7ca95c030eed2895558abceb191c7049f6a6b1,2025-02-19T06:15:21.853000 +CVE-2025-24841,0,1,1d3240b2c4701421f4a9b034e24dc1dfef619d09cb05043621b6f1df073122ab,2025-02-19T06:15:21.853000 CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 CVE-2025-24858,0,0,3b82f7da2305463da0ac5aea20b0458ff46f3b144923110e5153f9a34733f4c3,2025-01-26T07:15:09.237000 CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 @@ -281670,9 +281670,9 @@ CVE-2025-24888,0,0,88a407e927dc54a1fbca6e78f49dc62a6a444494ae6c9d366d149eb7f508c CVE-2025-24889,0,0,9c6be5085f8e6de4771b302221f40c225eb02c032451d7a56239458ff1a7a96d,2025-02-13T18:18:23.240000 CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34ba85,2025-01-31T23:15:08.457000 CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000 -CVE-2025-24893,0,0,12d280b7b377360b5396453d370e0598060ceb4828b22edb3492f1788c79015d,2025-02-20T20:15:46.697000 -CVE-2025-24894,0,0,719537e2b65db00c391760a0cd638c15406668ed57b32d2a279ec49cb0e3adaa,2025-02-18T19:15:28.090000 -CVE-2025-24895,0,0,b00a9ba498d0a292ef1f9fa7a927fff9b8cfa424cc9586cb281d28faa6ce8d74,2025-02-18T19:15:28.240000 +CVE-2025-24893,0,1,de80ab775d8d33a0ddb2ca591b0ac7cb2e18fb8b411fb0be3bff717b77423fb6,2025-02-20T20:15:46.697000 +CVE-2025-24894,0,1,10f73a461ded2fde8502e7156062e581732c8f87e29d6cd9af7a05225727f43c,2025-02-18T19:15:28.090000 +CVE-2025-24895,0,1,3df505eb64c095c5713a356fbd6ecaa21526dd5c856419b49c070f92ee45bc43,2025-02-18T19:15:28.240000 CVE-2025-24896,0,0,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000 CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000 CVE-2025-24898,0,0,8b656476c3e6384183d80bdf8cadd585c7688e8bfb1105b9b189df49539552e9,2025-02-11T08:15:32.003000 @@ -281684,9 +281684,9 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,ecc12daf91d871ae88d04f98498257679fd02d46bd8922b3f82316cc94d8878c,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,13b689df14524878d89525acaf7cfd0d975a63297d29c07d6d881d3b3e914d54,2025-02-13T18:59:59.940000 -CVE-2025-24928,0,0,e5fd8968e5c5c56f275d71a964d0b667b12bcc4ba8d81e28fd60cc19579119bd,2025-02-18T23:15:10.250000 -CVE-2025-24946,0,0,769aff2d278507029154d8fce6a8e725f41ddd2141a4b639ffa5f01c2acd7a76,2025-02-20T03:15:12.800000 -CVE-2025-24947,0,0,b15ef7a206749c7ca6e5f1749af8a5217d2c969ef411171626e3cb4aa045511b,2025-02-20T03:15:12.943000 +CVE-2025-24928,0,1,88017d42d9b24cf07554c3b3f2bd14b9e5da1cf94a9bab8171a58aa4bbb5c954,2025-02-18T23:15:10.250000 +CVE-2025-24946,0,1,fbde48c244a3882665cdc9fd7d880cf0a6d892e22b539345a748ce1e42ca34e1,2025-02-20T03:15:12.800000 +CVE-2025-24947,0,1,99b91be476500668ef14b77ae7676fb2e42b716ec6d23716b42ae33fd8657997,2025-02-20T03:15:12.943000 CVE-2025-24956,0,0,60f62dbd8ca3ec9022b0bbf689d92a9416e8938202e5bdb77bb2e05ca0ed67f7,2025-02-11T11:15:17.273000 CVE-2025-24957,0,0,4c6009fdcebadcde59c81c994d42af877595682fdef18bb7378b4f2679eaf5d8,2025-02-13T18:59:32.867000 CVE-2025-24958,0,0,83843e5baca1cb66509cb1b7cb198ebfd9f486662ffcb2ce9c260edca5373dcd,2025-02-13T18:58:56.320000 @@ -281696,7 +281696,7 @@ CVE-2025-24961,0,0,f935f426e2c890c717917b3299502472feb84f5c3c1d148ab34a569e142f9 CVE-2025-24962,0,0,cc843bcce4cb3b0c42f4503d47a6431333faceba61f147c50271dd76b36a41bf,2025-02-03T21:15:16.317000 CVE-2025-24963,0,0,478e4a6467a614a3af3794eee0f832b58524f79616b3826d703193d24b875794,2025-02-04T20:15:50.330000 CVE-2025-24964,0,0,8043a515d4157142205acc93e5fd1b4f05e5b625974159584faf2c70c560c257,2025-02-04T20:15:50.483000 -CVE-2025-24965,0,0,1eea1c93df3753c9a78c066452578697bf3a1e6ada6180e7fc21b687c62b3541,2025-02-19T17:15:15.510000 +CVE-2025-24965,0,1,9ef9bc631c3f55c25382b2ec42e3636533e8111e2c9a00f7e40e15518cdd1591,2025-02-19T17:15:15.510000 CVE-2025-24966,0,0,b80836066f16ef60a21a0a7b9508ce5a1c7fd944d74b490ee39c70017ee4f012,2025-02-04T20:15:50.627000 CVE-2025-24967,0,0,4e055c98bc0e7b8b0c7152c15ae500f83c57d83dd2d7c88e7592a2fe0a4c5eca,2025-02-04T20:15:50.813000 CVE-2025-24968,0,0,e07f901cf7b356f85243eb69a8d49d189b396867f0cba0e1d10bbb82d5ac61c1,2025-02-04T20:15:50.997000 @@ -281709,8 +281709,8 @@ CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be76255 CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000 CVE-2025-24989,0,0,e1849e8b3f546849182e37fcf94016f5a84a4f37971480509d065ec521156655,2025-02-22T02:00:01.727000 CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000 -CVE-2025-25054,0,0,bdc6a9739f43c6ee9f7dd792b2a86b688f134fb79a9c00222c307f085f96633f,2025-02-19T06:15:22.010000 -CVE-2025-25055,0,0,7bdf77ab21026e12270a24a96ec203744f408d808d0439c316497fbe0f801ffc,2025-02-18T00:15:21.277000 +CVE-2025-25054,0,1,92050273f447af73a302e1c2e41578fcff583f602e60b32d132c1e59b798098d,2025-02-19T06:15:22.010000 +CVE-2025-25055,0,1,9d90653ce228a6e46a26077640760e39af20615ccae0de614370c12a6f659dd8,2025-02-18T00:15:21.277000 CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000 CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485dfea9,2025-02-03T04:15:09.760000 CVE-2025-25064,0,0,258595a704e6a3f019f4641e0546921384b59e10bf4a735ca6bcc89e948d4941,2025-02-18T19:15:28.380000 @@ -281791,20 +281791,20 @@ CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000 -CVE-2025-25196,0,0,64d311cb70cf393ffdb832d996d10fccb4f0f78c9555223154c14b6cdbd71102,2025-02-19T21:15:15.577000 +CVE-2025-25196,0,1,ff361a4ad020c93d78e889fe4969b16a573613e5f0e0d58aeb278411037dde11,2025-02-19T21:15:15.577000 CVE-2025-25198,0,0,dba1938f205829e248418b009d8da17ce793befa8842802d286cefa151f40ef8,2025-02-12T18:15:27.757000 CVE-2025-25199,0,0,cef47ad8035ccc7763ac731a7bbc3b7e25e483ba8b3abe7752d565785afdd38f,2025-02-12T18:15:27.933000 CVE-2025-25200,0,0,1479ab0c65efeaeb900431cde363e5ab64f7b29aea690cd1ab2ec84712d3c3ae,2025-02-12T18:15:28.110000 CVE-2025-25201,0,0,5060a1ecdb4ea214ef23481f7cb8bb8004054fb5be3291bd4a87c9c0b9e3a3b3,2025-02-12T19:15:21.570000 CVE-2025-25202,0,0,16301d264929e3b1e68379cd4037f3dba012c80d52d69a31d3a3f1fa01489caf,2025-02-11T19:15:18.690000 CVE-2025-25203,0,0,040b03b28fff3f91466e7eaa5a2d6143cc21f99e3d967437d45c81f30cd9ca3f,2025-02-11T23:15:09.450000 -CVE-2025-25204,0,0,08e898f00cdd4836e5416642a3da9e96b59613851a80bcbfd14158c90e610a8f,2025-02-14T17:15:19.140000 +CVE-2025-25204,0,1,264257ef0d9fbb87eec1a7c538a1b7a280ca9fadbcacfcc24ed3264c0f6b7df5,2025-02-14T17:15:19.140000 CVE-2025-25205,0,0,53d346539ec5bb58856ce63a9d1fdca5438e2c859c2047a9cb707ece5a8bcbe8,2025-02-12T19:15:21.717000 -CVE-2025-25206,0,0,e9846eb9edb5a629adfeda97812105c1d9509aaf2c4838d333e92f590466aefc,2025-02-14T17:15:19.327000 -CVE-2025-25221,0,0,8974eac2e7e9ae10d10e6ecea65cfa14b1a0276679b9b181745dffe07f54e52b,2025-02-18T01:15:09.070000 -CVE-2025-25222,0,0,af5e7702e07f0bbb89b99fc2eb598a55750bfc15f359404224fca9d7c1d17eaa,2025-02-18T01:15:09.210000 -CVE-2025-25223,0,0,bd6e01d096e2fbe41ad1e7a30b709f67ef8f26d80bcbc350e8d8d94c925db1e4,2025-02-18T01:15:09.347000 -CVE-2025-25224,0,0,f6ea7103489d2c148008b4b5252f4b169661463d18d39376b3abf700a4c96602,2025-02-18T01:15:09.473000 +CVE-2025-25206,0,1,392d7ad3964b33ca9c9bab73bee6cb6ca5d854b0c66e738325972852bf2c364c,2025-02-14T17:15:19.327000 +CVE-2025-25221,0,1,9eba961c90e34dca65a5350cf3ff3d19757f1fe3671839c25968184f9f8ce99d,2025-02-18T01:15:09.070000 +CVE-2025-25222,0,1,3c35d9fe398849efc2d27ab39134765a5355abd0f8282f79cb7f80a692d95104,2025-02-18T01:15:09.210000 +CVE-2025-25223,0,1,9103efd1991600ce9baa3bae2228741ed36d32158fb34e8cfc9fbd74caa1f53f,2025-02-18T01:15:09.347000 +CVE-2025-25224,0,1,24931256e66606cd853b3aa412bf8777249d6c2c2b2fa13a4e9676bdf40f12e9,2025-02-18T01:15:09.473000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 @@ -281812,20 +281812,20 @@ CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294 CVE-2025-25281,0,0,167d81b42fb33b6f42e7962fec83a5221902600725fdaf7aff6080b6098df223,2025-02-13T22:15:13.263000 CVE-2025-25282,0,0,4d1d19a98dcf02f062514d6cca59ad758ba4251801137428ad197e29af6e63b1,2025-02-21T21:15:23.590000 CVE-2025-25283,0,0,d1ae07356b8742828976d536d141109b35ac143686ab7de25f652850c0ca2fe0,2025-02-12T19:15:21.863000 -CVE-2025-25284,0,0,64aafb7feae107b368aa9a377dcdf1b4fdae10df32fe687eb49a172fc68e457b,2025-02-18T19:15:28.797000 -CVE-2025-25285,0,0,477e58c659dade2cfb210e3ba46670b820bd403cbce503dea94880c378af5190,2025-02-14T20:15:34.487000 +CVE-2025-25284,0,1,b6dc2c9304cbf3d8546cf62f371b4f3d1de52c82a721128425226c837be02c5d,2025-02-18T19:15:28.797000 +CVE-2025-25285,0,1,6196d3dad9871c57aff4895f5bc8f8c3acdc2172dba477baec761f1640f705af,2025-02-14T20:15:34.487000 CVE-2025-25286,0,0,3fe0a9ce379ac6ea437932cc4fd9ad45d9a9c45f2f50606f8108c4f80c009ace,2025-02-13T01:15:25.280000 CVE-2025-25287,0,0,664f4953e1c6d1d3e1a32984d655969f7d6cbc9013ea11bc88e87bbf7e0a45f3,2025-02-13T16:16:49.187000 -CVE-2025-25288,0,0,c847d67204aa530b3cbb2896ec1bafab113f7f8d98341657679776488f5414bf,2025-02-14T20:15:34.737000 -CVE-2025-25289,0,0,d3830159ded9a5e61026eacf7ae121d63575a87fd8ff3fc5d9859e2549e2ec1a,2025-02-14T20:15:35.100000 -CVE-2025-25290,0,0,078fdc5e33afe2c4a38c199064e0140ffef88c9c06a22a120a13d1a72823c21c,2025-02-14T20:15:35.593000 -CVE-2025-25295,0,0,9304b327aa84ad0a6b5813eb481063f58dfc11525062cc326fa01528a59388c3,2025-02-14T17:15:20.230000 -CVE-2025-25296,0,0,608cd76d7d764b74d80c1c4bfff13ca0380bfd78ca4bfaf90902e07d73a24a9a,2025-02-14T20:15:36.103000 -CVE-2025-25297,0,0,0d275b3712a3a3d33cc2cdc3c558a7d071e515bf3e49f1dc29a4a93b576fa4d9,2025-02-14T20:15:36.627000 -CVE-2025-25299,0,0,44e57a1dc94a0e85ed1b4cf41f426397abe3efd052998bc3f38c3474aa91c94b,2025-02-20T20:15:46.853000 -CVE-2025-25300,0,0,980ff15b3946d415393db142f5a2944ec9527bc437d9d2bff6f0e4d78a53fe4b,2025-02-18T19:15:28.957000 -CVE-2025-25304,0,0,faa0dc15a1534f91421e09ef7387795b56219ff6441c76442b60578f585efb63,2025-02-14T20:15:36.903000 -CVE-2025-25305,0,0,fdfd83296c931cee6549a4da42d4223cb7e0f0ca44ee3ebfa8abe753635cd695,2025-02-18T19:15:29.083000 +CVE-2025-25288,0,1,3c3996b3c6ad9316836db96b1a46e020a39f4516136b998b5ae72f3c833c7a85,2025-02-14T20:15:34.737000 +CVE-2025-25289,0,1,7bfac8a9f9f1916459aa0b84ab1a49c9db9c3d415c9cc583ab25a6942bd0eae9,2025-02-14T20:15:35.100000 +CVE-2025-25290,0,1,7c50be79c0cd022a61c9f6f0ff9f289ef18ec11d56bb2fce86bd7af067097612,2025-02-14T20:15:35.593000 +CVE-2025-25295,0,1,c6693c1e97dbb711d678a77d86a4920e94c382701ea861e40e95ff9d1f21d19e,2025-02-14T17:15:20.230000 +CVE-2025-25296,0,1,a374a91e91b09a8fc9b0bf63057ec5870f1347ed3ff8e07d2fff8ffa94c91919,2025-02-14T20:15:36.103000 +CVE-2025-25297,0,1,b95bde6dd831a48ed167c247cc3d547cac27b7313fff4b4305b203292c159135,2025-02-14T20:15:36.627000 +CVE-2025-25299,0,1,3b24acf1d2004d8b4c6aca494f2152b620141ac014e17849f142b2b49de116ee,2025-02-20T20:15:46.853000 +CVE-2025-25300,0,1,b7e8b6eadd3a124fef94cf4aa5497d00354ff8a753d773c320d25ce607eb8590,2025-02-18T19:15:28.957000 +CVE-2025-25304,0,1,788bdf6a18db5f968ef26eda5d9694e7483d0ff6e02996c3186ccc8ce04eb43e,2025-02-14T20:15:36.903000 +CVE-2025-25305,0,1,3bc54120ca4b8dd20d29c84d0022ea008e0f61f5bc4dbbe96dcffeee4c227201,2025-02-18T19:15:29.083000 CVE-2025-25343,0,0,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000 CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000 CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000 @@ -281835,7 +281835,7 @@ CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000 -CVE-2025-25388,0,0,5876192d19265a89356e9ca3f40fe8fc17b662577ecd7d99d37f22efaaf88049,2025-02-13T20:15:49.730000 +CVE-2025-25388,0,1,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000 CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000 CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000 CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000 @@ -281868,13 +281868,13 @@ CVE-2025-25674,0,0,6d025ae220f91c2a57ba855f1dbf317fed89516da1582298cc4667448bef5 CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd351,2025-02-21T18:16:00.790000 CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000 CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000 -CVE-2025-25679,0,0,cf57aa8cf629bd0d8913086ddf39d8a39e3aaa047fd06d8634cc4ab8c13ad856,2025-02-20T23:15:13.183000 -CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000 +CVE-2025-25679,0,1,fbb49f1ce662d7ba375a3d673c319652cc6f4975eb649c5117bfbda4d186497f,2025-02-20T23:15:13.183000 +CVE-2025-25740,0,1,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10df2,2025-02-19T19:02:59.180000 CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cdf04,2025-02-19T19:02:47.650000 CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000 -CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 +CVE-2025-25745,0,1,406fa6a59b9bdf024e304acfed3b72076652d04111e85cc18e48015ad28192dc,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000 CVE-2025-25765,0,0,3adfd18b0523627b6799d8f3fe18ae9718bbe1da9964013c36335171c37fde7a,2025-02-21T18:16:12.420000 CVE-2025-25766,0,0,57af4b18309fbf59a64f83f90aab5cd3bfbe39741914f4dbb52a684f7edb326e,2025-02-21T18:16:12.647000 @@ -281895,7 +281895,7 @@ CVE-2025-25895,0,0,dbb2dc7aefefdf851dd6cea1f5518bb8d41557a984af858095e8699201b28 CVE-2025-25896,0,0,12bed3554490f6b211acee114f0848fe8685a24d4df00f8c39fe3eaa23a2bc50,2025-02-19T16:15:42.240000 CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000 -CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 +CVE-2025-25899,0,1,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 CVE-2025-25942,0,0,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000 @@ -281907,29 +281907,29 @@ CVE-2025-25947,0,0,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f0 CVE-2025-25957,0,0,989735baea9eccbb2abe8e79b59e670ad8c367df2d7fb160bdfc8f4518f1efa0,2025-02-21T15:15:13.067000 CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000 CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000 -CVE-2025-25968,0,0,09bd93194eede08beb1dc709f5461851717c635b130d25408ef11afa03180ff0,2025-02-20T20:15:46.993000 -CVE-2025-25973,0,0,bc6886ccb2c9ecf1c1935d02cb042518ac538d8013efc592ae1b5fb12fc0b35c,2025-02-20T20:15:47.153000 -CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000 +CVE-2025-25968,0,1,df7297b6665c649da79dca4a3ca1e28ce8606c19b66f07ca5f96128133a18811,2025-02-20T20:15:46.993000 +CVE-2025-25973,0,1,9f04a8a3d4c9df3a54e8b27c43dfaffb814af1d375e091681d2d959beb51504c,2025-02-20T20:15:47.153000 +CVE-2025-25988,0,1,c35501f29a7c527332d314b16a8bb035812c5db2803e0682191044134a5aa034,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000 -CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000 -CVE-2025-25992,0,0,3d1e4e5fceffc298e311378ec712b3436e60db9d6c9a25f2ff71f3ddce497276,2025-02-14T19:15:14.633000 -CVE-2025-25993,0,0,b265230a291556165ba6f150cab5c736bd9594a64a150461cb0009dc8129dba1,2025-02-14T19:15:14.763000 +CVE-2025-25991,0,1,c70c88d624042ed78f208c1d4bc84190fccda91bab68470a977cb7e7e361728c,2025-02-14T20:15:37.210000 +CVE-2025-25992,0,1,a8309ec73e99ea5d24f7147f7109d52caddce978c3e362fb4519fa4ab629d6f4,2025-02-14T19:15:14.633000 +CVE-2025-25993,0,1,4ad65f6428e587367393df06707a3495b9a360119a1fb57d2bbbbf771179ad12,2025-02-14T19:15:14.763000 CVE-2025-25994,0,0,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000 CVE-2025-25997,0,0,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000 CVE-2025-26013,0,0,681443cbea1aecaac9440a9aad5c73fef9dca35a347aeb9f53f53f8b739a2bc4,2025-02-21T21:15:24.470000 CVE-2025-26014,0,0,4c1a90c8dc606f24e0044dd527fca4e86b8cdadd364a955283c3e7a026ac0a07,2025-02-21T17:15:14.680000 CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000 -CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000 -CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000 -CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000 +CVE-2025-26156,0,1,a8694b3e45c4489013c1cde3d4ed9238920082c88bdc645d51681df5fb2b64af,2025-02-14T19:15:15.033000 +CVE-2025-26157,0,1,7804a33112b2a9ac773ed8a4ce8c66afc4de94479098b9344da6b84d1d9bf6e8,2025-02-14T20:15:37.543000 +CVE-2025-26158,0,1,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407063,2025-02-14T20:15:37.677000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 -CVE-2025-26306,0,0,ad0323aa5286b06e3a2496c2f503724f28b4742676b125b1f5a4176f3e7db0fb,2025-02-20T17:15:12.490000 +CVE-2025-26306,0,1,253f7584afb10a32e0bbd0124dbbb4fec60bad2133429801fe02f2f60921f19c,2025-02-20T17:15:12.490000 CVE-2025-26307,0,0,985beed55a8f638fd04d0a13d2505a90eaf2bf50598c60df60e93fb1afdd71ae,2025-02-21T15:15:13.223000 -CVE-2025-26308,0,0,3e072877f412939a3c50a2422a54d75c10bdf23be48f05068cfdfbe70a89a12d,2025-02-20T17:15:12.730000 +CVE-2025-26308,0,1,b83ae098978bd9a364b0b769c88e1c72411fdb0696b8153042f2770b73618841,2025-02-20T17:15:12.730000 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 -CVE-2025-26311,0,0,13656d99d63094c8d41b810c6263cffd50113ae9c1f9bd8a88dff3952f87e18f,2025-02-20T21:15:25.907000 +CVE-2025-26311,0,1,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000 CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000 @@ -281982,15 +281982,15 @@ CVE-2025-26492,0,0,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10 CVE-2025-26493,0,0,f799a8cc0e301789ed68586a5557695a6ad2df626328779fd09deada6e66bea3,2025-02-11T14:15:31.473000 CVE-2025-26494,0,0,9fa7dddcdaa3cd38f994e8d5f44807b1011184fd2f20f9f1171b97bd05f68ad5,2025-02-19T22:15:24.083000 CVE-2025-26495,0,0,9bd7f91393f57ac4b7e327a438c72992a19380bc8797fca3ba6b30269fbbf330,2025-02-11T18:15:47.237000 -CVE-2025-26506,0,0,06472821ebfcd7953c4c4368f236121ddb39bc67c09573db59220c6ef53504c7,2025-02-14T17:15:22.747000 -CVE-2025-26507,0,0,f323176124706f913b7e946f1930ef7686233000e26002e9c7f40f4fceb7a9e3,2025-02-14T17:15:22.863000 -CVE-2025-26508,0,0,5016b90acce97ba3621833356645f05da34419daa8434a6376c336274d22232b,2025-02-14T17:15:22.983000 +CVE-2025-26506,0,1,e2e45b5b1a94c0dd3aa6119292d567455074defccdbd24a8936f74e281eefda6,2025-02-14T17:15:22.747000 +CVE-2025-26507,0,1,1184227b4856f8c983f50df32e100e45cd272ad28c697b4efd85d7f57a62a44c,2025-02-14T17:15:22.863000 +CVE-2025-26508,0,1,5a25ae967b89d00ae164239f69b805bded18daadb4da05f5f2a944b6987475a4,2025-02-14T17:15:22.983000 CVE-2025-26511,0,0,5821dfa9ec884c136a5cce2e30ef6411210f7cca8ca28def218ae523a096d84c,2025-02-14T00:15:07.667000 -CVE-2025-26519,0,0,b3fc9666a20002fa3306682f9ea04074909562cf70276b34a90b9ad244b51ded,2025-02-14T17:15:23.090000 +CVE-2025-26519,0,1,60ff49a7152cbc152dfdaaea516fe391c10e1c43fea1dda904b0cc2f2794b535,2025-02-14T17:15:23.090000 CVE-2025-26520,0,0,17d02b8206df6278a5daac40c2b231fb3d4ebedc90f89b701d393457344ae3e7,2025-02-12T07:15:08.617000 -CVE-2025-26522,0,0,d432a083d9fe16f2710db5ccca016a9c6993d2707a88672ed6bf48ef8fe32b59,2025-02-14T12:15:29.583000 -CVE-2025-26523,0,0,167d4e5eb341df307a978429e54308c2f66bd92279a3ab3ead55f5415ee1e0de,2025-02-14T12:15:29.723000 -CVE-2025-26524,0,0,8fdc604b39b44cd3a4dccd87cb46f4ceb90ecb89cb62e553a8809eb05758dcf7,2025-02-14T12:15:29.887000 +CVE-2025-26522,0,1,81134038c496481bfa5c560aae63c4f4621e7f68899375180dc3955b52ec6e4d,2025-02-14T12:15:29.583000 +CVE-2025-26523,0,1,cd12665da062e93af2c690c3b3ac969d692dcb2b834904fb031d67807c219377,2025-02-14T12:15:29.723000 +CVE-2025-26524,0,1,bd7001926462f269d35a46f341242eea9f256eba3c891acb3af12e0119a6db89,2025-02-14T12:15:29.887000 CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000 CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000 CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000 @@ -282014,76 +282014,76 @@ CVE-2025-26577,0,0,1471b9d6e9fec6c623a663e5500ad54800d22aa03d3125ea0ff8be8b0728f CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90e3f,2025-02-13T14:16:23.990000 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 -CVE-2025-26603,0,0,38aab8a2b72fe5664c0a5f855e86a2a0234d8ebbfe95c4acade12aabc5757851,2025-02-18T19:15:29.387000 -CVE-2025-26604,0,0,d3619620028dcf18e19420a9725d65756b80afa1a845d9ee81f643269330a88b,2025-02-18T20:15:33.003000 -CVE-2025-26605,0,0,336417c710dc4d4517deb00af9d23a2db092eb5b95e91db10428291054884c0a,2025-02-18T22:15:19.387000 -CVE-2025-26606,0,0,de2b3a8d8fada8f5c0823feafbdef739713c910a504a9d0d7e61c87631a1fa41,2025-02-18T21:15:28.583000 -CVE-2025-26607,0,0,9dd2dcb17da8b631d4592f74114a9222a74acd924852463b8bcffb3f0d6ad717,2025-02-18T21:15:28.730000 -CVE-2025-26608,0,0,ef58a3cb9f0805b2207aacc94658043374c1c504c8211c3bb2e9ee10153b3e73,2025-02-18T21:15:28.893000 -CVE-2025-26609,0,0,1118068864ddfc3fed26c454a4e2bf0257fdfd9989c59b1088ad9c9242edc2bb,2025-02-18T21:15:29.110000 -CVE-2025-26610,0,0,60f475f941be23a6a7928e1db245dcf95e3ca12b834e392b0328faa408e9ed75,2025-02-18T21:15:29.233000 -CVE-2025-26611,0,0,bab91bebe32a771ff698aa8d744f7a48faf343c8e7bfc0a9ef4f546eb87f13dc,2025-02-18T21:15:29.357000 -CVE-2025-26612,0,0,9c94919888faa4cb9e9529535da45e13ce446526afb290333ba31aa7d1bd8674,2025-02-18T21:15:29.480000 -CVE-2025-26613,0,0,87779875e1a51335d6f2b4fc6cd4cf556f9e4f43afaee04f03733ed0f73993d8,2025-02-18T21:15:29.607000 -CVE-2025-26614,0,0,7f8f01d4a30469e9f0e12e94ee15c90de661424965432d6e0ab9c88be2537b75,2025-02-18T21:15:29.737000 -CVE-2025-26615,0,0,4ecb9621b936b5139fc4ec6e59d6798bda965877e727a76a42a2097c350383d8,2025-02-18T21:15:29.867000 -CVE-2025-26616,0,0,adfc76ec40903a204c1832e3daed3f0e44bf0c652172addd04989d3ff972bf10,2025-02-18T21:15:30.010000 -CVE-2025-26617,0,0,1b0fc09fd0258e134911cacd2ad1e559b3734d07d890bba395627bae512ac0ad,2025-02-18T21:15:30.137000 -CVE-2025-26618,0,0,f8dd04a088e9c1ef15892f10db1e49060d6c91ccfb0e2ca83ac304f0769b1d61,2025-02-20T21:15:26.073000 -CVE-2025-26620,0,0,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000 +CVE-2025-26603,0,1,98d3250593609f9c86edf4134058a63ec04230372680cf78b7b24b6820ee8eb9,2025-02-18T19:15:29.387000 +CVE-2025-26604,0,1,21ae053a765aca2e97aa573ccbf14889cfc80448b77b1b7bb3257d333e4e5218,2025-02-18T20:15:33.003000 +CVE-2025-26605,0,1,887f32f157eeac58ad8bafc72dfb207493771e8001fa3b09a3fdc5d7653d8731,2025-02-18T22:15:19.387000 +CVE-2025-26606,0,1,1beb31e76f9ef91af61f07ff961c805e75651e3521636e839c4c0a8f9d57871b,2025-02-18T21:15:28.583000 +CVE-2025-26607,0,1,b7bf87a46897798810e930f82470e97f4540202536ae5ae8e03214db2db02b22,2025-02-18T21:15:28.730000 +CVE-2025-26608,0,1,b65d0316c1038b0b9dc2c541d00763ac5ab6aac097946d37c3ba0f7c8bf16133,2025-02-18T21:15:28.893000 +CVE-2025-26609,0,1,3cfec7549c0456a3fe77ece5481ce4166351a6c4219d81b84e85bf989a84f032,2025-02-18T21:15:29.110000 +CVE-2025-26610,0,1,f37fd9a2b20cbcf9d5b3b8c8a580b669633c2bf2558febd50ffd8a211d23a8fa,2025-02-18T21:15:29.233000 +CVE-2025-26611,0,1,550359247d9edf0faf24c1f36432364e58973fcf3c6f3338398af4d83934ba45,2025-02-18T21:15:29.357000 +CVE-2025-26612,0,1,a1063dcf2012a3376d4898fed93ddfb70c1ed870abbe62612c202d9c7608056f,2025-02-18T21:15:29.480000 +CVE-2025-26613,0,1,a60cba238d8944b8779c4334a08f946ff526fbd7716000fb3ed099764eff3e42,2025-02-18T21:15:29.607000 +CVE-2025-26614,0,1,72a676f13b470667e311410ca4ebb1d908fee0668f3b49b13d645a19634cce26,2025-02-18T21:15:29.737000 +CVE-2025-26615,0,1,68dca938d00fdc92ef07a92a37656bc393484edf353d03099851ad67e97120ce,2025-02-18T21:15:29.867000 +CVE-2025-26616,0,1,e5a350639160b89d34b1e9e562527fa0ba9e8f5594aa938c9953fb4b6b617b10,2025-02-18T21:15:30.010000 +CVE-2025-26617,0,1,22833ae02b8dcf9a8e3b638c8b55f1487d87755d4be6d978fbd331a727aaa3b3,2025-02-18T21:15:30.137000 +CVE-2025-26618,0,1,912be9a737ce18c8819afdc4d4dc2a65710aa63fac9be4a9ee672614754ab81e,2025-02-20T21:15:26.073000 +CVE-2025-26620,0,1,26dae4102337906865f6523c0883aa7076c40f6f93fb48449695827abf3ae983,2025-02-18T18:15:36.767000 CVE-2025-26622,0,0,0bafa51d37f905d32266f99250febec707833a89fe716aea0a37fd117490a259,2025-02-22T16:15:31.033000 -CVE-2025-26623,0,0,8058a54e26172919c4073d93d1e5d8c8b4196bc60cec9ced7fa5cc190a1b8657,2025-02-18T20:15:33.153000 -CVE-2025-26624,0,0,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000 -CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000 +CVE-2025-26623,0,1,76c198664d5028187227de3b29ac8db7e0c1dc44e3a8ff433a4ccad52ae08740,2025-02-18T20:15:33.153000 +CVE-2025-26624,0,1,0032c9e0a335a3e4d41712965753468a301071af91365e2d5a3287105e6cd595,2025-02-18T23:15:10.810000 +CVE-2025-26700,0,1,7838e370af5b60d8c19726fd509ea0fb299d99686659f9037f2fcd14eb7d3c6a,2025-02-17T03:15:09.750000 CVE-2025-26750,0,0,2a3b9db13d9cd9c23552d1acf8bba46a50acb1724584ded2752728f67ebbd57a,2025-02-22T16:15:31.210000 -CVE-2025-26754,0,0,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000 -CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000 +CVE-2025-26754,0,1,c6936733f960c041e2d01cc063aa11dd1741ca2c92a3c690faf622b8ee29177f,2025-02-17T12:15:28.267000 +CVE-2025-26755,0,1,d72b7fc64f3dfb4916a3573544b9dd8890e509f1e9b7f0fa7fb8dbdb0c916a48,2025-02-16T23:15:10.627000 CVE-2025-26756,0,0,42d04b5d3d066a5165b76b4a05636a3c0666943b80a7eece51bcf45901a52bd7,2025-02-22T16:15:31.350000 