From dac05525ff89cfa682d5b5a7bf8ea4c5e37eb14c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 11 Mar 2025 19:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-03-11T19:00:20.538561+00:00 --- CVE-2021/CVE-2021-377xx/CVE-2021-37787.json | 21 ++ CVE-2021/CVE-2021-468xx/CVE-2021-46841.json | 12 +- CVE-2022/CVE-2022-327xx/CVE-2022-32784.json | 12 +- CVE-2022/CVE-2022-328xx/CVE-2022-32824.json | 12 +- CVE-2022/CVE-2022-328xx/CVE-2022-32836.json | 12 +- CVE-2022/CVE-2022-328xx/CVE-2022-32855.json | 12 +- CVE-2022/CVE-2022-329xx/CVE-2022-32900.json | 32 +- CVE-2022/CVE-2022-329xx/CVE-2022-32902.json | 32 +- CVE-2022/CVE-2022-329xx/CVE-2022-32906.json | 32 +- CVE-2022/CVE-2022-329xx/CVE-2022-32949.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48230.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48254.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48255.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48259.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48260.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48261.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48283.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48284.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48305.json | 32 +- CVE-2023/CVE-2023-234xx/CVE-2023-23472.json | 80 +++- CVE-2023/CVE-2023-235xx/CVE-2023-23504.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23505.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23506.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23520.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23522.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23531.json | 32 +- CVE-2023/CVE-2023-29xx/CVE-2023-2937.json | 32 +- CVE-2023/CVE-2023-29xx/CVE-2023-2941.json | 32 +- CVE-2023/CVE-2023-509xx/CVE-2023-50945.json | 80 +++- CVE-2023/CVE-2023-509xx/CVE-2023-50946.json | 48 ++- CVE-2024/CVE-2024-134xx/CVE-2024-13473.json | 72 +++- CVE-2024/CVE-2024-134xx/CVE-2024-13481.json | 32 +- CVE-2024/CVE-2024-20xx/CVE-2024-2098.json | 54 ++- CVE-2024/CVE-2024-321xx/CVE-2024-32131.json | 62 +++- CVE-2024/CVE-2024-348xx/CVE-2024-34807.json | 52 ++- CVE-2024/CVE-2024-375xx/CVE-2024-37527.json | 52 ++- CVE-2024/CVE-2024-407xx/CVE-2024-40706.json | 80 +++- CVE-2024/CVE-2024-41xx/CVE-2024-4160.json | 114 +++++- CVE-2024/CVE-2024-523xx/CVE-2024-52363.json | 70 +++- CVE-2024/CVE-2024-563xx/CVE-2024-56338.json | 56 +++ CVE-2024/CVE-2024-57xx/CVE-2024-5708.json | 64 +++- CVE-2024/CVE-2024-91xx/CVE-2024-9157.json | 63 ++++ CVE-2025/CVE-2025-01xx/CVE-2025-0149.json | 56 +++ CVE-2025/CVE-2025-01xx/CVE-2025-0150.json | 56 +++ CVE-2025/CVE-2025-01xx/CVE-2025-0151.json | 56 +++ CVE-2025/CVE-2025-05xx/CVE-2025-0587.json | 13 +- CVE-2025/CVE-2025-211xx/CVE-2025-21169.json | 56 +++ CVE-2025/CVE-2025-211xx/CVE-2025-21180.json | 56 +++ CVE-2025/CVE-2025-211xx/CVE-2025-21199.json | 56 +++ CVE-2025/CVE-2025-212xx/CVE-2025-21247.json | 56 +++ CVE-2025/CVE-2025-222xx/CVE-2025-22213.json | 78 ++++ CVE-2025/CVE-2025-240xx/CVE-2025-24035.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24043.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24044.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24045.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24046.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24048.json | 60 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24049.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24050.json | 60 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24051.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24054.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24055.json | 63 ++++ CVE-2025/CVE-2025-240xx/CVE-2025-24056.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24057.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24059.json | 60 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24061.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24064.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24066.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24067.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24070.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24071.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24072.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24075.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24076.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24077.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24078.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24079.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24080.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24081.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24082.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24083.json | 56 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24084.json | 56 +++ CVE-2025/CVE-2025-242xx/CVE-2025-24201.json | 29 ++ CVE-2025/CVE-2025-244xx/CVE-2025-24431.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24439.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24440.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24441.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24442.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24443.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24444.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24445.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24448.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24449.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24450.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24451.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24452.json | 56 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24453.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24983.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24984.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24985.json | 60 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24986.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24987.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24988.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24991.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24992.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24993.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24994.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24995.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24996.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24997.json | 56 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24998.json | 56 +++ CVE-2025/CVE-2025-250xx/CVE-2025-25003.json | 56 +++ CVE-2025/CVE-2025-250xx/CVE-2025-25008.json | 56 +++ CVE-2025/CVE-2025-257xx/CVE-2025-25748.json | 21 ++ CVE-2025/CVE-2025-257xx/CVE-2025-25749.json | 21 ++ CVE-2025/CVE-2025-266xx/CVE-2025-26627.json | 56 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26629.json | 56 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26630.json | 56 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26631.json | 56 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26633.json | 56 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26634.json | 56 +++ CVE-2025/CVE-2025-266xx/CVE-2025-26643.json | 14 +- CVE-2025/CVE-2025-266xx/CVE-2025-26645.json | 60 +++ CVE-2025/CVE-2025-267xx/CVE-2025-26701.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27158.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27159.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27160.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27161.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27162.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27163.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27164.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27166.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27167.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27168.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27169.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27170.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27171.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27172.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27174.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27175.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27176.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27177.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27178.json | 56 +++ CVE-2025/CVE-2025-271xx/CVE-2025-27179.json | 56 +++ CVE-2025/CVE-2025-274xx/CVE-2025-27439.json | 56 +++ CVE-2025/CVE-2025-274xx/CVE-2025-27440.json | 56 +++ CVE-2025/CVE-2025-278xx/CVE-2025-27840.json | 12 +- README.md | 110 +++--- _state.csv | 383 +++++++++++++------- 149 files changed, 7628 insertions(+), 300 deletions(-) create mode 100644 CVE-2021/CVE-2021-377xx/CVE-2021-37787.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56338.json create mode 100644 CVE-2024/CVE-2024-91xx/CVE-2024-9157.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0149.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0150.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0151.json create mode 100644 CVE-2025/CVE-2025-211xx/CVE-2025-21169.json create mode 100644 CVE-2025/CVE-2025-211xx/CVE-2025-21180.json create mode 100644 CVE-2025/CVE-2025-211xx/CVE-2025-21199.json create mode 100644 CVE-2025/CVE-2025-212xx/CVE-2025-21247.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22213.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24035.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24043.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24044.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24045.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24046.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24048.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24049.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24050.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24051.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24054.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24055.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24056.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24057.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24059.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24061.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24064.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24066.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24067.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24070.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24071.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24072.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24075.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24076.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24077.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24078.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24079.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24080.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24081.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24082.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24083.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24084.json create mode 100644 CVE-2025/CVE-2025-242xx/CVE-2025-24201.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24431.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24439.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24440.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24441.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24442.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24443.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24444.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24445.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24448.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24449.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24450.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24451.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24452.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24453.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24983.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24984.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24985.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24986.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24987.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24988.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24991.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24992.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24993.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24994.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24995.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24996.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24997.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24998.json create mode 100644 CVE-2025/CVE-2025-250xx/CVE-2025-25003.json create mode 100644 CVE-2025/CVE-2025-250xx/CVE-2025-25008.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25748.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25749.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26627.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26629.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26630.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26631.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26633.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26634.json create mode 100644 CVE-2025/CVE-2025-266xx/CVE-2025-26645.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26701.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27158.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27159.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27160.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27161.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27162.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27163.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27164.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27166.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27167.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27168.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27169.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27170.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27171.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27172.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27174.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27175.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27176.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27177.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27178.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27179.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27439.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27440.json diff --git a/CVE-2021/CVE-2021-377xx/CVE-2021-37787.json b/CVE-2021/CVE-2021-377xx/CVE-2021-37787.json new file mode 100644 index 00000000000..9b356031457 --- /dev/null +++ b/CVE-2021/CVE-2021-377xx/CVE-2021-37787.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2021-37787", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-11T18:15:25.077", + "lastModified": "2025-03-11T18:15:25.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The unprivileged administrative interface in ABO.CMS version 5.8 through v.5.9.3 is affected by a SQL Injection vulnerability via a HTTP POST request to the TinyMCE module" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.abocms.ru/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46841.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46841.json index 10073df06bb..25cfcf21025 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46841.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46841.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46841", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:11.233", - "lastModified": "2024-11-21T06:34:47.870", + "lastModified": "2025-03-11T18:15:25.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-327xx/CVE-2022-32784.json b/CVE-2022/CVE-2022-327xx/CVE-2022-32784.json index bc7cbc537ca..cd1d500c79c 100644 --- a/CVE-2022/CVE-2022-327xx/CVE-2022-32784.json +++ b/CVE-2022/CVE-2022-327xx/CVE-2022-32784.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32784", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:11.483", - "lastModified": "2024-11-21T07:06:57.173", + "lastModified": "2025-03-11T17:15:40.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32824.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32824.json index d93d54606e4..fdb007d7b49 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32824.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32824.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32824", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:11.547", - "lastModified": "2024-11-21T07:07:01.700", + "lastModified": "2025-03-11T17:15:40.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32836.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32836.json index cf25f1a6b4e..ebfd1b84c49 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32836.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32836.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32836", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:11.797", - "lastModified": "2024-11-21T07:07:03.480", + "lastModified": "2025-03-11T17:15:40.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32855.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32855.json index ac08cbe6bfd..53a3f49c4bc 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32855.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32855.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32855", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:11.993", - "lastModified": "2024-11-21T07:07:06.130", + "lastModified": "2025-03-11T17:15:40.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32900.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32900.json index b84876425d8..ae88d33193d 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32900.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32900.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32900", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:12.200", - "lastModified": "2024-11-21T07:07:11.800", + "lastModified": "2025-03-11T18:15:25.553", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32902.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32902.json index 0cd72b9c499..3094a60d0f1 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32902.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32902.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32902", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:12.263", - "lastModified": "2024-11-21T07:07:11.933", + "lastModified": "2025-03-11T18:15:25.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32906.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32906.json index 1ba50fefd52..d2f478d7d0a 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32906.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32906.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32906", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:12.327", - "lastModified": "2024-11-21T07:07:12.457", + "lastModified": "2025-03-11T18:15:25.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32949.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32949.json index 85e01c2ab71..646ab1876c1 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32949.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32949.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32949", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:12.390", - "lastModified": "2024-11-21T07:07:17.937", + "lastModified": "2025-03-11T18:15:26.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48230.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48230.json index ea335168cfe..8ad2cf74129 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48230.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48230.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48230", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.637", - "lastModified": "2024-11-21T07:33:00.437", + "lastModified": "2025-03-11T18:15:26.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-436" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48254.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48254.json index 9ae090d7de7..6905e0e82a8 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48254.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48254.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48254", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.693", - "lastModified": "2024-11-21T07:33:03.410", + "lastModified": "2025-03-11T18:15:26.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48255.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48255.json index c7fea4d5e4f..a2a08ea7390 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48255.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48255.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48255", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.750", - "lastModified": "2024-11-21T07:33:03.510", + "lastModified": "2025-03-11T18:15:26.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48259.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48259.json index c121dd091ef..971635fc78e 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48259.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48259.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48259", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.813", - "lastModified": "2024-11-21T07:33:04.167", + "lastModified": "2025-03-11T18:15:26.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48260.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48260.json index 3a0b9b4b8a6..d2703168532 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48260.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48260.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48260", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.873", - "lastModified": "2024-11-21T07:33:04.273", + "lastModified": "2025-03-11T18:15:27.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48261.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48261.json index 1cfa0a4ecef..b98eefc607c 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48261.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48261.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48261", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.927", - "lastModified": "2024-11-21T07:33:04.387", + "lastModified": "2025-03-11T18:15:27.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-436" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48283.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48283.json index 59c7271c380..336fa3c63c5 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48283.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48283.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48283", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:19.983", - "lastModified": "2024-11-21T07:33:04.950", + "lastModified": "2025-03-11T18:15:27.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48284.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48284.json index 0c812f1f2f6..7e08a1c5a63 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48284.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48284.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48284", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:20.050", - "lastModified": "2024-11-21T07:33:05.080", + "lastModified": "2025-03-11T18:15:27.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48305.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48305.json index 813232f08c6..277d9068571 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48305.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48305.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48305", "sourceIdentifier": "psirt@huawei.com", "published": "2023-02-27T18:15:20.123", - "lastModified": "2024-11-21T07:33:07.710", + "lastModified": "2025-03-11T18:15:27.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json index 56300943d4f..59f4cd8b2f5 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23472", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-11T13:15:05.150", - "lastModified": "2024-12-11T13:15:05.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:24:19.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,64 @@ "value": "CWE-497" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/6988167", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23504.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23504.json index cbfff05c389..cc01a8edd63 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23504.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23504.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23504", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.677", - "lastModified": "2024-11-21T07:46:19.080", + "lastModified": "2025-03-11T18:15:28.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23505.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23505.json index 227ced333d4..351be945ef5 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23505.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23505.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23505", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.750", - "lastModified": "2024-11-21T07:46:19.213", + "lastModified": "2025-03-11T18:15:28.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23506.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23506.json index c8e40e673cc..9ba7f0e9a2d 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23506.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23506.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23506", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:13.817", - "lastModified": "2024-11-21T07:46:19.337", + "lastModified": "2025-03-11T18:15:28.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23520.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23520.json index 61afd7b0046..1984cce3751 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23520.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23520.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23520", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.517", - "lastModified": "2024-11-21T07:46:20.787", + "lastModified": "2025-03-11T18:15:28.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23522.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23522.json index 9e787e85033..2cf0d105507 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23522.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23522.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23522", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.580", - "lastModified": "2024-11-21T07:46:20.903", + "lastModified": "2025-03-11T18:15:28.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23531.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23531.json index d798366e98a..01912c2d204 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23531.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23531.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23531", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.843", - "lastModified": "2024-11-21T07:46:21.933", + "lastModified": "2025-03-11T17:15:47.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json index 07f1de637d3..12c326ac8d1 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2937", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.393", - "lastModified": "2024-11-21T07:59:36.307", + "lastModified": "2025-03-11T18:15:29.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json index 06ca586785a..c327b013a74 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2941", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.570", - "lastModified": "2024-11-21T07:59:36.823", + "lastModified": "2025-03-11T17:15:47.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json index 3f051ef8c25..fbeb11bb3ca 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50945.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50945", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-26T16:15:30.523", - "lastModified": "2025-01-26T16:15:30.523", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T18:10:30.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,64 @@ "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:common_licensing:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1FC1E614-CE03-4A28-8F67-0BC2FC72B504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7161947", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50946.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50946.json index c8be630f84b..a0c01c4bc6a 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50946.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50946.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50946", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-26T16:15:30.680", - "lastModified": "2025-01-26T16:15:30.680", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T18:03:46.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:common_licensing:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1FC1E614-CE03-4A28-8F67-0BC2FC72B504" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7161947", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json index 7b5ee1d1213..b391aef72dc 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13473", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.610", - "lastModified": "2025-02-18T18:15:18.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T18:51:56.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eniture:ltl_freight_quotes:*:*:*:*:worldwide_express:wordpress:*:*", + "versionEndExcluding": "5.0.21", + "matchCriteriaId": "96078B14-0B98-4044-88BE-B62E1D79B6C2" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-worldwide-express-edition/trunk/warehouse-dropship/wild/includes/wwe-ltl-wild-delivery-save.php#L264", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-worldwide-express-edition/trunk/warehouse-dropship/wild/includes/wwe-ltl-wild-delivery-save.php#L387", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3215844%40ltl-freight-quotes-worldwide-express-edition&new=3215844%40ltl-freight-quotes-worldwide-express-edition&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e72828e-a6f6-43fc-8a10-d9908004c0fc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json index 50d98f5bd00..b3c1007031a 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13481", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-19T12:15:30.753", - "lastModified": "2025-02-19T12:15:30.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T18:48:06.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eniture:ltl_freight_quotes:*:*:*:*:r/+l_carriers:wordpress:*:*", + "versionEndExcluding": "3.3.5", + "matchCriteriaId": "13BF2BB6-2B0D-4818-ACD7-099AFC0A4686" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3241903/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0f3cdce-e239-4c2f-83e3-e8d0b528d39e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json index e311d4760ac..256d22645e2 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2098", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-13T06:15:09.453", - "lastModified": "2024-11-21T09:09:02.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:30:52.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.90", + "matchCriteriaId": "D69B8BE4-E6D3-4F3F-A044-4C7C40D25DD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3072712/download-manager", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1301c8af-d81a-40f1-96fa-e8252309d8a4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3072712/download-manager", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1301c8af-d81a-40f1-96fa-e8252309d8a4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32131.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32131.json index 4e8aae22358..7315e978372 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32131.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32131", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:35.797", - "lastModified": "2024-11-21T09:14:31.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:41:26.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.83", + "matchCriteriaId": "DE9FD210-41FC-4E45-A3E2-AD73AC79033C" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/download-manager/wordpress-download-manager-plugin-3-2-82-file-password-lock-bypass-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/download-manager/wordpress-download-manager-plugin-3-2-82-file-password-lock-bypass-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34807.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34807.json index fc670c72b2f..26cb0b1fda3 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34807.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34807", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T10:15:13.900", - "lastModified": "2024-11-21T09:19:26.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:38:49.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codebard:fast_custom_social_share:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.2", + "matchCriteriaId": "E91357FB-0482-49ED-A800-BA4A864F7162" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/fast-custom-social-share-by-codebard/wordpress-fast-custom-social-share-by-codebard-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/fast-custom-social-share-by-codebard/wordpress-fast-custom-social-share-by-codebard-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json index 8a94516a46a..7d43f57b9d7 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37527", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-27T16:15:30.840", - "lastModified": "2025-01-27T16:15:30.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T18:14:30.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.3", + "matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.4", + "matchCriteriaId": "0C959A76-F91D-4C8E-9D59-8235256E8B77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7171880", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json index ee1d8aa6bf5..c552074c974 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40706", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-24T16:15:36.150", - "lastModified": "2025-01-24T16:15:36.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:58:30.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,12 +69,64 @@ "value": "CWE-497" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7169826", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4160.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4160.json index 515bf98cdf2..f0371f472a9 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4160.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4160", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T10:15:09.977", - "lastModified": "2024-11-21T09:42:18.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:36:27.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,57 +36,143 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.90", + "matchCriteriaId": "D69B8BE4-E6D3-4F3F-A044-4C7C40D25DD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Package/views/all-packages-shortcode.php?rev=2996137#L202", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3080781/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/download-manager/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/download-manager/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f51258a-e228-412f-9d97-28ab679136d7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpdownloadmanager.com/doc/short-codes/wpdm_all_packages-list-all-downloads-in-tabular-format-in-a-page/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Package/views/all-packages-shortcode.php?rev=2996137#L202", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3080781/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/download-manager/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/download-manager/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f51258a-e228-412f-9d97-28ab679136d7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpdownloadmanager.com/doc/short-codes/wpdm_all_packages-list-all-downloads-in-tabular-format-in-a-page/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json index 25ef84d5e14..aecb8dcf6ea 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52363", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-17T02:15:25.060", - "lastModified": "2025-01-17T02:15:25.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-11T17:53:21.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,10 +71,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E492C463-D76E-49B7-A4D4-3B499E422D89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7176515", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56338.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56338.json new file mode 100644 index 00000000000..a338c3b65f4 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56338.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56338", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-11T17:16:17.120", + "lastModified": "2025-03-11T17:16:17.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7185265", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json index beffa3570b2..b68319ae4bd 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5708", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-06T06:15:34.460", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-11T17:28:36.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbakery:wpbakery_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.8", + "matchCriteriaId": "3379837E-C4FE-4652-8EA7-4A2031D688F6" + } + ] + } + ] } ], "references": [ { "url": "https://wpbakery.com/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23ff12f0-eb9d-4bb3-8db0-0e794c0f0594?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9157.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9157.json new file mode 100644 index 00000000000..0f723dabdcd --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9157.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-9157", + "sourceIdentifier": "PSIRT@synaptics.com", + "published": "2025-03-11T17:16:17.330", + "lastModified": "2025-03-11T17:16:17.330", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "PSIRT@synaptics.