CVE-2025-26757,0,0,9d984c4bf0ab9c149dbbadf2c5bcf69972bb1dae33868ecbce1e57e2cc64642c,2025-02-22T16:15:31.493000 -CVE-2025-26758,0,0,a26f515dcd360cc3ddbe170c3b554583598aed711ba91a215b8cd7112059dd35,2025-02-17T12:15:28.407000 -CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000 +CVE-2025-26758,0,1,dcd3dfe3d1cc3797e67fc85cbf0c196bef7a561b98b5495a36ebdf2a80f2b9f6,2025-02-17T12:15:28.407000 +CVE-2025-26759,0,1,a51fc47872c994e61434be4fe1bc0f8f0b45a91982d2b3a567b3af6b90a36c2b,2025-02-16T23:15:10.777000 CVE-2025-26760,0,0,6919f9acb07b01de194066d8c4e7e1e484a5db7bb553969b1a854be951f5b945,2025-02-22T16:15:31.633000 -CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000 +CVE-2025-26761,0,1,cb8debc1efb99ea48b498017db7e54a75aebc4c25fee7695ae9407f8a00cec31,2025-02-16T23:15:10.920000 CVE-2025-26763,0,0,835f6aa5c53311e67700f12536c4097703646350e62d41b3ab02781e700771af,2025-02-22T16:15:31.773000 CVE-2025-26764,0,0,f829f1e71e376c08611e3e8d7b71345b7be3ee4dd3ad058017645a5c43219fe6,2025-02-22T16:15:31.910000 -CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000 -CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000 -CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000 -CVE-2025-26768,0,0,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000 -CVE-2025-26769,0,0,0c72222b8a85af7a331e5bf8b764bac00a89d3c80a1a5dd966f9db3a9325c047,2025-02-17T12:15:28.550000 -CVE-2025-26770,0,0,b8458cb1a3e8b55edb12423478e672f2088dbbbcb505215466ec38c374218572,2025-02-17T12:15:28.687000 -CVE-2025-26771,0,0,1172594f01315a68b1db7af85146cea8365106bb718e61572460a2e4c4a81b19,2025-02-17T12:15:28.833000 -CVE-2025-26772,0,0,c07c6cc8f50d1e9a48d9bbe77ef3064c2299e1d25b700ebf62ce9cf490ea5fb9,2025-02-17T12:15:28.980000 -CVE-2025-26773,0,0,2e012b5456eae6488f8204215cfc7953086c04f4520b05ba5b5d35b16125c8f5,2025-02-17T12:15:29.123000 +CVE-2025-26765,0,1,6cbb4880b3b369fc7aff2ffacf88fde2a4d02c32e9b7fbaa6a74ec0fd4a1080d,2025-02-16T23:15:11.063000 +CVE-2025-26766,0,1,0952c5947bb4ea655f6a81e4f7edf1acdaa702800320f829ab76a8320f37f2c5,2025-02-16T23:15:11.207000 +CVE-2025-26767,0,1,13d13bb13d5998ffc57fdb99a19051c677ce1a060b8d7aa4187fda01505f8914,2025-02-16T23:15:11.350000 +CVE-2025-26768,0,1,bf586fc1f78844a21aec4ee6e546487469a4d9802318f5fb28cacaca5d95e80a,2025-02-16T23:15:11.487000 +CVE-2025-26769,0,1,e8e7a5501f91092faa4a0e6f5bf88517ea41aa748c16bde4ba3134a1b40d2d8a,2025-02-17T12:15:28.550000 +CVE-2025-26770,0,1,f266eb40f1a8c177fd489ba8655f53e4bf04560c8d13eb6c999a1cd244bf7040,2025-02-17T12:15:28.687000 +CVE-2025-26771,0,1,2fbc7156920e4cb581989d594b797775188b319fd8eb89aea52290ad5264f0b5,2025-02-17T12:15:28.833000 +CVE-2025-26772,0,1,96e511f5036121f910ce5ef2b9b1c67c52e7e4d5d01e5d5b14aa058418dcda51,2025-02-17T12:15:28.980000 +CVE-2025-26773,0,1,1debfed50c631ef563e5e3ed2329b479e92b6040cddb9c672f096268f8d6a113,2025-02-17T12:15:29.123000 CVE-2025-26774,0,0,c82979ba8301822d7b27e62dd6fe18c9258cb4d0e5f477952295cd2d0dcc9a0c,2025-02-22T16:15:32.060000 -CVE-2025-26775,0,0,04dff38e991d1b46c040974dfcb68e80377672de97a81d8017423e599debe554,2025-02-17T12:15:29.260000 +CVE-2025-26775,0,1,5a3538ccd4551a19ef05dec6c690d84142cdd8258fb722c109180c9f79d17307,2025-02-17T12:15:29.260000 CVE-2025-26776,0,0,d6756beb38c049d281a6d0a03e475b1f412bcd9d7c8e36a75fb74880a3fd777a,2025-02-22T16:15:32.203000 -CVE-2025-26778,0,0,f4f3856714356e410e7f4f3388bedae25b32fbe8e18283316af64b40400930e7,2025-02-17T12:15:29.417000 -CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000 -CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000 -CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000 -CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000 -CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6bf7f,2025-02-15T15:15:23.587000 +CVE-2025-26778,0,1,68043710da8cc4f97ed163ee2edbaa2f64c71ad4b5da995a87d94e9be25bee85,2025-02-17T12:15:29.417000 +CVE-2025-26779,0,1,8a262025d77166fa868782d4b8f9b46644ef804b486a3f05cf1d89fa1cfb4765,2025-02-16T23:15:11.630000 +CVE-2025-26788,0,1,6e0ad5eea5859828ac73a22164fbb38f733c72d94018b5153d62b3e4b0af0638,2025-02-15T16:15:30.090000 +CVE-2025-26789,0,1,ca7d12f2abb1c99361932e960f77e482442b11d4e054c4c52afe3c09d090d91c,2025-02-14T08:15:31.357000 +CVE-2025-26791,0,1,14f0d0b897ce6b3b47f78e719fad727635dc1654f1791907b55fa0b08f85a137,2025-02-14T16:15:37.350000 +CVE-2025-26793,0,1,1c2f37976f337f02c25ffb2333b0ebfdbc30592f3f2e435c6890e1a417ba9356,2025-02-15T15:15:23.587000 CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000 -CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000 -CVE-2025-26856,0,0,97d830a9ee806f0ef850d5b5eea5c095e7e2e4dee4401ad5b7fd9fb34c2341f7,2025-02-20T06:15:21.673000 +CVE-2025-26819,0,1,0ede991b4b81e17fa4f92afd2308026e6f3d0368afffc246b266200c177a850a,2025-02-15T00:15:28.510000 +CVE-2025-26856,0,1,c84a7c72a0341166a47640053a8e7f11274d1f45c4694e798eb68fbe3bfe8515,2025-02-20T06:15:21.673000 CVE-2025-26973,0,0,610ca521f6df23787468cbd6d7246985670b9cbd38aeda403a910446401c6120,2025-02-22T16:15:32.347000 CVE-2025-27012,0,0,7363d114ae429e53b3d9610c9cb193ed78cd11421be4a33a19fcf6bd0f11da65,2025-02-22T16:15:32.497000 -CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000 -CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000 +CVE-2025-27013,0,1,5da49234db7e8d732a635aee7726c50524766c42564dc53ab30d5668c258b6b4,2025-02-18T20:15:33.880000 +CVE-2025-27016,0,1,5734e0571ba6c0e2c4f7b9ec5f3fbe3b4fb52f565f2d154b09a195684451638c,2025-02-18T20:15:34.013000 CVE-2025-27088,0,0,09d6e70f976103888a70528f06cfe4d5e2532860157df7adae24247eee34e541,2025-02-21T22:15:13.673000 -CVE-2025-27089,0,0,e1cd39d7d2d496ca126251592ce334845a8dbaa95837461791aefc38c5c96ee4,2025-02-19T17:15:15.800000 -CVE-2025-27090,0,0,1f7a1f68f44411e4af49caeac1dba85d17f51b5d72f982d15d3cbe07a63e4481,2025-02-19T22:15:24.247000 -CVE-2025-27091,0,0,1f31f1738107c079abfb76423f421b24481f1590b449faf518c191e3377a5c93,2025-02-20T18:15:26.850000 -CVE-2025-27092,0,0,a2d77f19ec65de3c929cda30f22d3993a6f6513f45b321406307690349bba5d0,2025-02-19T23:15:15.957000 -CVE-2025-27096,0,0,32224f1c51b54efe47a565f7e551ac8c6822a2af21d493c489fef5b8bd7d41a3,2025-02-20T19:15:12.157000 -CVE-2025-27097,0,0,5b9fc582a5c5e9bf93a07d4ec3deca2e89df01f5ebbf3bb4a854ac4e8c549a46,2025-02-20T21:15:26.227000 -CVE-2025-27098,0,0,766aa0528b8030648a329da18fe8e03c04c956bcb8a3fc39487da75af24bc862,2025-02-20T21:15:26.370000 -CVE-2025-27100,0,0,c241d778cc69afadd153119784c98cb751150e20e8824ef0500e107bbd54eb0d,2025-02-21T00:15:09.250000 +CVE-2025-27089,0,1,448a9e8f6db990532f78e895caacd3237576915743771cc603136eefd3cabf5b,2025-02-19T17:15:15.800000 +CVE-2025-27090,0,1,3ec553f17ea0ae116be2cc2bd856275e78c4e0654c83946e3af868683f50a7f5,2025-02-19T22:15:24.247000 +CVE-2025-27091,0,1,721ff5d16671af309c1911f7bc031da413f847f8a17055755107c3ee0e59632c,2025-02-20T18:15:26.850000 +CVE-2025-27092,0,1,5ec2aeafb43c7c2a09d8dd21048778fe0610eeb99d26c3067a1f3c2e3e938a4d,2025-02-19T23:15:15.957000 +CVE-2025-27096,0,1,8031126df0bc9bd3535aad716c9693bd2a080d56a9e9b993fd3a05d39ceae52c,2025-02-20T19:15:12.157000 +CVE-2025-27097,0,1,fea29f969519154b2a8c182fbb3d1d2e3776d37dcbd6b6494f8af1cbae9e182c,2025-02-20T21:15:26.227000 +CVE-2025-27098,0,1,2237b458f6b45c9faae78425b7ee60243eb05c73776387b094e26cb3990ae307,2025-02-20T21:15:26.370000 +CVE-2025-27100,0,1,152b527bb539a37ffbb5e9412203b3d57121014fdbae99a77c0074299a956949,2025-02-21T00:15:09.250000 CVE-2025-27104,0,0,15aaaf6917676f5eff2f89fbd0c3a21c0c13a6b224565fcd05537a337b8876ab,2025-02-22T16:15:32.640000 CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b7cb,2025-02-22T16:15:32.827000 CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000 CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000 CVE-2025-27109,0,0,2aad45f7ceaec8c99923923cc63daf5c71560a762e95714d9599cb9bc274547c,2025-02-21T22:15:14.303000 -CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000 -CVE-2025-27218,0,0,e842a62b1f9059ed2d0550b371a27529a7b5793cd2f6846001642d73d1e7ef93,2025-02-20T21:15:26.510000 +CVE-2025-27113,0,1,d170fa3c72db3eb74309693f02d592d61ed72cb3e9e67a063d1482cf1b9614a1,2025-02-18T23:15:10.960000 +CVE-2025-27218,0,1,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000