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED **\u00a0\n\nA privilege escalation vulnerability in CxUIUSvc64.exe and\nCxUIUSvc32.exe of Synaptics audio drivers allows a local authorized\nattacker to load a DLL in a privileged process.\n\n\nOut of an abundance of caution, this CVE ID is being\nassigned to better serve our customers and ensure all who are still running\nthis product understand that the product is End-of-Life and should be removed.\nFor more information on this, refer to the CVE Record\u2019s reference information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "PSIRT@synaptics.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@synaptics.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.synaptics.com/sites/default/files/2025-03/audio-driver-security-brief-2025-03-11.pdf", + "source": "PSIRT@synaptics.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0149.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0149.json new file mode 100644 index 00000000000..08d3a3ab91e --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0149.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0149", + "sourceIdentifier": "security@zoom.us", + "published": "2025-03-11T17:16:17.523", + "lastModified": "2025-03-11T18:15:29.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25008/", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0150.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0150.json new file mode 100644 index 00000000000..8f4e15f5ff1 --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0150.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0150", + "sourceIdentifier": "security@zoom.us", + "published": "2025-03-11T18:15:29.800", + "lastModified": "2025-03-11T18:15:29.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect behavior order in some Zoom Workplace Apps for iOS before version 6.3.0 may allow an authenticated user to conduct a denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-696" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25009/", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0151.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0151.json new file mode 100644 index 00000000000..ecb51dab072 --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0151.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0151", + "sourceIdentifier": "security@zoom.us", + "published": "2025-03-11T18:15:29.940", + "lastModified": "2025-03-11T18:15:29.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25010/", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json index 13f17ec6e98..08337256376 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0587.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0587", "sourceIdentifier": "scy@openharmony.io", "published": "2025-03-04T04:15:11.240", - "lastModified": "2025-03-04T04:15:11.240", + "lastModified": "2025-03-11T18:07:22.823", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,13 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:openatom:openharmony:4.1:-:*:*:-:*:*:*", - "matchCriteriaId": "55B44077-3E16-404D-94A7-B1A3B363643C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:openatom:openharmony:5.0.2:-:*:*:-:*:*:*", - "matchCriteriaId": "03EE6151-BE9F-4FD1-B313-C2759C14B026" + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1", + "versionEndIncluding": "5.0.2", + "matchCriteriaId": "4C966863-694A-487F-9510-880F7796AC08" } ] } diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json new file mode 100644 index 00000000000..cd93b617e5e --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21169", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T17:16:18.423", + "lastModified": "2025-03-11T17:16:18.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Designer versions 14.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-22.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21180.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21180.json new file mode 100644 index 00000000000..c97b8c31e87 --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21180.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21180", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:18.790", + "lastModified": "2025-03-11T17:16:18.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21180", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json new file mode 100644 index 00000000000..4144b9c89f3 --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21199.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21199", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:19.670", + "lastModified": "2025-03-11T17:16:19.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21199", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21247.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21247.json new file mode 100644 index 00000000000..947a688c182 --- /dev/null +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21247.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21247", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:20.400", + "lastModified": "2025-03-11T17:16:20.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-41" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21247", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22213.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22213.json new file mode 100644 index 00000000000..b466ace64c9 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22213.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-22213", + "sourceIdentifier": "security@joomla.org", + "published": "2025-03-11T17:16:24.577", + "lastModified": "2025-03-11T17:16:24.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Inadequate checks in the Media Manager allowed users with \"edit\" privileges to change file extension to arbitrary extension, including .php and other potentially executable extensions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NO", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/961-20250301-core-malicious-file-uploads-via-media-managere-malicious-file-uploads-via-media-manager.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24035.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24035.json new file mode 100644 index 00000000000..6fd5b0f5720 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24035.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24035", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:25.373", + "lastModified": "2025-03-11T17:16:25.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24035", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24043.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24043.json new file mode 100644 index 00000000000..4e040d1d890 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24043.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24043", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:25.897", + "lastModified": "2025-03-11T17:16:25.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24043", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24044.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24044.json new file mode 100644 index 00000000000..46918546c43 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24044.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24044", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:26.093", + "lastModified": "2025-03-11T17:16:26.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24044", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24045.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24045.json new file mode 100644 index 00000000000..5995b34ce87 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24045.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24045", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:26.290", + "lastModified": "2025-03-11T17:16:26.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24045", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24046.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24046.json new file mode 100644 index 00000000000..556a5aa96b2 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24046.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24046", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:26.503", + "lastModified": "2025-03-11T17:16:26.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24046", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24048.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24048.json new file mode 100644 index 00000000000..5663c6af076 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24048.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24048", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:26.703", + "lastModified": "2025-03-11T17:16:26.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24048", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24049.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24049.json new file mode 100644 index 00000000000..d0c2e191e55 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24049.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24049", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:26.907", + "lastModified": "2025-03-11T17:16:26.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24050.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24050.json new file mode 100644 index 00000000000..e3ed264f838 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24050.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24050", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:27.273", + "lastModified": "2025-03-11T17:16:27.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24050", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24051.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24051.json new file mode 100644 index 00000000000..ac9b08045e3 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24051.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24051", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:27.467", + "lastModified": "2025-03-11T17:16:27.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24051", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json new file mode 100644 index 00000000000..3fbd9f89bcb --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24054.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24054", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:27.660", + "lastModified": "2025-03-11T17:16:27.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24055.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24055.json new file mode 100644 index 00000000000..ad475dc6814 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24055.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2025-24055", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:27.887", + "lastModified": "2025-03-11T17:16:27.887", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "secure@microsoft.com", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24055", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24056.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24056.json new file mode 100644 index 00000000000..9d45b1d955d --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24056.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24056", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:28.130", + "lastModified": "2025-03-11T17:16:28.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24056", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24057.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24057.json new file mode 100644 index 00000000000..5483e529ab9 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24057.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24057", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:28.390", + "lastModified": "2025-03-11T17:16:28.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24057", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24059.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24059.json new file mode 100644 index 00000000000..3c3ccfbf9c2 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24059.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24059", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:28.593", + "lastModified": "2025-03-11T17:16:28.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-681" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24059", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24061.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24061.json new file mode 100644 index 00000000000..281bfaad80d --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24061.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24061", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:28.800", + "lastModified": "2025-03-11T17:16:28.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24061", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24064.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24064.json new file mode 100644 index 00000000000..d64a7244513 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24064.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24064", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:29.007", + "lastModified": "2025-03-11T17:16:29.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in DNS Server allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24064", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24066.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24066.json new file mode 100644 index 00000000000..1985e7c2c5c --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24066.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24066", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:29.223", + "lastModified": "2025-03-11T17:16:29.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24066", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24067.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24067.json new file mode 100644 index 00000000000..63ec4b20f05 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24067.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24067", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:29.477", + "lastModified": "2025-03-11T17:16:29.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24067", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24070.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24070.json new file mode 100644 index 00000000000..d09ec101477 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24070.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24070", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:29.680", + "lastModified": "2025-03-11T17:16:29.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24071.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24071.json new file mode 100644 index 00000000000..0183463a909 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24071.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24071", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:29.867", + "lastModified": "2025-03-11T17:16:29.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24071", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24072.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24072.json new file mode 100644 index 00000000000..dd4f21c61f9 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24072.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24072", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:30.070", + "lastModified": "2025-03-11T17:16:30.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24072", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24075.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24075.json new file mode 100644 index 00000000000..06c669cb08b --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24075.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24075", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:30.270", + "lastModified": "2025-03-11T17:16:30.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24075", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json new file mode 100644 index 00000000000..9861eee4e88 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24076.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24076", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:30.480", + "lastModified": "2025-03-11T17:16:30.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24076", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24077.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24077.json new file mode 100644 index 00000000000..eb6677c1e9d --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24077.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24077", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:30.657", + "lastModified": "2025-03-11T17:16:30.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24077", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24078.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24078.json new file mode 100644 index 00000000000..fc294aee8f7 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24078.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24078", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:30.863", + "lastModified": "2025-03-11T17:16:30.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24078", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24079.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24079.json new file mode 100644 index 00000000000..3215c9f2b35 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24079.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24079", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:31.100", + "lastModified": "2025-03-11T17:16:31.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24079", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24080.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24080.json new file mode 100644 index 00000000000..b3554488513 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24080.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24080", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:31.323", + "lastModified": "2025-03-11T17:16:31.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24080", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24081.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24081.json new file mode 100644 index 00000000000..464cdff5d34 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24081.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24081", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:32.533", + "lastModified": "2025-03-11T17:16:32.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24081", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24082.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24082.json new file mode 100644 index 00000000000..eb77009f5c3 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24082.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24082", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:33.087", + "lastModified": "2025-03-11T17:16:33.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24082", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24083.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24083.json new file mode 100644 index 00000000000..91c46586412 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24083.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24083", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:33.310", + "lastModified": "2025-03-11T17:16:33.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24083", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json new file mode 100644 index 00000000000..702b1d8ded9 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24084.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24084", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:33.523", + "lastModified": "2025-03-11T17:16:33.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24084", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json new file mode 100644 index 00000000000..4f24dfc2cef --- /dev/null +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24201.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-24201", + "sourceIdentifier": "product-security@apple.com", + "published": "2025-03-11T18:15:30.190", + "lastModified": "2025-03-11T18:15:30.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/122281", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122283", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/122284", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json new file mode 100644 index 00000000000..c1ae1114345 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24431", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:30.277", + "lastModified": "2025-03-11T18:15:30.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24439.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24439.json new file mode 100644 index 00000000000..b6d63f9be59 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24439.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24439", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:30.437", + "lastModified": "2025-03-11T18:15:30.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24440.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24440.json new file mode 100644 index 00000000000..5dc13672c7d --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24440.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24440", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:30.603", + "lastModified": "2025-03-11T18:15:30.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24441.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24441.json new file mode 100644 index 00000000000..1b226372039 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24441.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24441", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:30.753", + "lastModified": "2025-03-11T18:15:30.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24442.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24442.json new file mode 100644 index 00000000000..46ca465f62a --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24442", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:30.903", + "lastModified": "2025-03-11T18:15:30.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24443.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24443.json new file mode 100644 index 00000000000..f59ec187e36 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24443.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24443", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.047", + "lastModified": "2025-03-11T18:15:31.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24444.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24444.json new file mode 100644 index 00000000000..1143dfc77e8 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24444", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.203", + "lastModified": "2025-03-11T18:15:31.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24445.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24445.json new file mode 100644 index 00000000000..1b3db03b000 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24445.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24445", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.370", + "lastModified": "2025-03-11T18:15:31.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Sampler versions 4.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json new file mode 100644 index 00000000000..66180ebc6c3 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24448", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.543", + "lastModified": "2025-03-11T18:15:31.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json new file mode 100644 index 00000000000..85d66d3fc6b --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24449", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.700", + "lastModified": "2025-03-11T18:15:31.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json new file mode 100644 index 00000000000..9805c6e6d6a --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24450.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24450", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.840", + "lastModified": "2025-03-11T18:15:31.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-18.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json new file mode 100644 index 00000000000..b1c20908f92 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24451.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24451", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:31.993", + "lastModified": "2025-03-11T18:15:31.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-18.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json new file mode 100644 index 00000000000..4e21da40c6a --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24452", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:32.140", + "lastModified": "2025-03-11T18:15:32.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json new file mode 100644 index 00000000000..590cb644434 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24453", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:32.297", + "lastModified": "2025-03-11T18:15:32.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24983.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24983.json new file mode 100644 index 00000000000..38d58bf01b4 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24983.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24983", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:33.890", + "lastModified": "2025-03-11T17:16:33.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24984.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24984.json new file mode 100644 index 00000000000..08ec9c9a444 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24984.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24984", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:34.090", + "lastModified": "2025-03-11T17:16:34.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24984", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24985.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24985.json new file mode 100644 index 00000000000..e99acebd44c --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24985.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24985", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:34.303", + "lastModified": "2025-03-11T17:16:34.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24986.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24986.json new file mode 100644 index 00000000000..a3e48577cf7 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24986.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24986", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:34.563", + "lastModified": "2025-03-11T17:16:34.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24986", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json new file mode 100644 index 00000000000..db35b6335a0 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24987.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24987", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:34.767", + "lastModified": "2025-03-11T17:16:34.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24987", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json new file mode 100644 index 00000000000..6daaf10fbf3 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24988.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24988", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:35.013", + "lastModified": "2025-03-11T17:16:35.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24988", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24991.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24991.json new file mode 100644 index 00000000000..8c7a1897fa6 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24991.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24991", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:35.297", + "lastModified": "2025-03-11T17:16:35.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24991", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24992.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24992.json new file mode 100644 index 00000000000..44a0fb757d7 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24992.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24992", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:35.523", + "lastModified": "2025-03-11T17:16:35.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24992", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24993.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24993.json new file mode 100644 index 00000000000..720e311a603 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24993.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24993", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:35.797", + "lastModified": "2025-03-11T17:16:35.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24993", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24994.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24994.json new file mode 100644 index 00000000000..26c8249b399 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24994.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24994", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:36.150", + "lastModified": "2025-03-11T17:16:36.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24994", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24995.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24995.json new file mode 100644 index 00000000000..ae342d9cd1b --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24995.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24995", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:36.490", + "lastModified": "2025-03-11T17:16:36.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24995", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24996.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24996.json new file mode 100644 index 00000000000..dfc51e8d8ff --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24996.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24996", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:36.803", + "lastModified": "2025-03-11T17:16:36.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24996", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24997.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24997.json new file mode 100644 index 00000000000..706d24717dd --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24997.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24997", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:37.103", + "lastModified": "2025-03-11T17:16:37.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Null pointer dereference in Windows Kernel Memory allows an authorized attacker to deny service locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24997", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24998.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24998.json new file mode 100644 index 00000000000..79a93941e89 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24998.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24998", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:37.670", + "lastModified": "2025-03-11T17:16:37.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24998", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25003.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25003.json new file mode 100644 index 00000000000..92e4d1994b5 --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25003.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25003", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:38.043", + "lastModified": "2025-03-11T17:16:38.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25003", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25008.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25008.json new file mode 100644 index 00000000000..99158a84a3a --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25008.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25008", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:38.483", + "lastModified": "2025-03-11T17:16:38.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25008", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json new file mode 100644 index 00000000000..f75c72e44e6 --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25748.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25748", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-11T18:15:32.810", + "lastModified": "2025-03-11T18:15:32.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.huyvo.net/post/cve-2025-25748-cross-site-request-forgery-csrf-vulnerability-in-hoteldruid-3-0-7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25749.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25749.json new file mode 100644 index 00000000000..6a9ed2df235 --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25749.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25749", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-11T18:15:32.933", + "lastModified": "2025-03-11T18:15:32.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.huyvo.net/post/cve-2025-25749-weak-password-policy-in-hoteldruid-3-0-7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26627.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26627.json new file mode 100644 index 00000000000..f48a382443a --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26627.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26627", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:38.930", + "lastModified": "2025-03-11T17:16:38.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26627", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26629.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26629.json new file mode 100644 index 00000000000..54979e1e962 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26629.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26629", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:39.537", + "lastModified": "2025-03-11T17:16:39.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26629", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26630.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26630.json new file mode 100644 index 00000000000..1822ffa8003 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26630.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26630", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:42.820", + "lastModified": "2025-03-11T17:16:42.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26630", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26631.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26631.json new file mode 100644 index 00000000000..4439ea591dc --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26631.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26631", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:43.110", + "lastModified": "2025-03-11T17:16:43.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26631", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26633.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26633.json new file mode 100644 index 00000000000..21f866db800 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26633.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26633", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:43.390", + "lastModified": "2025-03-11T17:16:43.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26634.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26634.json new file mode 100644 index 00000000000..bb87d3dfb9b --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26634", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:43.743", + "lastModified": "2025-03-11T17:16:43.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Core Messaging allows an authorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26634", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26643.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26643.json index d350b26e588..1d923cdc1be 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26643.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26643.json @@ -2,20 +2,24 @@ "id": "CVE-2025-26643", "sourceIdentifier": "secure@microsoft.com", "published": "2025-03-07T19:15:37.180", - "lastModified": "2025-03-07T19:15:37.180", - "vulnStatus": "Received", + "lastModified": "2025-03-11T17:16:44.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network." + "value": "The UI performs the wrong action in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network." + }, + { + "lang": "es", + "value": "No hay soluci\u00f3n para este problema en Microsoft Edge (basado en Chromium) que permite que un atacante no autorizado realice suplantaci\u00f3n de identidad a trav\u00e9s de una red." } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json new file mode 100644 index 00000000000..cfe84870dfa --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26645.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26645", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-03-11T17:16:44.200", + "lastModified": "2025-03-11T17:16:44.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26645", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26701.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26701.json new file mode 100644 index 00000000000..eea77df2210 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26701.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26701", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-11T18:15:33.210", + "lastModified": "2025-03-11T18:15:33.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Percona PMM Server (OVA) before 3.0.0-1.ova. The default service account credentials can lead to SSH access, use of Sudo to root, and sensitive data exposure. This is fixed in PMM2 2.42.0-1.ova, 2.43.0-1.ova, 2.43.1-1.ova, 2.43.2-1.ova, and 2.44.0-1.ova and in PMM3 3.0.0-1.ova and later." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1393" + } + ] + } + ], + "references": [ + { + "url": "https://www.percona.com/blog/security-advisory-cve-affecting-percona-monitoring-and-management-pmm/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json new file mode 100644 index 00000000000..9d5c4d96274 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27158", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:33.540", + "lastModified": "2025-03-11T18:15:33.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json new file mode 100644 index 00000000000..09b1fab7928 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27159", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:33.687", + "lastModified": "2025-03-11T18:15:33.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json new file mode 100644 index 00000000000..17577b99eac --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27160", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:33.840", + "lastModified": "2025-03-11T18:15:33.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json new file mode 100644 index 00000000000..44bbfd66a5b --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27161", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:33.993", + "lastModified": "2025-03-11T18:15:33.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json new file mode 100644 index 00000000000..bb8f382aca4 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27162", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:34.150", + "lastModified": "2025-03-11T18:15:34.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json new file mode 100644 index 00000000000..304f8a4adba --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27163", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:34.293", + "lastModified": "2025-03-11T18:15:34.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json new file mode 100644 index 00000000000..d6c00c2b9dd --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27164", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:34.437", + "lastModified": "2025-03-11T18:15:34.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json new file mode 100644 index 00000000000..181740de5e9 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27166", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:34.580", + "lastModified": "2025-03-11T18:15:34.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json new file mode 100644 index 00000000000..1bb329ea055 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27167", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:34.730", + "lastModified": "2025-03-11T18:15:34.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json new file mode 100644 index 00000000000..e6c47a8db83 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27168", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:34.893", + "lastModified": "2025-03-11T18:15:34.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json new file mode 100644 index 00000000000..45386fa4f68 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27169", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:35.077", + "lastModified": "2025-03-11T18:15:35.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json new file mode 100644 index 00000000000..f7e598e8411 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27170", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:35.227", + "lastModified": "2025-03-11T18:15:35.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 29.2.1, 28.7.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json new file mode 100644 index 00000000000..372ce6eb65b --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27171", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:35.377", + "lastModified": "2025-03-11T18:15:35.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json new file mode 100644 index 00000000000..cc890d7eb61 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27172", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T17:16:44.420", + "lastModified": "2025-03-11T17:16:44.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-22.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json new file mode 100644 index 00000000000..7f5c480cbd5 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27174", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:35.600", + "lastModified": "2025-03-11T18:15:35.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json new file mode 100644 index 00000000000..c374d3ec7e1 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27175", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:35.743", + "lastModified": "2025-03-11T18:15:35.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json new file mode 100644 index 00000000000..6608d2e0e81 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27176.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27176", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:35.897", + "lastModified": "2025-03-11T18:15:35.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json new file mode 100644 index 00000000000..408689cd1a9 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27177.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27177", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:36.047", + "lastModified": "2025-03-11T18:15:36.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json new file mode 100644 index 00000000000..2040b1d576d --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27178.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27178", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:36.200", + "lastModified": "2025-03-11T18:15:36.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json new file mode 100644 index 00000000000..30e35ac6643 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27179.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27179", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-03-11T18:15:36.353", + "lastModified": "2025-03-11T18:15:36.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27439.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27439.json new file mode 100644 index 00000000000..15ef4eb6086 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27439.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27439", + "sourceIdentifier": "security@zoom.us", + "published": "2025-03-11T18:15:36.510", + "lastModified": "2025-03-11T18:15:36.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer underflow in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-124" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25011/", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27440.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27440.json new file mode 100644 index 00000000000..238bcbb652e --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27440.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27440", + "sourceIdentifier": "security@zoom.us", + "published": "2025-03-11T18:15:36.653", + "lastModified": "2025-03-11T18:15:36.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap overflow in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-124" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25011/", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27840.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27840.json index a3629e58989..ea266257f28 100644 --- a/CVE-2025/CVE-2025-278xx/CVE-2025-27840.json +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27840.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27840", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-08T20:15:36.027", - "lastModified": "2025-03-10T14:15:25.943", - "vulnStatus": "Received", + "lastModified": "2025-03-11T17:16:44.627", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Espressif ESP32 chips allow 29 hidden HCI commands, such as 0xFC02 (Write memory)." + }, + { + "lang": "es", + "value": "Los chips Espressif ESP32 permiten 29 comandos HCI ocultos, como 0xFC02 (Escribir memoria)." } ], "metrics": { @@ -96,6 +100,10 @@ "url": "https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/", "source": "cve@mitre.org" }, + { + "url": "https://www.espressif.com/en/news/Response_ESP32_Bluetooth", + "source": "cve@mitre.org" + }, { "url": "https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/", "source": "cve@mitre.org" diff --git a/README.md b/README.md index a672e37fa38..d9f7f0659f2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-11T17:00:19.839888+00:00 +2025-03-11T19:00:20.538561+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-11T16:57:11.073000+00:00 +2025-03-11T18:51:56.900000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284792 +284897 ``` ### CVEs added in the last Commit -Recently added CVEs: `27` +Recently added CVEs: `105` -- [CVE-2023-42784](CVE-2023/CVE-2023-427xx/CVE-2023-42784.json) (`2025-03-11T15:15:40.033`) -- [CVE-2023-48790](CVE-2023/CVE-2023-487xx/CVE-2023-48790.json) (`2025-03-11T15:15:40.227`) -- [CVE-2024-32123](CVE-2024/CVE-2024-321xx/CVE-2024-32123.json) (`2025-03-11T15:15:41.353`) -- [CVE-2024-33501](CVE-2024/CVE-2024-335xx/CVE-2024-33501.json) (`2025-03-11T15:15:41.550`) -- [CVE-2024-45324](CVE-2024/CVE-2024-453xx/CVE-2024-45324.json) (`2025-03-11T15:15:41.743`) -- [CVE-2024-45328](CVE-2024/CVE-2024-453xx/CVE-2024-45328.json) (`2025-03-11T15:15:41.963`) -- [CVE-2024-46663](CVE-2024/CVE-2024-466xx/CVE-2024-46663.json) (`2025-03-11T15:15:42.130`) -- [CVE-2024-51319](CVE-2024/CVE-2024-513xx/CVE-2024-51319.json) (`2025-03-11T15:15:42.313`) -- [CVE-2024-51320](CVE-2024/CVE-2024-513xx/CVE-2024-51320.json) (`2025-03-11T15:15:42.447`) -- [CVE-2024-51321](CVE-2024/CVE-2024-513xx/CVE-2024-51321.json) (`2025-03-11T15:15:42.570`) -- [CVE-2024-51322](CVE-2024/CVE-2024-513xx/CVE-2024-51322.json) (`2025-03-11T15:15:42.700`) -- [CVE-2024-52960](CVE-2024/CVE-2024-529xx/CVE-2024-52960.json) (`2025-03-11T15:15:42.813`) -- [CVE-2024-52961](CVE-2024/CVE-2024-529xx/CVE-2024-52961.json) (`2025-03-11T15:15:42.960`) -- [CVE-2024-54018](CVE-2024/CVE-2024-540xx/CVE-2024-54018.json) (`2025-03-11T15:15:43.113`) -- [CVE-2024-54026](CVE-2024/CVE-2024-540xx/CVE-2024-54026.json) (`2025-03-11T15:15:43.307`) -- [CVE-2024-55590](CVE-2024/CVE-2024-555xx/CVE-2024-55590.json) (`2025-03-11T15:15:43.650`) -- [CVE-2024-55592](CVE-2024/CVE-2024-555xx/CVE-2024-55592.json) (`2025-03-11T15:15:43.823`) -- [CVE-2024-55597](CVE-2024/CVE-2024-555xx/CVE-2024-55597.json) (`2025-03-11T15:15:44.010`) -- [CVE-2025-22454](CVE-2025/CVE-2025-224xx/CVE-2025-22454.json) (`2025-03-11T15:15:44.737`) -- [CVE-2025-25680](CVE-2025/CVE-2025-256xx/CVE-2025-25680.json) (`2025-03-11T16:15:17.413`) -- [CVE-2025-25747](CVE-2025/CVE-2025-257xx/CVE-2025-25747.json) (`2025-03-11T16:15:17.547`) -- [CVE-2025-27403](CVE-2025/CVE-2025-274xx/CVE-2025-27403.json) (`2025-03-11T15:15:45.570`) -- [CVE-2025-27601](CVE-2025/CVE-2025-276xx/CVE-2025-27601.json) (`2025-03-11T16:15:17.943`) -- [CVE-2025-27602](CVE-2025/CVE-2025-276xx/CVE-2025-27602.json) (`2025-03-11T16:15:18.100`) -- [CVE-2025-27617](CVE-2025/CVE-2025-276xx/CVE-2025-27617.json) (`2025-03-11T16:15:18.310`) +- [CVE-2025-26634](CVE-2025/CVE-2025-266xx/CVE-2025-26634.json) (`2025-03-11T17:16:43.743`) +- [CVE-2025-26645](CVE-2025/CVE-2025-266xx/CVE-2025-26645.json) (`2025-03-11T17:16:44.200`) +- [CVE-2025-26701](CVE-2025/CVE-2025-267xx/CVE-2025-26701.json) (`2025-03-11T18:15:33.210`) +- [CVE-2025-27158](CVE-2025/CVE-2025-271xx/CVE-2025-27158.json) (`2025-03-11T18:15:33.540`) +- [CVE-2025-27159](CVE-2025/CVE-2025-271xx/CVE-2025-27159.json) (`2025-03-11T18:15:33.687`) +- [CVE-2025-27160](CVE-2025/CVE-2025-271xx/CVE-2025-27160.json) (`2025-03-11T18:15:33.840`) +- [CVE-2025-27161](CVE-2025/CVE-2025-271xx/CVE-2025-27161.json) (`2025-03-11T18:15:33.993`) +- [CVE-2025-27162](CVE-2025/CVE-2025-271xx/CVE-2025-27162.json) (`2025-03-11T18:15:34.150`) +- [CVE-2025-27163](CVE-2025/CVE-2025-271xx/CVE-2025-27163.json) (`2025-03-11T18:15:34.293`) +- [CVE-2025-27164](CVE-2025/CVE-2025-271xx/CVE-2025-27164.json) (`2025-03-11T18:15:34.437`) +- [CVE-2025-27166](CVE-2025/CVE-2025-271xx/CVE-2025-27166.json) (`2025-03-11T18:15:34.580`) +- [CVE-2025-27167](CVE-2025/CVE-2025-271xx/CVE-2025-27167.json) (`2025-03-11T18:15:34.730`) +- [CVE-2025-27168](CVE-2025/CVE-2025-271xx/CVE-2025-27168.json) (`2025-03-11T18:15:34.893`) +- [CVE-2025-27169](CVE-2025/CVE-2025-271xx/CVE-2025-27169.json) (`2025-03-11T18:15:35.077`) +- [CVE-2025-27170](CVE-2025/CVE-2025-271xx/CVE-2025-27170.json) (`2025-03-11T18:15:35.227`) +- [CVE-2025-27171](CVE-2025/CVE-2025-271xx/CVE-2025-27171.json) (`2025-03-11T18:15:35.377`) +- [CVE-2025-27172](CVE-2025/CVE-2025-271xx/CVE-2025-27172.json) (`2025-03-11T17:16:44.420`) +- [CVE-2025-27174](CVE-2025/CVE-2025-271xx/CVE-2025-27174.json) (`2025-03-11T18:15:35.600`) +- [CVE-2025-27175](CVE-2025/CVE-2025-271xx/CVE-2025-27175.json) (`2025-03-11T18:15:35.743`) +- [CVE-2025-27176](CVE-2025/CVE-2025-271xx/CVE-2025-27176.json) (`2025-03-11T18:15:35.897`) +- [CVE-2025-27177](CVE-2025/CVE-2025-271xx/CVE-2025-27177.json) (`2025-03-11T18:15:36.047`) +- [CVE-2025-27178](CVE-2025/CVE-2025-271xx/CVE-2025-27178.json) (`2025-03-11T18:15:36.200`) +- [CVE-2025-27179](CVE-2025/CVE-2025-271xx/CVE-2025-27179.json) (`2025-03-11T18:15:36.353`) +- [CVE-2025-27439](CVE-2025/CVE-2025-274xx/CVE-2025-27439.json) (`2025-03-11T18:15:36.510`) +- [CVE-2025-27440](CVE-2025/CVE-2025-274xx/CVE-2025-27440.json) (`2025-03-11T18:15:36.653`) ### CVEs modified in the last Commit -Recently modified CVEs: `70` +Recently modified CVEs: `42` -- [CVE-2024-13734](CVE-2024/CVE-2024-137xx/CVE-2024-13734.json) (`2025-03-11T15:55:48.603`) -- [CVE-2024-13836](CVE-2024/CVE-2024-138xx/CVE-2024-13836.json) (`2025-03-11T15:15:41.010`) -- [CVE-2024-13862](CVE-2024/CVE-2024-138xx/CVE-2024-13862.json) (`2025-03-11T15:15:41.180`) -- [CVE-2024-13907](CVE-2024/CVE-2024-139xx/CVE-2024-13907.json) (`2025-03-11T16:26:05.363`) -- [CVE-2024-1442](CVE-2024/CVE-2024-14xx/CVE-2024-1442.json) (`2025-03-11T16:56:13.943`) -- [CVE-2024-1725](CVE-2024/CVE-2024-17xx/CVE-2024-1725.json) (`2025-03-11T16:55:54.263`) -- [CVE-2024-1771](CVE-2024/CVE-2024-17xx/CVE-2024-1771.json) (`2025-03-11T16:42:28.580`) -- [CVE-2024-1976](CVE-2024/CVE-2024-19xx/CVE-2024-1976.json) (`2025-03-11T16:47:09.213`) -- [CVE-2024-1986](CVE-2024/CVE-2024-19xx/CVE-2024-1986.json) (`2025-03-11T16:40:10.820`) -- [CVE-2024-1989](CVE-2024/CVE-2024-19xx/CVE-2024-1989.json) (`2025-03-11T16:41:12.650`) -- [CVE-2024-2264](CVE-2024/CVE-2024-22xx/CVE-2024-2264.json) (`2025-03-11T16:54:11.227`) -- [CVE-2024-2265](CVE-2024/CVE-2024-22xx/CVE-2024-2265.json) (`2025-03-11T16:53:59.010`) -- [CVE-2024-2266](CVE-2024/CVE-2024-22xx/CVE-2024-2266.json) (`2025-03-11T16:53:46.840`) -- [CVE-2024-2267](CVE-2024/CVE-2024-22xx/CVE-2024-2267.json) (`2025-03-11T16:53:27.713`) -- [CVE-2024-54139](CVE-2024/CVE-2024-541xx/CVE-2024-54139.json) (`2025-03-11T16:44:20.720`) -- [CVE-2024-56191](CVE-2024/CVE-2024-561xx/CVE-2024-56191.json) (`2025-03-11T16:15:16.743`) -- [CVE-2024-56192](CVE-2024/CVE-2024-561xx/CVE-2024-56192.json) (`2025-03-11T16:15:16.900`) -- [CVE-2024-6261](CVE-2024/CVE-2024-62xx/CVE-2024-6261.json) (`2025-03-11T16:32:04.440`) -- [CVE-2024-9195](CVE-2024/CVE-2024-91xx/CVE-2024-9195.json) (`2025-03-11T15:49:13.197`) -- [CVE-2025-1282](CVE-2025/CVE-2025-12xx/CVE-2025-1282.json) (`2025-03-11T16:08:00.790`) -- [CVE-2025-1450](CVE-2025/CVE-2025-14xx/CVE-2025-1450.json) (`2025-03-11T15:46:05.180`) -- [CVE-2025-1689](CVE-2025/CVE-2025-16xx/CVE-2025-1689.json) (`2025-03-11T16:19:41.870`) -- [CVE-2025-1690](CVE-2025/CVE-2025-16xx/CVE-2025-1690.json) (`2025-03-11T15:59:35.800`) -- [CVE-2025-1717](CVE-2025/CVE-2025-17xx/CVE-2025-1717.json) (`2025-03-11T16:12:42.783`) -- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T15:15:45.820`) +- [CVE-2022-48305](CVE-2022/CVE-2022-483xx/CVE-2022-48305.json) (`2025-03-11T18:15:27.867`) +- [CVE-2023-23472](CVE-2023/CVE-2023-234xx/CVE-2023-23472.json) (`2025-03-11T17:24:19.470`) +- [CVE-2023-23504](CVE-2023/CVE-2023-235xx/CVE-2023-23504.json) (`2025-03-11T18:15:28.040`) +- [CVE-2023-23505](CVE-2023/CVE-2023-235xx/CVE-2023-23505.json) (`2025-03-11T18:15:28.260`) +- [CVE-2023-23506](CVE-2023/CVE-2023-235xx/CVE-2023-23506.json) (`2025-03-11T18:15:28.477`) +- [CVE-2023-23520](CVE-2023/CVE-2023-235xx/CVE-2023-23520.json) (`2025-03-11T18:15:28.667`) +- [CVE-2023-23522](CVE-2023/CVE-2023-235xx/CVE-2023-23522.json) (`2025-03-11T18:15:28.870`) +- [CVE-2023-23531](CVE-2023/CVE-2023-235xx/CVE-2023-23531.json) (`2025-03-11T17:15:47.627`) +- [CVE-2023-2937](CVE-2023/CVE-2023-29xx/CVE-2023-2937.json) (`2025-03-11T18:15:29.073`) +- [CVE-2023-2941](CVE-2023/CVE-2023-29xx/CVE-2023-2941.json) (`2025-03-11T17:15:47.973`) +- [CVE-2023-50945](CVE-2023/CVE-2023-509xx/CVE-2023-50945.json) (`2025-03-11T18:10:30.377`) +- [CVE-2023-50946](CVE-2023/CVE-2023-509xx/CVE-2023-50946.json) (`2025-03-11T18:03:46.630`) +- [CVE-2024-13473](CVE-2024/CVE-2024-134xx/CVE-2024-13473.json) (`2025-03-11T18:51:56.900`) +- [CVE-2024-13481](CVE-2024/CVE-2024-134xx/CVE-2024-13481.json) (`2025-03-11T18:48:06.980`) +- [CVE-2024-2098](CVE-2024/CVE-2024-20xx/CVE-2024-2098.json) (`2025-03-11T17:30:52.803`) +- [CVE-2024-32131](CVE-2024/CVE-2024-321xx/CVE-2024-32131.json) (`2025-03-11T17:41:26.170`) +- [CVE-2024-34807](CVE-2024/CVE-2024-348xx/CVE-2024-34807.json) (`2025-03-11T17:38:49.987`) +- [CVE-2024-37527](CVE-2024/CVE-2024-375xx/CVE-2024-37527.json) (`2025-03-11T18:14:30.137`) +- [CVE-2024-40706](CVE-2024/CVE-2024-407xx/CVE-2024-40706.json) (`2025-03-11T17:58:30.353`) +- [CVE-2024-4160](CVE-2024/CVE-2024-41xx/CVE-2024-4160.json) (`2025-03-11T17:36:27.910`) +- [CVE-2024-52363](CVE-2024/CVE-2024-523xx/CVE-2024-52363.json) (`2025-03-11T17:53:21.153`) +- [CVE-2024-5708](CVE-2024/CVE-2024-57xx/CVE-2024-5708.json) (`2025-03-11T17:28:36.350`) +- [CVE-2025-0587](CVE-2025/CVE-2025-05xx/CVE-2025-0587.json) (`2025-03-11T18:07:22.823`) +- [CVE-2025-26643](CVE-2025/CVE-2025-266xx/CVE-2025-26643.json) (`2025-03-11T17:16:44.040`) +- [CVE-2025-27840](CVE-2025/CVE-2025-278xx/CVE-2025-27840.json) (`2025-03-11T17:16:44.627`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2be756d7183..49a49b1fbb5 100644 --- a/_state.csv +++ b/_state.csv @@ -180468,6 +180468,7 @@ CVE-2021-3778,0,0,31b91296c008a3eb07c28de26839b02372ae57db8322cb05cda0d0fe92b605 CVE-2021-37781,0,0,da6427ce61a17f4f658d7341cdbf89c09f7d811961d49f4485ecf3eb129a3a35,2024-11-21T06:15:53.943000 CVE-2021-37782,0,0,26ac22a8ef8f66e83977206e4c26b192bbbfa58fcbdd221fed769a055f5a3537,2024-11-21T06:15:54.127000 CVE-2021-37786,0,0,35081e9725832544a1fe06ece6dfb5c9e83ed1ff91e625e839c44a9b7f94b16d,2024-11-21T06:15:54.303000 +CVE-2021-37787,1,1,286c9a8d32af9c2db4723c7003e91b3cc065b9d0d3799af71cabb501512fe748,2025-03-11T18:15:25.077000 CVE-2021-37788,0,0,e3b44474508c90b371da55193c54fbfcde615429e75450c9982e1c28919739b9,2024-11-21T06:15:54.480000 CVE-2021-37789,0,0,092bf5e6e5c581ffeb815b716b11b62f6543d608ad8045abb07347488cf20657,2024-11-21T06:15:54.663000 CVE-2021-3779,0,0,dc8a854582fe709662f2c5e7cde57246d871d050374026102f10a2061d24a2e4,2024-11-21T06:22:24.573000 @@ -187108,7 +187109,7 @@ CVE-2021-46836,0,0,ffe86a1084573c3de738ac2e65640b0f0a109ce037301250c3760cd2a0e99 CVE-2021-46837,0,0,16b78c52749680281920a575d58ad992f31851a15fbd363eec21c1342561f262,2024-11-21T06:34:47.440000 CVE-2021-46839,0,0,1d12082e23f3b178e1fbe5eea0582bfb6887e0d9222fd9a0b994763be65ff961,2024-11-21T06:34:47.610000 CVE-2021-46840,0,0,19dfe56ff53be05a9ac3bf4f00003d823102d149a9b380786ab45bf1f3e8b1aa,2024-11-21T06:34:47.753000 -CVE-2021-46841,0,0,e29da59472f6807054d5cdf9cc41b4c177e56cbcdda88b88ca48b898dd88e910,2024-11-21T06:34:47.870000 +CVE-2021-46841,0,1,8566a568baea729f351f652f12938fba1e272861a23154beef47524ec9b3fdce,2025-03-11T18:15:25.263000 CVE-2021-46846,0,0,a017ac962794fd30b2a4a7d7a89374785882694170be4ba6d4db1a841ac7fc20,2024-11-21T06:34:47.993000 CVE-2021-46848,0,0,55745e80e85cd6a62bec167a4c8da4f832ee6c33fc5012602a36cf6f36827684,2024-11-21T06:34:48.140000 CVE-2021-46849,0,0,a97d57b4204bee81571b4ff511b6cf0635636682ed66ca0aaf655b45e96971b9,2023-11-07T03:40:05.343000 @@ -200894,7 +200895,7 @@ CVE-2022-3278,0,0,2a03c4fb2e029c19879154c246280d42c81f60a38278b321f7414f2f11349d CVE-2022-32781,0,0,fb8747797e3245f6065c992f1d4baedae09a41090ca7e9176b96f9c1deb35a37,2024-11-21T07:06:56.783000 CVE-2022-32782,0,0,ebb5b7a170efc6a87dca17082d523d4d5a6aa4105aea3bd34e4329abd4d46d69,2024-11-21T07:06:56.943000 CVE-2022-32783,0,0,a7c05d775d484fe43ec0955f95c6e62abc428cccd0262e5ac234af6e6cd3da54,2024-11-21T07:06:57.057000 -CVE-2022-32784,0,0,2194550e6712741ccd9da973239a11121fdc903f553dec30f8fa9422377a4e78,2024-11-21T07:06:57.173000 +CVE-2022-32784,0,1,38bfa5b11fc1fdae09c4ca40d4766a0e31259d37b2a1e2803de8c6c1f42ee230,2025-03-11T17:15:40.207000 CVE-2022-32785,0,0,ca7402f622222e24f1f90f1fd5fa73d710479216d6555e2588614ade1f2d73e8,2024-11-21T07:06:57.313000 CVE-2022-32786,0,0,7ce63e11a3e7d7acd13783d4ba573434a9defa5b4a39846d86ac68d6852c7387,2024-11-21T07:06:57.447000 CVE-2022-32787,0,0,115db0f5132e6c38e0d47c450aac0e8717fe0f65f9ea9e5cb9586e8b32c8c049,2024-11-21T07:06:57.583000 @@ -200937,7 +200938,7 @@ CVE-2022-32820,0,0,6c860bc532550f1d93ea6f1983614af5f60fdf516efff3873a04e140d543c CVE-2022-32821,0,0,83118a1971cfa421d36d4cac602a151598c1b5c5792fa5714a23c71cb8315451,2024-11-21T07:07:01.387000 CVE-2022-32822,0,0,142686b62858fe6b9c91be585fa5db5b1dde7cad3a6b8c832b916e74442449c3,2023-11-07T03:48:13.093000 CVE-2022-32823,0,0,ed1e2de7d0cc5d33ab8b1f9eb08c678345549c8c85199d3a47f914feb4507619,2024-11-21T07:07:01.537000 -CVE-2022-32824,0,0,154c60c28de368ce5756272a225839a79177a05237b5b835b54e9e3d006ecc81,2024-11-21T07:07:01.700000 +CVE-2022-32824,0,1,c90ef56a15044bfede1b9774b2d4bddd571541713dab83c9bae1b6c9a8379221,2025-03-11T17:15:40.450000 CVE-2022-32825,0,0,d72266d9aeed5f9949a9eac2c9579f5cb115bcb2a58ff73443dc72be6b370a57,2024-11-21T07:07:01.833000 CVE-2022-32826,0,0,68f19c981e707afba2c4a9d33e2ea1d55b8f62a24b03f3a563ca2ac295d74f5d,2024-11-21T07:07:01.980000 CVE-2022-32827,0,0,54f41904e7cad4ffefcfde33f9b1db7ec0bc14c5ddea1498bdbba50a303e733a,2024-11-21T07:07:02.137000 @@ -200950,7 +200951,7 @@ CVE-2022-32832,0,0,29f98a77f60fadeb0c8dc8830ec961c6e7b2725ae344b838e7476b9ea9590 CVE-2022-32833,0,0,7dbf03198fc751bcfb93a1d693bbbc066b81facb423ce6274a156ee2eade460e,2024-11-21T07:07:03.040000 CVE-2022-32834,0,0,4ed216909cdb81f972f3ec9ae88b807ecf46f0c19e17e04fd50405a7933f1248,2024-11-21T07:07:03.177000 CVE-2022-32835,0,0,c4e4790392a83d528102c4e97d47eb8baa461ebd360d09bf0c699cd3dc049614,2024-11-21T07:07:03.343000 -CVE-2022-32836,0,0,615107ff5e8cab3a4396f492d1724fff77415e17e3ddeb89b8956af6118e00f8,2024-11-21T07:07:03.480000 +CVE-2022-32836,0,1,4038a11d71076a38c1db2ebf2f93eeee122b3bb736cd7405e785b9e725262952,2025-03-11T17:15:40.753000 CVE-2022-32837,0,0,ac2894e588908ed9b2ef5c803bb4a9ade4b8fd568252f9164dd9e4b092cda425,2024-11-21T07:07:03.603000 CVE-2022-32838,0,0,42792efa7dd9116dc95df14c53517a04cb27324f4ef5ba8107e9078ed7b057ec,2024-11-21T07:07:03.763000 CVE-2022-32839,0,0,8c05f3b7baf108cef14518d22fe60827a152dcb9a2857bee360038677a2ec2ae,2024-11-21T07:07:03.927000 @@ -200971,7 +200972,7 @@ CVE-2022-32851,0,0,8ca1f7313d6a9b376e9fdf842499bc367aaee4446c83244eace83f904081a CVE-2022-32852,0,0,19b95540a6848b0fd2b108f5621a0a2e208b6247dba048456b5b11b4a42c8056,2024-11-21T07:07:05.707000 CVE-2022-32853,0,0,3508dffa02a784c817c8d88c9b14ada2f80f6bd62efc0ef84023bff97abf94c4,2024-11-21T07:07:05.840000 CVE-2022-32854,0,0,1c3f730ffdc3cde649426f84b1da7e80854d9d162ff415eb1ae9d74a0e3d35c9,2024-11-21T07:07:05.983000 -CVE-2022-32855,0,0,07f282d20630c7ee4b9a3446e7e65d892c299c7807fc2d67b46725b82cf21b48,2024-11-21T07:07:06.130000 +CVE-2022-32855,0,1,f090aed84ae5cfcd9c3ba4d721159fadc031f43174f3ada294becf87efb0d939,2025-03-11T17:15:40.980000 CVE-2022-32856,0,0,821e090956272230cefadc97cc365d3a398380a782f5f422ed82a0d96dabaebd,2023-11-07T03:48:13.767000 CVE-2022-32857,0,0,27e62f84a19b6b544543242111345192d39ef025757516739cfd970f339b156c,2024-11-21T07:07:06.277000 CVE-2022-32858,0,0,b1d1127b02ead7febeacccd17f986ce2e64720fdb06babe74eb66c023d6487f3,2024-11-21T07:07:06.440000 @@ -201019,13 +201020,13 @@ CVE-2022-32897,0,0,65b569b40094135fab0a0df9bc0002c37e324af1cb43918ea27c06ef6acc9 CVE-2022-32898,0,0,5f0f5773dc11fe30e60f88bbfd29f522e384f927cc80e41df2f0c9492e4051b4,2024-11-21T07:07:11.547000 CVE-2022-32899,0,0,585cb3b53a4bdc00a7fe20a3f96ec5c17097528d051c7d7fc703c2d2849adef5,2024-11-21T07:07:11.667000 CVE-2022-3290,0,0,eca42a9ab817fd94c97ebf3ed002419415576317c777233159eea3a4717e9c1f,2024-11-21T07:19:13.683000 -CVE-2022-32900,0,0,9e8b43c047ca393d77b3121cfda5a18c64ba88820017b6972bc16f54504a1617,2024-11-21T07:07:11.800000 +CVE-2022-32900,0,1,b533e5292fc0aea802d5f07a0cc32e4e83eb4a514cc10ff981f0fc9f0ddd51a7,2025-03-11T18:15:25.553000 CVE-2022-32901,0,0,a8c64422397e9260c843053686e452e4fb7c325e0155f9f8bff15df16a9d0c9c,2023-11-07T03:48:15.467000 -CVE-2022-32902,0,0,466cf1910aacd5f205ee2308363a43e7f641f412c22d629637a7dda012cb6de6,2024-11-21T07:07:11.933000 +CVE-2022-32902,0,1,997ff1def40d5d892195ba923a85df6538ba8321a6f9a52fffd51a1213a79154,2025-03-11T18:15:25.760000 CVE-2022-32903,0,0,804ca1476959ae3db7ed5078dd2dadd66a54a5bd5fea97cd24dda30b2543145c,2024-11-21T07:07:12.050000 CVE-2022-32904,0,0,e8b871ce469c8e2a1edc3d87db0c66cd2d567c2d370c928afa149ddff0c01639,2024-11-21T07:07:12.197000 CVE-2022-32905,0,0,404bdeaad7c01e9f528b280f4ffbda97d14788f26e6910c166cd3c4800e69f7c,2024-11-21T07:07:12.323000 -CVE-2022-32906,0,0,71009ba9ac8d79a721abed8a653f3dca0198fb5e7f7f0677951048057bdff53e,2024-11-21T07:07:12.457000 +CVE-2022-32906,0,1,f0644b96ae5b854ebf183808e401cd5ffe158df48af6cbea4aae2b492d222cc0,2025-03-11T18:15:25.953000 CVE-2022-32907,0,0,dce2c0f90a2ae8c1196ec6ca35956b44974bcfda1dc3ed226e240de7cb0d03f0,2024-11-21T07:07:12.577000 CVE-2022-32908,0,0,c9eaefe196ec6c2f46e30e179de3d3fbe36d80ed78e1f67a3640aeae203da157,2024-11-21T07:07:12.710000 CVE-2022-32909,0,0,ea5e099b20184a888d8b785d0a2837e460a5ea301277d772fe5767c8d66066de,2024-11-21T07:07:12.887000 @@ -201071,7 +201072,7 @@ CVE-2022-32945,0,0,54ad94c1b676e46907da926307a45db5820a12ac2f2fac3cb565d3caa8b9f CVE-2022-32946,0,0,098d9b64d706b903b082642fd67e744bb327d935ca9b2927b077aeb99721ca12,2024-11-21T07:07:17.527000 CVE-2022-32947,0,0,a5c5ad6833927dbbfe280a4483c6024d5ac18fa19f8d7d1ad7b054400b312fa6,2024-11-21T07:07:17.653000 CVE-2022-32948,0,0,7d29ae5b3f1852da51150f565ee913d6255f692bf7d40247b2c0c94a03f70032,2024-11-21T07:07:17.793000 -CVE-2022-32949,0,0,d31efdcff067936ed24b790f9f6e5f6d5e38a739e1762523fbeeb4b505d58177,2024-11-21T07:07:17.937000 +CVE-2022-32949,0,1,8a18e854dd4419770ea9738a7c7ab79b656ef4ce5018010360921bdafac682e6,2025-03-11T18:15:26.120000 CVE-2022-3295,0,0,b97e1ae160e5e6c4d12e7c64825d054c28a200bb0bc5c2fb1af1a735e1cd9d24,2024-11-21T07:19:14.330000 CVE-2022-32951,0,0,b96d61791b8207aaf07580a98b54dcd97a93e82ecebe71b19053d4f65d07fce8,2023-11-07T03:48:16.567000 CVE-2022-32952,0,0,4c65f44edddbaa0ec60369afda8c5dbb5ddac1da0a1d1cb299bd11c8899ef8ac,2023-11-07T03:48:16.603000 @@ -202493,7 +202494,7 @@ CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749 CVE-2022-34908,0,0,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000 CVE-2022-34909,0,0,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000 CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000 -CVE-2022-34910,0,1,60355a0db03afcd899eedab219757e24e71bc4b6bb17aee00642140161ac1181,2025-03-11T16:15:12.233000 +CVE-2022-34910,0,0,60355a0db03afcd899eedab219757e24e71bc4b6bb17aee00642140161ac1181,2025-03-11T16:15:12.233000 CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000 CVE-2022-34912,0,0,200b319614bdd4fe3c1f5384e95db571df01480151ac89135c51127ae36b8681,2024-11-21T07:10:25.360000 CVE-2022-34913,0,0,62ab2c4e006489b07b4436975ef0e656f018df27ce4430641f274dba2d9aa2ea,2024-11-21T07:10:25.510000 @@ -211438,7 +211439,7 @@ CVE-2022-46700,0,0,36797f64e657de5395ad1216e7e3556e8f934cf529bfb10adaccfeca2d42a CVE-2022-46701,0,0,bc01da063681d8e153c6af9d916b0a0c6c163c7cb1cf60c541c7765beeb0c569,2024-11-21T07:30:56.397000 CVE-2022-46702,0,0,715f8ef202458fce1a4ee114ac6507bab6110c673777b7b272b5e7ba8bca4c18,2024-11-21T07:30:56.543000 CVE-2022-46703,0,0,6e7d646c387dfe63a92526293a779ad9233e1eb1081be5cd544a1920d87ba5c5,2025-02-11T18:15:20.717000 -CVE-2022-46704,0,1,94925b0e12166f5e30e8d5e3fac54f85129786a4fae17c6f579976226430665c,2025-03-11T15:15:36.577000 +CVE-2022-46704,0,0,94925b0e12166f5e30e8d5e3fac54f85129786a4fae17c6f579976226430665c,2025-03-11T15:15:36.577000 CVE-2022-46705,0,0,04fb95df26acfe46c0fb0f021e7c2af393d1ae9c3ce5f44bb0a0f4a892bba5dc,2024-11-21T07:30:56.947000 CVE-2022-46706,0,0,7e26910e7d25410ca2efadb873737d22cd7e3e3675aa7329c79a0b0d6669f2e0,2024-11-21T07:30:57.100000 CVE-2022-46707,0,0,0ee54ee776499b11d97e6d033dd279ca45d4cd2d256c6e53c9fa48ebcf0fd335,2023-11-07T03:55:50.110000 @@ -212381,7 +212382,7 @@ CVE-2022-48226,0,0,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103b CVE-2022-48227,0,0,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000 CVE-2022-48228,0,0,e450ba11de27b02775ab6aaff3059b429ddbf2bdeda640fed595f3d8a8f6a0f9,2025-02-14T17:15:12.873000 CVE-2022-4823,0,0,e7fc5fb9db54eb08d7bdb32316cd03ccc89eddab098ff51ef8ef039a2942405f,2024-11-21T07:36:00.993000 -CVE-2022-48230,0,0,e6db329d7865ba3b22f42e4c81ac2be3c151cb8eaf5834575e98ae1fd4a66d36,2024-11-21T07:33:00.437000 +CVE-2022-48230,0,1,db6b973d4b312f6c327bc1543817ecfff14cb94e561b6109baf02bef91214957,2025-03-11T18:15:26.307000 CVE-2022-48231,0,0,26f128061ebcc525a2f8b96097ae9bb9c0299076a1ca7053c51862c027a80a26,2025-01-28T22:15:13.080000 CVE-2022-48232,0,0,67564556f129ea871f689b82c62a66bff3825eabc8ad9edabdc5a5da09260841,2025-01-28T22:15:13.257000 CVE-2022-48233,0,0,e1aecb4f40e9b3951761a4c223d9d656185383a8fcc0e2037265894fb50a8137,2025-01-28T22:15:13.413000 @@ -212407,22 +212408,22 @@ CVE-2022-48250,0,0,57c4e2446f9c884baecc212717f599ba9cb23b07216eae905c88d4442b6ec CVE-2022-48251,0,0,8c71538d3404e9a1a3a4cd540197959121e289beafc0cb1a9c886f3e624f08da,2024-11-21T07:33:02.947000 CVE-2022-48252,0,0,194dbe0e436336a7bdafcbc5c839c752d4a600d25c08f75a4322184473044b50,2024-11-21T07:33:03.123000 CVE-2022-48253,0,0,1e4b796ce980fd2d3ea2e1e61412d6274998adb73a4c43c69235da32887f01a1,2024-11-21T07:33:03.267000 -CVE-2022-48254,0,0,46b1d008aee967227ed471309b503736bcbda6145114bf4e7f76691ade968203,2024-11-21T07:33:03.410000 -CVE-2022-48255,0,0,7446e48f38630503c8346af689a1088c8f993314ff230394ca6ca385018bd498,2024-11-21T07:33:03.510000 +CVE-2022-48254,0,1,1a2c5d52820a51676767d3e2f8e954f3eeeafc2607cd06f188bcc48f2b37bd02,2025-03-11T18:15:26.537000 +CVE-2022-48255,0,1,6dc9ef3e1acb6c726b54935f63ba3ef89fd038259d7b22998a1b9e8250cf93a6,2025-03-11T18:15:26.723000 CVE-2022-48256,0,0,e66e3d3d9272a7a7b9af99e7995c5eae3faf7daa1d04d3e78a5a696be9185d74,2024-11-21T07:33:03.627000 CVE-2022-48257,0,0,1d0adccb38a820ef5ab3180f4bb77298be79ec92c88a7e7862f77cca95e7d992,2024-11-21T07:33:03.773000 CVE-2022-48258,0,0,6e71b59c34773c2cf6cb0444f3de6a77a98976c179ee1175047df746c48baf08,2024-11-21T07:33:04.027000 -CVE-2022-48259,0,0,56e0c666f4806ac7c6a30632c99834a8b2adc01ace8cca08353e380e89696532,2024-11-21T07:33:04.167000 +CVE-2022-48259,0,1,18c8b82f760ef858054952e5aca9ddab42f88edd5ea8940af8815ac3820cb49a,2025-03-11T18:15:26.907000 CVE-2022-4826,0,0,0526fb6180eb94a2a79a4556c30c8945774426a498c24da3d469e30881fc2ec3,2024-11-21T07:36:01.353000 -CVE-2022-48260,0,0,b971ba29c5833db5bfebacbcc971d789cdb0f5b1242a63f884b148474d989762,2024-11-21T07:33:04.273000 -CVE-2022-48261,0,0,564efee3c30621f16dbee714400f073ed8c159c77e274f808648456a4899709d,2024-11-21T07:33:04.387000 +CVE-2022-48260,0,1,e7e60af9c858f5b5288b0031686d03e5e613b16cb37780d86f8482f3a30603dc,2025-03-11T18:15:27.073000 +CVE-2022-48261,0,1,8fec913aab803791099630bb3b4add731b2952c5677136c8ab14d8481622c16b,2025-03-11T18:15:27.267000 CVE-2022-4827,0,0,95bbafc4819182c39fedfb5540a6f96a8876fa0ac713a3f4bb759af67856e443,2024-11-21T07:36:01.460000 CVE-2022-48279,0,0,394a4cbaf8fbdce41d3050a1e26a58576ff47efebe84a5d9ad6373aca9d9d413,2024-11-21T07:33:04.490000 CVE-2022-4828,0,0,235f187e2b91cfcd70cdeacb644cab1113cdec289fa0dbdee23237ca20e95e63,2024-11-21T07:36:01.580000 CVE-2022-48281,0,0,921437fb5b4ca63fdc6056e8918de8f66577a88cc04b59d1f2bfa89e0ac19104,2024-11-21T07:33:04.657000 CVE-2022-48282,0,0,faac8c954d78b5ceb7c5ce11efc8ecb3c4678623d448b6402cf0eab59411b9fa,2024-11-21T07:33:04.807000 -CVE-2022-48283,0,0,08761104760541fdcead6e8802b06a4bdbf248f7ed720082f26936b401e635a0,2024-11-21T07:33:04.950000 -CVE-2022-48284,0,0,15cf2cd812eb4b404ba4758da63cf2f21d94bfc819ae5d895fb585fb9bfb2830,2024-11-21T07:33:05.080000 +CVE-2022-48283,0,1,182b0c7b39d6bfcfce2462a72a2584378b317a2b7a0366549b6291e2e1e78698,2025-03-11T18:15:27.463000 +CVE-2022-48284,0,1,31bd668b37b12ed3d37f65ca7ce4485a4e4c65e02cd0381ee305aa240e1512af,2025-03-11T18:15:27.670000 CVE-2022-48285,0,0,c08e282935699f33b318a1a543fc17db6162a164720fbafa0d53d7a01476fd31,2024-11-21T07:33:05.220000 CVE-2022-48286,0,0,77447f216a75ff09875f502d3b5b8f406aecac089ebe16a6b1b5f93ee2e96a3d,2024-11-21T07:33:05.470000 CVE-2022-48287,0,0,ffb9477554bfe338b59efc3476dab3f4d74daacb476ffb0f751ed5564e9297b5,2024-11-21T07:33:05.610000 @@ -212444,7 +212445,7 @@ CVE-2022-48300,0,0,98485bba285f4598f348c2dbb5fa139372ba072d5d525c20558ee1a360ab7 CVE-2022-48301,0,0,628ed7feb5c4e2570855401f6c9ee9e39dfa1b7d1102fcdebc9214a94b3c13ed,2024-11-21T07:33:07.320000 CVE-2022-48302,0,0,26bedf7c5d0ba979774f190ceb5fb9d2a5a973370c9df879e6c9b694365234d2,2024-11-21T07:33:07.433000 CVE-2022-48303,0,0,23fa42a26e031df9d7a365b89a32378ccfd1e8e4f3e37623749555f9ccd22acb,2024-11-21T07:33:07.547000 -CVE-2022-48305,0,0,61adbbd1f90979f7f64b4545ce4cc3432482d35bd6851492a35b242d445de197,2024-11-21T07:33:07.710000 +CVE-2022-48305,0,1,82b72b33de095e268c209f9adba2dd712c757d4a50881d06a01057b452c88bc5,2025-03-11T18:15:27.867000 CVE-2022-48306,0,0,581b3f7c6835b19483e20918c619e2cba46939dec937a9438624500a1e126768,2024-11-21T07:33:07.820000 CVE-2022-48307,0,0,1ab0e87cdd229f5260ebf07c4929c512268971855b184c130be6112c737aaa70,2024-11-21T07:33:07.950000 CVE-2022-48308,0,0,d82ea45e2ac099dc3c3ecf13551c9dc3ababac68114d8f5415e8c3ff26f9133b,2024-11-21T07:33:08.070000 @@ -218290,7 +218291,7 @@ CVE-2023-22742,0,0,d90bdbc84b8393173d0a0ccae26c3defed698996cfdfebb29c26d789eb4f6 CVE-2023-22743,0,0,2ff8322509bb13e890c5c0eb2a499728af4f4057e9b2317582e809625e1cd652,2024-11-21T07:45:20.403000 CVE-2023-22745,0,0,b717510f294e275cbb5de0d9417c53f21cfa8afdf89bcd8b1e640db8d8040e24,2024-11-21T07:45:20.543000 CVE-2023-22746,0,0,fcb6bccbce47be6c3814548b6771799369259b832db8e6ca53b330061fc2444b,2024-11-21T07:45:20.677000 -CVE-2023-22747,0,1,7d14c0f9c36b58e3f7dfbf09d6476a3ca86b2daa88cae61d13fee474b4a1b805,2025-03-11T15:15:37.513000 +CVE-2023-22747,0,0,7d14c0f9c36b58e3f7dfbf09d6476a3ca86b2daa88cae61d13fee474b4a1b805,2025-03-11T15:15:37.513000 CVE-2023-22748,0,0,f1a9d61004b5b3f89b84381c153273d1571ddec3b3c17748d7413ef56a2689d6,2025-03-07T21:15:13.447000 CVE-2023-22749,0,0,9d960d5703beed2bf0592f7ac0dbb480b4ded3a968ccb41c8362a54de4de5abb,2025-03-07T21:15:13.610000 CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000 @@ -218311,8 +218312,8 @@ CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c2003 CVE-2023-22763,0,0,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000 CVE-2023-22764,0,0,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000 CVE-2023-22765,0,0,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000 -CVE-2023-22766,0,1,e790961e01345060a9d9bc6c1c754a0a20620ba6c764ed8bc78f902e32979683,2025-03-11T15:15:37.670000 -CVE-2023-22767,0,1,863d748c02dc86a3b4c2478bfa511c20d4f93f399f57c1bb4b03baf546914842,2025-03-11T15:15:37.823000 +CVE-2023-22766,0,0,e790961e01345060a9d9bc6c1c754a0a20620ba6c764ed8bc78f902e32979683,2025-03-11T15:15:37.670000 +CVE-2023-22767,0,0,863d748c02dc86a3b4c2478bfa511c20d4f93f399f57c1bb4b03baf546914842,2025-03-11T15:15:37.823000 CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000 CVE-2023-22769,0,0,6ae8ba3e8b583057bd2353e73c1aac8e8f3a88643b244eb3a95e62d9b9fffa6e,2024-11-21T07:45:23.453000 CVE-2023-2277,0,0,29cdfaaa84fe50e25679d6125383565035f51b2f574d33150a7ed90888999f0f,2024-11-21T07:58:17.637000 @@ -218754,7 +218755,7 @@ CVE-2023-23468,0,0,dcf3783a6e46e2a0eeb9074ee47ed2d5c0a9c74ff1896870c21e1e0585b30 CVE-2023-23469,0,0,69288f0f15e2c2829cc139ea58aa96679edf14002fe3924391288bf0361cb528,2024-11-21T07:46:15.757000 CVE-2023-2347,0,0,1b510b70d5055256be9b7fcc7958f0e58a0f64f1d305c1e7bd8117d463d82014,2024-11-21T07:58:25.880000 CVE-2023-23470,0,0,e89627e3a10c4f9719807de277c66eb447b3d442868ee74ef96be9c0297eba6a,2025-01-29T17:15:22.900000 -CVE-2023-23472,0,0,5103efe9fcba254d02277196dd09763d4fa56d8c7608208ce71a8e52bf44288f,2024-12-11T13:15:05.150000 +CVE-2023-23472,0,1,531ca03ac735c3302fed9ea8607023f75913d943a4fd197690f36d2f1774bd99,2025-03-11T17:24:19.470000 CVE-2023-23473,0,0,6e568225fe37b401d88506d3abb6e7be1d1fd3f5dd589c1df7bd297f7599cab4,2024-11-21T07:46:16.040000 CVE-2023-23474,0,0,1cf29c71593c18b3a889ecdc7a5efc7ca211ccecb748f72e349e9935d02e8d55,2025-01-07T19:14:04.893000 CVE-2023-23475,0,0,3a68aebf09e3ed863e58894bdc66525870538242756e587e97f59ebf17bf6357,2024-11-21T07:46:16.307000 @@ -218783,24 +218784,24 @@ CVE-2023-23500,0,0,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccd CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000 CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000 CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000 -CVE-2023-23504,0,0,16f525c9fb31ae2392fa3352f00ddf27c59d4f9f21280300ce93bd30558fc946,2024-11-21T07:46:19.080000 -CVE-2023-23505,0,0,072758557cc09200da79298cbbfd017afc9b7f6e37d9447137a53abfd05f5114,2024-11-21T07:46:19.213000 -CVE-2023-23506,0,0,bc279d4adf6dfb4944d9d2fe762b5ab8cc5aebf1c3e0f81c91b173a23f951512,2024-11-21T07:46:19.337000 -CVE-2023-23507,0,1,8ff1328a51733f51927312db00477f36b9441cfc094699a00c8979dbf02afd25,2025-03-11T16:15:12.787000 -CVE-2023-23508,0,1,3e55147c7662204c8744adf9587c1c3968a615ab80d0092919319a20d650a836,2025-03-11T16:15:12.953000 +CVE-2023-23504,0,1,95fff2d5f35b6dadba484a9ec390cddce06b043f525787507952648c96f8403c,2025-03-11T18:15:28.040000 +CVE-2023-23505,0,1,e86cccaead6c06fc995cc44e917c3f2120b65e58f47c4ca507bd0d18620f3245,2025-03-11T18:15:28.260000 +CVE-2023-23506,0,1,ad7cf9b75576054701c3393ea5cdce7c273e0fe357d120083f3f1642f3765656,2025-03-11T18:15:28.477000 +CVE-2023-23507,0,0,8ff1328a51733f51927312db00477f36b9441cfc094699a00c8979dbf02afd25,2025-03-11T16:15:12.787000 +CVE-2023-23508,0,0,3e55147c7662204c8744adf9587c1c3968a615ab80d0092919319a20d650a836,2025-03-11T16:15:12.953000 CVE-2023-2351,0,0,3a82f210ae18463b28fb54c6272265e375b61557202f70072719d8e76667f500,2024-11-21T07:58:26.390000 -CVE-2023-23510,0,1,aab24986700db7f904d33c17be3e699a289ff3e482876ffab3ec417a71cccf18,2025-03-11T16:15:13.123000 +CVE-2023-23510,0,0,aab24986700db7f904d33c17be3e699a289ff3e482876ffab3ec417a71cccf18,2025-03-11T16:15:13.123000 CVE-2023-23511,0,0,79be774f2aec712d95f9d4909cdb05723f704493f639854978b6713057ca5803,2025-03-11T04:15:20.983000 CVE-2023-23512,0,0,4e2ff213db2e8b1c5edf97f8499254120d2881ff4802f92e3a5a52458f10572f,2024-11-21T07:46:19.900000 CVE-2023-23513,0,0,09bcbdc6eb54ad0ea39978f5767d4a0e9af96b65c2ea1f28367e4b3aae576c5f,2024-11-21T07:46:20.017000 -CVE-2023-23514,0,1,245758ee40226c775ff17d539a5960b47000250d9f1ab16e116ce1823a48a751,2025-03-11T16:15:13.297000 +CVE-2023-23514,0,0,245758ee40226c775ff17d539a5960b47000250d9f1ab16e116ce1823a48a751,2025-03-11T16:15:13.297000 CVE-2023-23516,0,0,642fb93fd27c63e523bbbbd8ec697d800beb99b36c421b23b39ea2a2701fa5db,2024-12-05T18:15:20.327000 -CVE-2023-23517,0,1,6c2b9556abb97d193dc34c362430f543f121bd5621c2f2756cdfc728f6364d91,2025-03-11T16:15:13.490000 -CVE-2023-23518,0,1,28b7fec879e0537bd5e7400ae17c41c3763bde40e21714e0d41218421b7ad8c2,2025-03-11T16:15:13.680000 -CVE-2023-23519,0,1,52b97f532c90beedd6a706dff1548312c12dd9772d21d5bcca8f5742bd2c8a7e,2025-03-11T16:15:13.880000 +CVE-2023-23517,0,0,6c2b9556abb97d193dc34c362430f543f121bd5621c2f2756cdfc728f6364d91,2025-03-11T16:15:13.490000 +CVE-2023-23518,0,0,28b7fec879e0537bd5e7400ae17c41c3763bde40e21714e0d41218421b7ad8c2,2025-03-11T16:15:13.680000 +CVE-2023-23519,0,0,52b97f532c90beedd6a706dff1548312c12dd9772d21d5bcca8f5742bd2c8a7e,2025-03-11T16:15:13.880000 CVE-2023-2352,0,0,f2b57b0bbfa316225559cd4e96ca98c890ce4e800269f7fdc72b0f4686c5a062,2024-11-21T07:58:26.520000 -CVE-2023-23520,0,0,8777bc89c4d7c677913b2ac7598bb4c26e2ad1a798c78f0b2cfea451cbf6f5c4,2024-11-21T07:46:20.787000 -CVE-2023-23522,0,0,bbd0640742c9d2795d413f296659352eddbb371a6c698d12a46f59e02e337e80,2024-11-21T07:46:20.903000 +CVE-2023-23520,0,1,efd133e62f690dd05db2066eb6ab55bdbbf771dc3d1cad458cd0761878b2f279,2025-03-11T18:15:28.667000 +CVE-2023-23522,0,1,d634ece2f89debf226d2138009a3821f0730a25469953c3100b0f8a72e4b00df,2025-03-11T18:15:28.870000 CVE-2023-23523,0,0,f269553aabe3b769922b7fe99db9d02491b24fccbae44f488a700e2b7bf839e4,2025-01-29T16:15:35.643000 CVE-2023-23524,0,0,6f3249006836706150b27662ff3f3a3771e72590d4b311d265b914ea55918059,2024-11-21T07:46:21.153000 CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa44715ed,2025-01-29T16:15:35.870000 @@ -218810,7 +218811,7 @@ CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595 CVE-2023-23529,0,0,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000 CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000 CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000 -CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000 +CVE-2023-23531,0,1,b213224bb465483065002ebf5d97dd285d18ab51c735e49d5b4003cf94d56a89,2025-03-11T17:15:47.627000 CVE-2023-23532,0,0,ddecd4a245a478eba8705477397f953a27552e4b5d464f2a095fb4267bd4cd82,2025-01-29T16:15:36.457000 CVE-2023-23533,0,0,bd0b9029b458bcf9565adcabbc400c36cc12a55ba52b3e33f2be71d8d8d23fc7,2025-01-29T16:15:36.650000 CVE-2023-23534,0,0,c71dac694cc8a82b9295a6497b499ea58c063ada52cc8f7baac47a0bbb4434ef,2025-01-29T16:15:36.823000 @@ -221008,10 +221009,10 @@ CVE-2023-26099,0,0,daef45a4a5079e3664281482bb5aed531859143d74f266889fdf4d70272bd CVE-2023-2610,0,0,09b4faf2015566c48d195c0564ba2eaa8f67a730801f03b898ad9fb8b6160753,2024-11-29T12:15:05.820000 CVE-2023-26100,0,0,d594c19d8868f03c4d54d9d2f43f87203b1428ae199cf215eeef544fc3b5c47d,2025-02-05T20:15:36.030000 CVE-2023-26101,0,0,b5f97f93f6104ea87af9962b64069465926b1f82322929f11609f64ca3ccf2cb,2025-02-05T15:15:16.947000 -CVE-2023-26102,0,1,a15bc38ea5f1545e6e11ae97b9beb00ed2d2296dcc09cd9f1128815226a4b150,2025-03-11T16:15:14.070000 -CVE-2023-26103,0,1,0acc07eca1658e88ca7d4629323a059a43e754af5e7d3cb0c3217cecf5a309a5,2025-03-11T16:15:14.263000 -CVE-2023-26104,0,1,f549d5c4e0996a925d324892cf898b9b17daabd8f84a8d740d52d2f22e993662,2025-03-11T16:15:14.450000 -CVE-2023-26105,0,1,0b83c6910cae3fa98c1561674557544349c02ac2c7da310412fc9c3bbbd91854,2025-03-11T15:15:37.983000 +CVE-2023-26102,0,0,a15bc38ea5f1545e6e11ae97b9beb00ed2d2296dcc09cd9f1128815226a4b150,2025-03-11T16:15:14.070000 +CVE-2023-26103,0,0,0acc07eca1658e88ca7d4629323a059a43e754af5e7d3cb0c3217cecf5a309a5,2025-03-11T16:15:14.263000 +CVE-2023-26104,0,0,f549d5c4e0996a925d324892cf898b9b17daabd8f84a8d740d52d2f22e993662,2025-03-11T16:15:14.450000 +CVE-2023-26105,0,0,0b83c6910cae3fa98c1561674557544349c02ac2c7da310412fc9c3bbbd91854,2025-03-11T15:15:37.983000 CVE-2023-26106,0,0,5aec010201382e2cd4ddda8f70104650c3355d4509e17262f2080cc54e5810ea,2025-03-05T21:15:17.863000 CVE-2023-26107,0,0,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000 CVE-2023-26108,0,0,ab0b203fc897e6f3e27361a11daf42748026f640c5776f715c7a515e500151be,2024-11-21T07:50:47.483000 @@ -221920,7 +221921,7 @@ CVE-2023-27369,0,0,53ea492f4014f9a96dc283724b1330cd227c3403ebab1a750f9c76feb0488 CVE-2023-2737,0,0,2d58eab6403b8ec835f691292ee157b11d2132c361cab72cff399928ed237c60,2024-11-21T07:59:11.863000 CVE-2023-27370,0,0,2caa0c83c4c453d1353c995ebb950b7f0e81ef2851f9f0bf8ca09ec66f7d3849,2025-01-03T17:01:01.870000 CVE-2023-27371,0,0,2a3f97a58295ebda42a0c6cc169c64eef1379055af6286654e30c6197b78c7c5,2024-11-21T07:52:46.460000 -CVE-2023-27372,0,1,2338d0880859c2218f2eeccb7298350babcb66e0d24999462c3506f048b6bd99,2025-03-11T15:15:38.177000 +CVE-2023-27372,0,0,2338d0880859c2218f2eeccb7298350babcb66e0d24999462c3506f048b6bd99,2025-03-11T15:15:38.177000 CVE-2023-27373,0,0,a45362998f49ad07ca276ad8910dd4e52f099f28ea8bb38aacf61103367c86d7,2025-03-07T20:15:36.693000 CVE-2023-27375,0,0,93b29bc90b77f869b8c8cecb54fb2193dda487043c0e4379efa49cf6c5b6689a,2024-11-21T07:52:46.940000 CVE-2023-27376,0,0,cb9f804b554841faa04bce12934a68c4432bf8ecf78215538f55219d32109908,2024-11-21T07:52:47.067000 @@ -223757,7 +223758,7 @@ CVE-2023-29366,0,0,3efed68d33a4ae1a17338ba261e03adef17a82981a155ca0db57a1c6401f5 CVE-2023-29367,0,0,23c40728404323e849f595204253bd7a6fd6f5ea5e9c120bf0de4f71469c062e,2024-11-21T07:56:56.630000 CVE-2023-29368,0,0,a0ec5af6df86fc2c7d9673164b6dd99f180a8cff7ef089b3c457e63919e51b90,2024-11-21T07:56:56.740000 CVE-2023-29369,0,0,bca25ce565153219d1f64d4ddee39f94d6e725abf989120af706b83272f6994c,2024-11-21T07:56:56.870000 -CVE-2023-2937,0,0,6f7e4f154f7ff10d2a9c91933272a27da8a14d5b93cfed9f30b3356498bbe32a,2024-11-21T07:59:36.307000 +CVE-2023-2937,0,1,e72269418f373c17997c4da73690e403c1b65ec44aaa6a03289eba474eb30b23,2025-03-11T18:15:29.073000 CVE-2023-29370,0,0,3b5427bcb35bbac847bac96cb577c102996a23e0a01985a30a9a44e9cff3aa3e,2024-11-21T07:56:56.980000 CVE-2023-29371,0,0,191e519a42a5df41f1023bf9ae4cf5523dea74950c0461050b0eb7e4427adce8,2024-11-21T07:56:57.097000 CVE-2023-29372,0,0,8115b339cca23a604fd3b3fa184a2dcefdc174f8cc9dcd53bc8c9ebc153d7263,2024-11-21T07:56:57.223000 @@ -223788,7 +223789,7 @@ CVE-2023-29406,0,0,c5789d2e959e523926cdc275b7c420fcebd2c815a1c60589f016abef349d1 CVE-2023-29407,0,0,afbe958ceb6ef1bfef55f25205920371f57028aec0047b7ca6af5236975d8616,2024-11-21T07:57:00.037000 CVE-2023-29408,0,0,7adb46b8129e62b32a17951c7613fde184b70df9f7fde6d739d2494a044c66d9,2024-11-21T07:57:00.170000 CVE-2023-29409,0,0,b4f1eadea07ea6094e7ccc3e8f233691fe9723a121986e6678048658eafd3275,2024-11-21T07:57:00.287000 -CVE-2023-2941,0,0,c7a8fad2698ec1eff23894ab5fc77914c5ab941d5acc9c8bcbdc317abdd0a19c,2024-11-21T07:59:36.823000 +CVE-2023-2941,0,1,d7a5b74e5d5764dcd1d9d84ff040b5582616cf171c093a9ffe8f3e5eb38a37ac,2025-03-11T17:15:47.973000 CVE-2023-29410,0,0,7e880b2bafab96f91886055a2db94d1042904f9834a7dbd54547afe09dfd25f4,2024-11-21T07:57:00.410000 CVE-2023-29411,0,0,b0b5dcd4734f6628fdada1e59048b94a9d241ec79656d0491b41e185d6f010e5,2024-11-21T07:57:00.540000 CVE-2023-29412,0,0,2f8043764e5e22066ce32d65095d0431bd5e5f4b6498eb8605bca575ed780f1d,2024-11-21T07:57:00.663000 @@ -224085,7 +224086,7 @@ CVE-2023-29845,0,0,0d6601a8b19a56bb94196f82c15ebc3bb9a3355618b52f3161b02c947456d CVE-2023-29847,0,0,cbd9ab3b3aea2e256972aca68ae61c4fb791ad8431f3332b4f90887044d0fcc8,2025-02-06T21:15:20.397000 CVE-2023-29848,0,0,87145e74e1bca1e68a1619f3f291dc2d0caaa2830bcb2e8145e9ddd416eda338,2025-02-04T17:15:14.370000 CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000 -CVE-2023-2985,0,1,df478477f9fb1194e751690ecbcbe6a070a54d560ec708ee0634cb01bbc5c707,2025-03-11T16:15:14.727000 +CVE-2023-2985,0,0,df478477f9fb1194e751690ecbcbe6a070a54d560ec708ee0634cb01bbc5c707,2025-03-11T16:15:14.727000 CVE-2023-29850,0,0,e23e41ca7326518efc51de7c326f367054eae2616881359dcbf8b83161d49e44,2025-02-06T21:15:20.580000 CVE-2023-29854,0,0,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000 CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000 @@ -224258,7 +224259,7 @@ CVE-2023-30210,0,0,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6 CVE-2023-30211,0,0,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000 CVE-2023-30212,0,0,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000 CVE-2023-30216,0,0,5eb3072b936944b32199c9563ff2bd8df56a2dd5a23baf265c2a91655d2cc13b,2025-01-29T20:15:32.147000 -CVE-2023-3022,0,1,30128331775488e13ecf386e82e48d5b539239191d58bbec9a979c50cb41db5a,2025-03-11T15:15:38.650000 +CVE-2023-3022,0,0,30128331775488e13ecf386e82e48d5b539239191d58bbec9a979c50cb41db5a,2025-03-11T15:15:38.650000 CVE-2023-30222,0,0,311828e54dafd6d0db801e3d776df3fb7876dc84d7c76629b5a43b88dee46bb7,2024-11-21T07:59:55.240000 CVE-2023-30223,0,0,22603cb5f264912092468b6977407892d8678dbb3e405984b4437903070fd7ce,2024-11-21T07:59:55.393000 CVE-2023-30226,0,0,3d14aa7f77a3bea0cfd62c396d78bc88eb292fb0748e120a471dcdb46a7f274a,2024-11-21T07:59:55.540000 @@ -225200,7 +225201,7 @@ CVE-2023-31406,0,0,6807e52300f654096b3444928537bbf5bd905dcdd7bdfadf4c54f763b8f84 CVE-2023-31407,0,0,5633b6d5b535b99fc860fde1ccb9a957615d718ab262ccefea2c67364128958f,2024-11-21T08:01:47.957000 CVE-2023-31408,0,0,59838602bd646a5aaf55c57b242b706a86e52780670e3b0fbf6129782d0ef2e4,2024-11-21T08:01:48.083000 CVE-2023-31409,0,0,b3edb6ee510cd2535ccfb9b32d08d3c89c1a62e297eb8ea145c7b2d52d0ed587,2024-11-21T08:01:48.250000 -CVE-2023-3141,0,1,50f99483e8be7221c37e4b5d285eea43bdd641ccca36cedf9a5d5400faea38c9,2025-03-11T15:15:38.867000 +CVE-2023-3141,0,0,50f99483e8be7221c37e4b5d285eea43bdd641ccca36cedf9a5d5400faea38c9,2025-03-11T15:15:38.867000 CVE-2023-31410,0,0,69a6c12625ba60cddfaa6f0d5b683c81178475ca41b7e5ddc6802612a82fca29,2024-11-21T08:01:48.377000 CVE-2023-31411,0,0,d7f07bb9e039c868f52e87fa75158cc828e7a1392c2dfc5e56e6fb6a1bab2bb8,2024-11-21T08:01:48.497000 CVE-2023-31412,0,0,777ecc7e8f06e06d0385607faa87da9fb6c635ee45b54bbed274e4bbf90f56c3,2024-11-21T08:01:48.617000 @@ -225330,7 +225331,7 @@ CVE-2023-31606,0,0,566928f240e95aed16a3c3742b1ad454864df53f0c03b37939832a70716ca CVE-2023-31607,0,0,7d3508d6e36307d736ffd554a5eb1b404a89842a52017b1a1adf8a9e40662c65,2025-01-23T19:15:09.613000 CVE-2023-31608,0,0,3f3db7a5e1c8311107b7f33f068938a9f5fd1a8c9b6f38e2c393e4d5fc2cf548,2025-01-23T19:15:09.780000 CVE-2023-31609,0,0,2005bfc3d2b97af7a1dec83b5fb91826b19eab5bef445d4fd6dbd5344a0dbbcb,2025-01-23T17:15:11.150000 -CVE-2023-3161,0,1,2db2aa8c139374940eeca48c4793b67ccf430a88c192e53879178b3a2f4837bf,2025-03-11T15:15:39.120000 +CVE-2023-3161,0,0,2db2aa8c139374940eeca48c4793b67ccf430a88c192e53879178b3a2f4837bf,2025-03-11T15:15:39.120000 CVE-2023-31610,0,0,4635c8d6131c4b4c122038805363b2d666290afd290352c3b42f3a755aa19c61,2025-01-23T17:15:11.337000 CVE-2023-31611,0,0,7d49566bf2b65a83f8da17cf49d5899b27094e60dd447a97224d6c0c8c7656f7,2025-01-23T17:15:11.503000 CVE-2023-31612,0,0,776f8b729d141f0dbbf1994fdb1bf5856b52d64ad6cf8da4800ef2964c166227,2025-01-23T17:15:11.660000 @@ -225748,7 +225749,7 @@ CVE-2023-32192,0,0,9ddad804b5e1f24517e731cf63fc7724b58e01e76819ef245be1681605b11 CVE-2023-32193,0,0,3fc0deec46f1f84bb86bb18144fefd8401960da10ffc30dbcb4b73bcaa487fa6,2024-10-16T16:38:14.557000 CVE-2023-32194,0,0,b026e294b9ee7e0ac795c3c964def03f8175fac7911f8283e7b5b212d9d71d5b,2024-10-16T16:38:14.557000 CVE-2023-32196,0,0,79159a2f6efc5cfee63b1c771d3ff38df7bebfb52936a9e17291c69b0f073c87,2024-10-16T16:38:14.557000 -CVE-2023-3220,0,1,091b3568d542ce7f8e9639994e311d2dd153be652f295bce2cf3036b33345197,2025-03-11T15:15:39.357000 +CVE-2023-3220,0,0,091b3568d542ce7f8e9639994e311d2dd153be652f295bce2cf3036b33345197,2025-03-11T15:15:39.357000 CVE-2023-32200,0,0,bd3b707fd4f345c8c3028816f1e6552e40039230142d8b9e762e26d6d0380966,2024-11-21T08:02:53.243000 CVE-2023-32201,0,0,931662d2bb3c46b3ef8495876fa9a03301878dcf7cc2306d578f2b4f434d18a1,2024-12-23T22:15:06.950000 CVE-2023-32202,0,0,e2c24c84537688439264cd465b421a98fad6a5179b84fddeb05252e348ad893b,2024-11-21T08:02:53.537000 @@ -226244,7 +226245,7 @@ CVE-2023-32676,0,0,5189b035440283ec39891623bbb2317368f5fd2359f30593287634d20e6e4 CVE-2023-32677,0,0,629ae0e2710ad52a1609f41917b9a6ed3d5583cf36fc8722876b9d9f6f6ebe2c,2024-11-21T08:03:49.880000 CVE-2023-32678,0,0,b28857343fdf0c940223c3ea13365bb170b828dfa0f85165e9cca87c49d995f5,2024-11-21T08:03:50.010000 CVE-2023-32679,0,0,959c8f4087976263071eb5ae8ceebda7e6a91e605405c9dbc581b01b066b12fd,2024-11-21T08:03:50.137000 -CVE-2023-3268,0,1,dc2fdffca5c79d7648c13f17d930188baddf7af174441440f084e1f062f83ddf,2025-03-11T15:15:39.587000 +CVE-2023-3268,0,0,dc2fdffca5c79d7648c13f17d930188baddf7af174441440f084e1f062f83ddf,2025-03-11T15:15:39.587000 CVE-2023-32680,0,0,c937c5697c77e75a5d2f30ba7990452ef8555001c774a67e77a4947c8eca3a5a,2024-11-21T08:03:50.250000 CVE-2023-32681,0,0,f322bf0f963c1d07d2732145d26c55a4933344ebb8c80e2800f25e388a51d59d,2025-02-13T17:16:32.583000 CVE-2023-32682,0,0,f84e86997f01b9286bbf9252e4140b2a15469095ee23e7957c6eee04c12d0b60,2024-11-21T08:03:50.513000 @@ -227527,7 +227528,7 @@ CVE-2023-34252,0,0,740fef90fdaf696e3d5d9264aef39da208739f0be77ebb8fccb87ebdc2e6c CVE-2023-34253,0,0,7fa9d9b4a8331571eaa196a0b4846212c60f701a59352f250ed22a6a06a79317,2024-11-21T08:06:52.047000 CVE-2023-34254,0,0,28bc1c030aea3f52ac42aea5cabfb0b2c4b8caf27bbf30b675459c6d8263c10e,2024-11-21T08:06:52.180000 CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a6f7,2023-11-07T04:15:33.133000 -CVE-2023-34256,0,1,2971f87b23a035bc12803f37d7531776c6e71a539301a445243e46e0254a045e,2025-03-11T16:15:14.927000 +CVE-2023-34256,0,0,2971f87b23a035bc12803f37d7531776c6e71a539301a445243e46e0254a045e,2025-03-11T16:15:14.927000 CVE-2023-34257,0,0,9f794a27940ab7963e721dba620365ce2ab3173ff58e0a8914d6146ac5d4b9cd,2025-01-10T15:15:14.193000 CVE-2023-34258,0,0,fcdb643155db51246493eace9830d7f00f9ad9f8e9c26b5f3acf2452f9cf252a,2025-01-08T22:15:28.060000 CVE-2023-34259,0,0,a17ffd4a41a9842f96ee8008d3ec22fa6d3e74baa3727d6c80193a1cef77d2d8,2024-11-21T08:06:52.813000 @@ -230164,7 +230165,7 @@ CVE-2023-37929,0,0,4095396c6fb48583172ab2f6692b90080e3afde295fcb5a19cf8d9f8e85d9 CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000 CVE-2023-37931,0,0,a0b40b55eb2247b05e0ceeef5e9f955a4a55dda449f703f6bca219262f750a7a,2025-02-18T22:15:09.843000 CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000 -CVE-2023-37933,1,1,1913a6c697a48293d7b0ab243c8a71572abb462a408f81f874a365cc47c312ef,2025-03-11T15:15:38.480000 +CVE-2023-37933,0,0,1913a6c697a48293d7b0ab243c8a71572abb462a408f81f874a365cc47c312ef,2025-03-11T15:15:38.480000 CVE-2023-37934,0,0,4e265b9ab5d64a68f77d4af970245395e5cadba01a90f14cccc92367afbeed0f,2024-11-21T08:12:29.930000 CVE-2023-37935,0,0,e2680834b672fa8ed2fa3700d283e20af31e71aaa863e0a1bb6357a666cbb04b,2024-11-21T08:12:30.057000 CVE-2023-37936,0,0,6c417e5254b6c599e5552cccb6a812920d0355b6d45b34bb4ff96b53d102f97d,2025-01-31T17:42:50.520000 @@ -232562,7 +232563,7 @@ CVE-2023-40719,0,0,acb9404eafc431f6a2f22b63d83343ddbcd8d8fcb1d42ba190543035718d7 CVE-2023-4072,0,0,82174d2d178aaae9823279d7c94363a7d8d8c0249d0bb927556aae15a4ef631f,2024-11-21T08:34:20.930000 CVE-2023-40720,0,0,872f2e87477a3acf4f7037778bf724a33680287f443a76024cd4bafc9380b862,2024-11-21T08:20:01.767000 CVE-2023-40721,0,0,525320d4b38dbb063f7787a42abbae1dc2c7572ad404edfbb6a8dcb204805391,2025-02-11T17:15:21.403000 -CVE-2023-40723,1,1,9c02e6e8349dda2a5d98dcf08ee228e3fa0acc74b0c12d1bfc484624bb4fbc2f,2025-03-11T15:15:39.843000 +CVE-2023-40723,0,0,9c02e6e8349dda2a5d98dcf08ee228e3fa0acc74b0c12d1bfc484624bb4fbc2f,2025-03-11T15:15:39.843000 CVE-2023-40724,0,0,abe3d5cc194993fa95bdc99514308eaf93e09eb564e3440e22bb9515f2b2686b,2024-11-21T08:20:01.927000 CVE-2023-40725,0,0,adfd99195eeb3f34ccc5f2e7792fb5337ad270a7a45216e0d9397d56f8676724,2024-11-21T08:20:02.053000 CVE-2023-40726,0,0,97ba555b44aef4ac8cadb1249031b30ecd84032311ea02ae66df686bdd55cdfd,2024-11-21T08:20:02.183000 @@ -233874,7 +233875,7 @@ CVE-2023-42505,0,0,9ab6dd7dfb0786f84b349b31afd50f70f2ea98f9beaf48099e6faa812df78 CVE-2023-42506,0,0,d508286d8d36552fe9e854515ba2d8ca9c53a4ad88c155e383c764e9361a1662,2024-11-21T08:22:41.463000 CVE-2023-42507,0,0,95f7a442861b72d1544ea11fd2f010b80be26f85fc4ee471e711ebf0c522461a,2024-11-21T08:22:41.587000 CVE-2023-42508,0,0,bbab358f9374ff4c93e4d5a1fa139f2b77986fa251894acc45ef49de283b22c4,2024-11-21T08:22:41.710000 -CVE-2023-42509,0,1,5e091343f47a78ed905bf6dc566855e28be9a2ac9ad6561eb6aaf809f9f7c4fe,2025-03-11T16:57:11.073000 +CVE-2023-42509,0,0,5e091343f47a78ed905bf6dc566855e28be9a2ac9ad6561eb6aaf809f9f7c4fe,2025-03-11T16:57:11.073000 CVE-2023-4251,0,0,034a7b92d2b37c92649fc5aca046c5ee579347dfc80fc8e43d0fbe60fc0e4888,2024-11-21T08:34:43.783000 CVE-2023-4252,0,0,241d0ed23bbed15be4caa83e96cb94794db8837cd6045145c5f3eeffcba80b19,2024-11-21T08:34:43.910000 CVE-2023-42520,0,0,0f7e649e5abe2bcf81466af32f0e75ed8e91444f7c9b03366f081f463c015076,2024-11-21T08:22:42 @@ -233985,8 +233986,8 @@ CVE-2023-42657,0,0,ff9635b59e66a373b92dc5cc965f63411c6bad67160b336d54494d5984693 CVE-2023-42658,0,0,f85c83eea1f0b03149812b838b04c5ff6848374d7b1db3fa92a4b6c4f29ed17f,2024-11-21T08:22:54.187000 CVE-2023-42659,0,0,5723dd9c27186e966696178e04179c10e5ff1519d366a270811b6abc75f5c410,2024-11-21T08:22:54.320000 CVE-2023-42660,0,0,8471bb7980a27be272845426154246c7ef4e7660331ec2831f10ab8b5a6da968,2024-11-21T08:22:54.447000 -CVE-2023-42661,0,1,044518fa3c30714d849a15294b9c6cf4ecc5ca041c38a53f98eb6ed5719e406a,2025-03-11T16:57:02.150000 -CVE-2023-42662,0,1,3c4ba6455e091ea46a4a1f4bd3bf293f07b07aa2a2bf89cb2a988e819313957a,2025-03-11T16:40:52.237000 +CVE-2023-42661,0,0,044518fa3c30714d849a15294b9c6cf4ecc5ca041c38a53f98eb6ed5719e406a,2025-03-11T16:57:02.150000 +CVE-2023-42662,0,0,3c4ba6455e091ea46a4a1f4bd3bf293f07b07aa2a2bf89cb2a988e819313957a,2025-03-11T16:40:52.237000 CVE-2023-42663,0,0,7098afbcd944e4cb142bebdeb8bfa8201200547b7bdff1dd38937aae900d1d2c,2025-02-13T17:17:09.083000 CVE-2023-42664,0,0,047574b3680118a4fbf5c0bcc44f6fe2f32d580fa6b9141e2353affb0098ab4d,2024-11-21T08:22:54.940000 CVE-2023-42665,0,0,ac4ccacd7822c4c3b294a20315585c0819327c5044918b2c5b28e3a5361fa613,2024-02-14T18:15:46.030000 @@ -234107,7 +234108,7 @@ CVE-2023-42780,0,0,cdd093383de8ac80b2dd603c4cd8b5fb12111fdfaea151dda39675c869053 CVE-2023-42781,0,0,e6266811e943f5b3219ef0407d2b4114a945fd77347810cc844cb61ed53dc644,2024-11-21T08:23:08.683000 CVE-2023-42782,0,0,da0c83cbed17a04613b39ce2336362e43c1e910e28a92e71a36daf2e58e858be,2024-11-21T08:23:08.817000 CVE-2023-42783,0,0,98b628fd4937ef156152a20479ae772c8ff5e58950f81df1627766b6fb5ac59b,2024-11-21T08:23:08.960000 -CVE-2023-42784,1,1,ffd94a0fb16b6b6651efc867799a71f085dee63f239bf562c22b99d608c43473,2025-03-11T15:15:40.033000 +CVE-2023-42784,0,0,ffd94a0fb16b6b6651efc867799a71f085dee63f239bf562c22b99d608c43473,2025-03-11T15:15:40.033000 CVE-2023-42785,0,0,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000 CVE-2023-42786,0,0,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000 CVE-2023-42787,0,0,9495dbf34a13c743d9a5e135b36546505b91d005fdd69c84cafbd04056c07414,2024-11-21T08:23:09.100000 @@ -236370,11 +236371,11 @@ CVE-2023-46158,0,0,82a3b27a09f8b6d4af50535637f653dfbe6af9e09b53a66ace7d317ef15d7 CVE-2023-46159,0,0,a9a4381520ef89bf12666310cf5a0db135d670a0c49e8d35deb299a317d62286,2024-11-21T08:28:00.460000 CVE-2023-4616,0,0,f64fa3b90907518ea67902a05e6872124fd0726c90f62c0e26e73916a42979b6,2024-11-21T08:35:33.150000 CVE-2023-46167,0,0,afd529d982da16d18720d4c13388bd1183b6956c7d792ce9bc4a9ee4dd22bb23,2024-11-21T08:28:00.590000 -CVE-2023-46169,0,1,b85fd983b269c0a82ccba29bb108a177e2f752d7ee10f097b0a4c78f51f3d124,2025-03-11T16:55:36.417000 +CVE-2023-46169,0,0,b85fd983b269c0a82ccba29bb108a177e2f752d7ee10f097b0a4c78f51f3d124,2025-03-11T16:55:36.417000 CVE-2023-4617,0,0,b03743ffbbfe7e3ed1460051a543b4b3a4b51beb915eb8de95f3b60d0ec8d639,2024-12-19T10:15:13.147000 -CVE-2023-46170,0,1,2f961787bf847094d884d27393834993346c8bb5c67f07436d86634c22693f19,2025-03-11T16:55:27.780000 -CVE-2023-46171,0,1,3a5bdd1266cb78081d97ec808236ef46be575b58e8227032fc1682d4c1ebaae5,2025-03-11T16:55:19.027000 -CVE-2023-46172,0,1,64d797d4dd2c4d65392b258eb4f8322c328f88c24d8edbe3404d4798be86dd6f,2025-03-11T16:54:26.763000 +CVE-2023-46170,0,0,2f961787bf847094d884d27393834993346c8bb5c67f07436d86634c22693f19,2025-03-11T16:55:27.780000 +CVE-2023-46171,0,0,3a5bdd1266cb78081d97ec808236ef46be575b58e8227032fc1682d4c1ebaae5,2025-03-11T16:55:19.027000 +CVE-2023-46172,0,0,64d797d4dd2c4d65392b258eb4f8322c328f88c24d8edbe3404d4798be86dd6f,2025-03-11T16:54:26.763000 CVE-2023-46174,0,0,4cc9539c5fe9034dbae55b6f379ceef39504bfb484d49fbac34e60901ce64f91,2024-11-21T08:28:01.200000 CVE-2023-46175,0,0,26721f799191f5602a0142ae17cb7a4743c01c780bc2a9d312b7ffec491d9c22,2024-09-30T12:46:20.237000 CVE-2023-46176,0,0,026b76715c132f309c8fceb70e4a6fec5192b55c2ff94eabf1a439ef34a0e685,2024-11-21T08:28:01.400000 @@ -238378,7 +238379,7 @@ CVE-2023-48721,0,0,a57495dfa76ee6e939f1f2b3381889b765b7c4b544073fd167f06af83cf20 CVE-2023-48722,0,0,b4bce794dbbf9b1d35759682688342e6b781296e0b85eb6427551aab9dea68c5,2024-11-21T08:32:19.843000 CVE-2023-48723,0,0,46bda205941385a606aeb420da268e3516d52a9631f8eb19fb287c1f54b86a50,2024-01-02T16:15:12.377000 CVE-2023-48724,0,0,e6ab0d9e64a2284fcdfff90e3a9f85a443cde662a0db6f09bf6b186bd198ead6,2024-11-21T08:32:19.990000 -CVE-2023-48725,0,1,c9d9d8856e0027f7c317bbfe0ee2e5abce4f5c7a5e1ebe942f758d2d523fcdcc,2025-03-11T16:56:47.143000 +CVE-2023-48725,0,0,c9d9d8856e0027f7c317bbfe0ee2e5abce4f5c7a5e1ebe942f758d2d523fcdcc,2025-03-11T16:56:47.143000 CVE-2023-48727,0,0,57081be578023f81a6e95f9fdd0d786ef87b8ace2b7257c8e6a92924f470be77,2024-11-21T08:32:20.260000 CVE-2023-48728,0,0,3d40f2cfee57843e3b1c2a05847e8926585ff2485f5aee916a2deecebd7bf716,2024-11-21T08:32:20.380000 CVE-2023-48729,0,0,6610f082f226d878b6889d68d8e386a1615e2b9519b2fcf4a41ca3546b7580e9,2024-02-14T18:15:46.243000 @@ -238444,7 +238445,7 @@ CVE-2023-48784,0,0,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd62 CVE-2023-48788,0,0,2db98462fc8ef2fb921267e516a454b300a71aa8f3c35868beb3a33fd3cb277a,2025-01-27T20:56:34.083000 CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000 CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000 -CVE-2023-48790,1,1,fc8925c21035cacf425395afeddf12b2570f3fbe5d9630a90a20fd5242f97b2e,2025-03-11T15:15:40.227000 +CVE-2023-48790,0,0,fc8925c21035cacf425395afeddf12b2570f3fbe5d9630a90a20fd5242f97b2e,2025-03-11T15:15:40.227000 CVE-2023-48791,0,0,31c96e4e1869546f12717fd141d38efd00e2ed04c54f4d96999394432c372674,2024-11-21T08:32:26.740000 CVE-2023-48792,0,0,de3a854106cd0cc670737f05a31c26ef1df7bbfc37a35ab06907ec52d7b8d166,2024-11-21T08:32:26.867000 CVE-2023-48793,0,0,d3e6293b1688749ef1b2a2f41972e932db866d779affe9d4c74e699cada6710c,2024-11-21T08:32:27.047000 @@ -239868,8 +239869,8 @@ CVE-2023-50940,0,0,51dd5ec0317820be6a625d682b7540171c694b6e5228d23f2af653f5d184a CVE-2023-50941,0,0,4725e71079dbca2e105a847f56a3950ea08883ccc7db725a5bc78f08a8910565,2024-11-21T08:37:34.760000 CVE-2023-50943,0,0,73327067be2f484a931e551c7b95a8c3ecab5719937dd81676ac15741d48c354,2025-02-13T18:15:52.603000 CVE-2023-50944,0,0,906ad9f26d12ac48624c5df1a1c10f176affa1fd5f6ab28bfb419e28553dae91,2025-02-13T18:15:52.743000 -CVE-2023-50945,0,0,d841bbdcedc43a7a2ac1408079f24749f3a7acfd55b3a3f00f52049d971bd198,2025-01-26T16:15:30.523000 -CVE-2023-50946,0,0,465fe8804963533610f05c955c02c29c35bc2f424641a16ec6fc688147747bd5,2025-01-26T16:15:30.680000 +CVE-2023-50945,0,1,98f0c43dd5b6dd04d6f88e487b0e0f714b4da34004b257532eec87b4f60d341e,2025-03-11T18:10:30.377000 +CVE-2023-50946,0,1,695541608fdf13c673b915f3549951eac27ba4b11e4383b429b2a05ea742adb1,2025-03-11T18:03:46.630000 CVE-2023-50947,0,0,315931b32ba2a05ba850339c4b9bc866bd08295cc58fb47a4e8b1ba5ad042e05,2024-11-21T08:37:35.167000 CVE-2023-50948,0,0,28323826bb3c873fc57cf155c09bad077515a97a0be7d5af9707ea35ef154f81,2024-11-21T08:37:35.350000 CVE-2023-50949,0,0,3ffca925309e3a7215e26bf2b972cc2bba3cb3394929162adc4f909f2af039fe,2025-03-06T14:25:09.843000 @@ -243675,8 +243676,8 @@ CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43f CVE-2024-0365,0,0,db88c9e9808866db89f901a78edcf457fc6a3e088c30d92a89eeb5dbd7ac5b6a,2024-11-21T08:46:24.493000 CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000 CVE-2024-0367,0,0,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000 -CVE-2024-0368,0,1,899a131a121911b9b59721868468591c2716da1a0d3a8fdfcc57bb32e8e39e49,2025-03-11T16:51:23.420000 -CVE-2024-0369,0,1,cc21965cce3ae62979230688ecf1eb3bf3ef856bdbae3a57fefed343f23b6742,2025-03-11T16:38:55.427000 +CVE-2024-0368,0,0,899a131a121911b9b59721868468591c2716da1a0d3a8fdfcc57bb32e8e39e49,2025-03-11T16:51:23.420000 +CVE-2024-0369,0,0,cc21965cce3ae62979230688ecf1eb3bf3ef856bdbae3a57fefed343f23b6742,2025-03-11T16:38:55.427000 CVE-2024-0370,0,0,7cda05e6b3807d2a3af714ded0fdf5f41498392f61b03ee727ac2cbb0138b4d4,2024-11-21T08:46:25.467000 CVE-2024-0371,0,0,5c3d442f8ecd87f51d1c113b9afa4febd80318afc8cd2eb08f21826e97011962,2024-11-21T08:46:25.620000 CVE-2024-0372,0,0,cdefb651d58754406381dc11b785774bfb0c82915c9d61404379e3d0e8cdf370,2024-11-21T08:46:25.763000 @@ -243749,9 +243750,9 @@ CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d477 CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000 CVE-2024-0445,0,0,7bdf4aad36e4a762070f2d5a62a4b8c11814b769ee88b7035b4639eded1b0516,2025-01-27T18:41:19.177000 CVE-2024-0446,0,0,124de0675cc01e13555049891a9a6623c7dacc61fc8dd34a8640dbaebb1bf4be,2025-02-10T22:15:32.380000 -CVE-2024-0447,0,1,7244dcb7cd7d54fe2e11983b8e31094feb40a99088e225fca1d7ac5c46622709,2025-03-11T16:38:17.530000 +CVE-2024-0447,0,0,7244dcb7cd7d54fe2e11983b8e31094feb40a99088e225fca1d7ac5c46622709,2025-03-11T16:38:17.530000 CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000 -CVE-2024-0449,0,1,d99e5d0a35181dd2a3d2d031655f5697c37a03e36f367816eeff2d8b2c43571a,2025-03-11T16:37:53.670000 +CVE-2024-0449,0,0,d99e5d0a35181dd2a3d2d031655f5697c37a03e36f367816eeff2d8b2c43571a,2025-03-11T16:37:53.670000 CVE-2024-0450,0,0,a1b920c11dee63a8e3076083ddfa38e003146c3343c7cb62828f303698cddd99,2024-11-21T08:46:37.017000 CVE-2024-0451,0,0,5ae993f8fa6f67f9d1878c2219b82442c9f9c27de5c52f54d2bec468f56d2b20,2024-11-21T08:46:37.177000 CVE-2024-0452,0,0,e6fa2ac1a01ec8b171e192e303abcab51e8cb5be7741930dcf71a5f39de8743b,2024-11-21T08:46:37.307000 @@ -243890,7 +243891,7 @@ CVE-2024-0588,0,0,7363ace3d041ccd002b9e661fab0dd7d9434accbd53e8594f6313805a3b242 CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 CVE-2024-0590,0,0,f481ef28d4575792e39f3242fc31f5dcf3d5ce08c797600680221de34f5472dd,2025-03-04T12:24:19.653000 CVE-2024-0591,0,0,7fbea116192591335f8f1d5d2d14cd82c8c9b52d606ae6c5428a8e5fb76fea73,2025-02-07T17:53:51.437000 -CVE-2024-0592,0,1,d0edc05bd1c4665eac5c0d8b9a0ca86cdd3c8cf54377132974e72b81d9d39b2a,2025-03-11T16:36:50.407000 +CVE-2024-0592,0,0,d0edc05bd1c4665eac5c0d8b9a0ca86cdd3c8cf54377132974e72b81d9d39b2a,2025-03-11T16:36:50.407000 CVE-2024-0593,0,0,f4e7a74601373b533789dea3664523c6cc99316255f76051d128ea0eea35276e,2025-01-31T16:36:29.673000 CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b2485d,2024-11-21T08:46:57.910000 CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000 @@ -244111,7 +244112,7 @@ CVE-2024-0821,0,0,8d0f135a1bde00f8a9f6278553dfaf4cfb224409407e8fbdd3c58db9c4b996 CVE-2024-0822,0,0,ef76e16156f0ac7ca3043141b54dd9d9595137069497b8b98eaa4426b49c0d84,2024-11-21T08:47:26.913000 CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d0967,2024-11-21T08:47:27.097000 CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000 -CVE-2024-0825,0,1,3eeadae267eb84632257a554ce3df82d1232b825b126727f8f5568c48e044933,2025-03-11T16:45:26.630000 +CVE-2024-0825,0,0,3eeadae267eb84632257a554ce3df82d1232b825b126727f8f5568c48e044933,2025-03-11T16:45:26.630000 CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000 CVE-2024-0827,0,0,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000 CVE-2024-0828,0,0,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000 @@ -245064,7 +245065,7 @@ CVE-2024-10876,0,0,cd2a03b731b615444f96af44211cf410ba2fe90ff9f3789af363bf6a1ce52 CVE-2024-10877,0,0,7a3393b83a736557c04741e18efad94edf3c7ad0d4111e23694c36456b37491f,2024-11-19T15:52:44.487000 CVE-2024-10878,0,0,e935cc8c1a3c418e2fb468b6a5204c057f596013ccdff68d1c5f5fec79fa2c40,2024-11-26T18:15:18.827000 CVE-2024-10879,0,0,4fe7980fab4d2b80bcef2527765198187b03e9ced339a1403c07f82b84a559ea,2025-02-05T14:48:55.997000 -CVE-2024-1088,0,1,1911aaa4ea5cf2488027a06b8854fc8da49c7762b2ed23a42e3267c8f6452bc6,2025-03-11T16:45:03.303000 +CVE-2024-1088,0,0,1911aaa4ea5cf2488027a06b8854fc8da49c7762b2ed23a42e3267c8f6452bc6,2025-03-11T16:45:03.303000 CVE-2024-10880,0,0,34e1f62004f258ec82211d7b06454c17d69af4db3b940dca81e8b8e6d3913832,2024-11-23T05:15:06.207000 CVE-2024-10881,0,0,2f3e22e11ad56ac6852044dc7782949b3df53870d23afcbba1c70c4b3722e551,2024-12-05T04:15:03.937000 CVE-2024-10882,0,0,6b794c8f9b9f9e6f0ac203482f6418bfe899c8f536064495a56268c4eadd94aa,2024-11-13T17:01:16.850000 @@ -245340,7 +245341,7 @@ CVE-2024-11196,0,0,86073d672062faceb084c20cbe17a461a555aa7cdb4bc7856e7e10151f683 CVE-2024-11197,0,0,3740e434f528bbbd61234dede2b4a36fd46292349d79d4749d70c21ad64992c9,2024-11-21T13:57:24.187000 CVE-2024-11198,0,0,fc0b00a2733ca1e8fff2fe360f2e4cb1494fa8044fb680aa8d0f8cfd928aecc9,2024-11-19T21:57:32.967000 CVE-2024-11199,0,0,4da6055bcafe2b8bce3b600ee20c2f5f1bd34151af116c40502e83cef4f24d3d,2024-11-23T10:15:03.897000 -CVE-2024-1120,0,1,e98a16b725b0fddf3aa12432b0f5808c93b7dcd8a0fc795507e0507696589e0e,2025-03-11T16:46:21.947000 +CVE-2024-1120,0,0,e98a16b725b0fddf3aa12432b0f5808c93b7dcd8a0fc795507e0507696589e0e,2025-03-11T16:46:21.947000 CVE-2024-11200,0,0,7a5014fc24dac51453395d7130a599729868592263e54cecb121b499d8896404,2024-12-03T14:15:19.923000 CVE-2024-11201,0,0,95ced2cef5a51b7fa14517c64bac4bc07296789d71763b16f225669a1035af34,2024-12-06T06:15:22.533000 CVE-2024-11202,0,0,1c4fa16dc439f105ac28005f4d485fd2d81fcbfbfe746e38e05c1690388ba0cf,2024-11-26T08:15:03.710000 @@ -246914,7 +246915,7 @@ CVE-2024-12876,0,0,1ffa30e052c61ab887510a276fef8ab27590dc6fb9dfd38d21f07749b3182 CVE-2024-12877,0,0,1888c35ba77d5a377e4b45354716e40dd6bfa1aa3f5f5b568834841a45c1fee2,2025-02-25T15:53:19.030000 CVE-2024-12878,0,0,b64e1d2b2d1550ae633bcf2c37a6e44f5ae55d86c6146ff799e23d8870487b64,2025-02-26T16:15:14.863000 CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000 -CVE-2024-1288,0,1,b16952ad0ec4325f74f86e8c0458f9c7f871b72b07bc8f5d805e0c9508272e88,2025-03-11T16:49:51.733000 +CVE-2024-1288,0,0,b16952ad0ec4325f74f86e8c0458f9c7f871b72b07bc8f5d805e0c9508272e88,2025-03-11T16:49:51.733000 CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12883,0,0,fb17662563168c3886515b2425060e99b8383719947868b35de58ecbdd790200,2025-01-10T21:24:53.957000 CVE-2024-12884,0,0,9e0582801645aa8c79972d850a96750ed43f73125934e68ee05e8491bd848510,2025-01-10T21:22:48.413000 @@ -247479,7 +247480,7 @@ CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13471,0,0,ded89631a6c8b3470cfce8f0d40fdd89f44c44548de9869a213ebbba5e242015,2025-03-05T12:15:35.110000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 -CVE-2024-13473,0,0,373b88cb5ad56591f1b1770e530e918a12459beb69655014b2f5d50cfdfcd511,2025-02-18T18:15:18.990000 +CVE-2024-13473,0,1,1bb448491ed6801b0e0d70b10632f7ee6b509384af129afa2277560e4286a38c,2025-03-11T18:51:56.900000 CVE-2024-13474,0,0,119b2bcc9f6d7ee06993a83df97481ecb1d6f18c67fd910f35088fb4eaa5cb22,2025-02-22T05:15:12.410000 CVE-2024-13475,0,0,3177eb58513ef229c6af6e1f73b96e02b7a6aeb3e4de52ba1eee22ffe5816c06,2025-02-25T20:37:56.640000 CVE-2024-13476,0,0,509f2eb92e2e2f6da633ed83e3bb4b5bcc9e89cbd316690662fe9d557ab72a84,2025-02-25T20:41:50.223000 @@ -247488,7 +247489,7 @@ CVE-2024-13478,0,0,e271dad9999a5dae7774446884095cc26d93c2d9048417a97f9a84f44f1ce CVE-2024-13479,0,0,f134703285142bed1ab712c980a4a832b58153ed8801b87c36ff5bbbc47d2fb3,2025-02-25T20:49:46.477000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-13480,0,0,d795c021708f83dec22e9e13f996cded557f5cce66508a10ed2f76476b1ec50a,2025-02-25T20:53:29.347000 -CVE-2024-13481,0,0,0d1c239cb9199c2a63d0b09ec1100f87149f8115e72cbb0df366219ecff424d3,2025-02-19T12:15:30.753000 +CVE-2024-13481,0,1,8e43a2350dbe0f7c79eb6f73754865881c20202e98ebe64b88bf7eefcdf457c3,2025-03-11T18:48:06.980000 CVE-2024-13483,0,0,8fcd5683bc938442ba2abb32ac7e5e9aae7129e271932e6cb40281e1f32606a8,2025-02-25T20:50:29.027000 CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 CVE-2024-13485,0,0,13891a751ed33776eeacdce8cd7bb797159d0f76d2c0706f2beaac89a9870581,2025-02-25T20:53:34 @@ -247514,7 +247515,7 @@ CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90 CVE-2024-13506,0,0,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000 CVE-2024-13508,0,0,5f4e00e5fdca87a538d7f485431f2011a0b7359585f9c44faeaf0151393de35d,2025-02-19T00:15:09.360000 CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000 -CVE-2024-1351,0,1,3ce5565a1cf25a34ada057dcbec10019bc03a7a3b1fdc771d78627f87a05ddf7,2025-03-11T16:56:35.430000 +CVE-2024-1351,0,0,3ce5565a1cf25a34ada057dcbec10019bc03a7a3b1fdc771d78627f87a05ddf7,2025-03-11T16:56:35.430000 CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000 CVE-2024-13511,0,0,8b315badaeb5a615c739271a3e79d1cb9a54c1aaf05d6bc1436615af32fdbe24,2025-02-05T18:22:40.217000 CVE-2024-13512,0,0,15b524ef140c14d839848665047eaf39bfa9911689193bf2e25f735ef0c619c4,2025-01-31T18:08:22.743000 @@ -247580,14 +247581,14 @@ CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4e CVE-2024-13571,0,0,ab309a8c78e09a2ce738fdc24b971e3cca9be1cecd7a9446e1d144bb91a81bc0,2025-02-26T16:15:15.210000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 CVE-2024-13573,0,0,47f56a6be89a4bb63ceadbae078e78a73033980ecb24e71f52f10b691c304d4b,2025-02-24T15:40:57.757000 -CVE-2024-13574,0,1,a3824c096da031a79efdd9d44aee6c98173057ab11d0ce2659de8d8300b52fe4,2025-03-11T15:15:40.527000 +CVE-2024-13574,0,0,a3824c096da031a79efdd9d44aee6c98173057ab11d0ce2659de8d8300b52fe4,2025-03-11T15:15:40.527000 CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000 CVE-2024-13576,0,0,48cc32358acb541ca620ae43d659608cb24956f0ab7ef76dd6f13e11fb588a30,2025-02-24T15:42:32.780000 CVE-2024-13577,0,0,7ec226add5baf80fe65c72cfac22716a4ed179a333ffd2c2c08673fb55d268bb,2025-02-21T18:34:11.867000 CVE-2024-13578,0,0,2e03d593d9cc9c5cb01e1d2f1b7697601c3fdfe810a05cbd665a89f4ae6da901,2025-02-21T18:33:08.770000 CVE-2024-13579,0,0,9640388d79eec1df931f220b7238300cfc32ad9fa9f52686d215010fe1b6e407,2025-02-21T18:32:31.837000 CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 -CVE-2024-13580,0,1,f7f33894d4a344d61f919692cf3def7d7308c04f540a8cc7226ad66b9e0eddd9,2025-03-11T15:15:40.683000 +CVE-2024-13580,0,0,f7f33894d4a344d61f919692cf3def7d7308c04f540a8cc7226ad66b9e0eddd9,2025-03-11T15:15:40.683000 CVE-2024-13581,0,0,23b802948fc1ec2e74b6a22e5bf61730cbf3169612c89a9c03c344016e0c5f8b,2025-02-21T18:31:11.640000 CVE-2024-13582,0,0,8d1bcfb1104599f11a579c3e54940cf5492586d1eaf9dd31aaec9254649458fc,2025-02-21T18:29:05.973000 CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000 @@ -247619,7 +247620,7 @@ CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40f CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000 CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 -CVE-2024-13615,0,1,2b3d7c20a4af237993378d11227e4d1fa24944b2308af01c8b5ff1225188d389,2025-03-11T15:15:40.840000 +CVE-2024-13615,0,0,2b3d7c20a4af237993378d11227e4d1fa24944b2308af01c8b5ff1225188d389,2025-03-11T15:15:40.840000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 CVE-2024-13622,0,0,d2688be4d32a38fa0003e8b919920c245dea1fd4a1949bfeea892e9dd65d3580,2025-02-21T16:05:34.047000 CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000 @@ -247729,7 +247730,7 @@ CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac578 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000 -CVE-2024-13734,0,1,fb13d30c5d3b7eac80b2a64e86d45d007134e68bd4fdca6d18f22cd1479a839b,2025-03-11T15:55:48.603000 +CVE-2024-13734,0,0,fb13d30c5d3b7eac80b2a64e86d45d007134e68bd4fdca6d18f22cd1479a839b,2025-03-11T15:55:48.603000 CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000 CVE-2024-13736,0,0,e1c661a83958ba599f5e79cad01930aa57fce7dc9eb18a31a6e422469d19d5dd,2025-03-06T12:42:22.567000 CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000 @@ -247803,7 +247804,7 @@ CVE-2024-13832,0,0,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73 CVE-2024-13833,0,0,0880b5318dcbe63992d3f2badd6c78eb8ebd6b2e485dc13d406b59785dd947c4,2025-03-01T12:15:33.230000 CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000 CVE-2024-13835,0,0,bb466c42b5ac88f927aad0c176f7f2be8448370020dc544158a1fa7d8a0b9abf,2025-03-08T03:15:36.760000 -CVE-2024-13836,0,1,db6e49418a661de0a1787c92b36ae426d3cce34cbe5b5b4aacb35b485e1eb235,2025-03-11T15:15:41.010000 +CVE-2024-13836,0,0,db6e49418a661de0a1787c92b36ae426d3cce34cbe5b5b4aacb35b485e1eb235,2025-03-11T15:15:41.010000 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 CVE-2024-13839,0,0,271371a4da5d24a94b607140c89c40b4d635e3f04318c9eb7bb8dbeb5839bd6e,2025-03-05T10:15:18.443000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 @@ -247823,7 +247824,7 @@ CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 -CVE-2024-13862,0,1,22b36d42c637f4d3af4cb8a8a20990860c7cb0de0e7b0b6f4015a9938343536b,2025-03-11T15:15:41.180000 +CVE-2024-13862,0,0,22b36d42c637f4d3af4cb8a8a20990860c7cb0de0e7b0b6f4015a9938343536b,2025-03-11T15:15:41.180000 CVE-2024-13864,0,0,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000 CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 @@ -247851,7 +247852,7 @@ CVE-2024-13902,0,0,2d798b0c40a1d59ba77da363cceb392cdd45de698d6466927a1240987fa60 CVE-2024-13904,0,0,4066bd52c81a7420cad2f813b88c8a82bd66a4addf44ebe17ec9b3f40af765e5,2025-03-07T09:15:15.817000 CVE-2024-13905,0,0,c66be7cfbd34a458bb74dba95d4e6476fcc9754cf0f34a578dc3aa455a41a709,2025-02-27T05:15:13.610000 CVE-2024-13906,0,0,49d3c886d6eb569e3be95840598d3644d2e3a759a922a1777a4a1a594b4b6b41,2025-03-07T08:15:37.467000 -CVE-2024-13907,0,1,3b0e87cf5752b8b0fccb0cb5069f80bf05370ddfb297c2e78ae1a11702604545,2025-03-11T16:26:05.363000 +CVE-2024-13907,0,0,3b0e87cf5752b8b0fccb0cb5069f80bf05370ddfb297c2e78ae1a11702604545,2025-03-11T16:26:05.363000 CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537b5a,2025-03-08T07:15:10.690000 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000 @@ -247908,7 +247909,7 @@ CVE-2024-1437,0,0,48f9317293466e50e9270a7a4c2ee4c7fe04a4aa3c804e8a49c32b35bb2e25 CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000 CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000 CVE-2024-1441,0,0,8524643e4a58354b4c6d975cbc4efa93d311c9d367be16dec8b7308fac65f976,2024-11-21T08:50:35.540000 -CVE-2024-1442,0,1,d2ae5e9689666f79c8cd6fcdb6df5574b7bc8d53d4d2e3769df0e7673b9ac707,2025-03-11T16:56:13.943000 +CVE-2024-1442,0,0,d2ae5e9689666f79c8cd6fcdb6df5574b7bc8d53d4d2e3769df0e7673b9ac707,2025-03-11T16:56:13.943000 CVE-2024-1443,0,0,d64ab6359e51b21266d3040ac868c3e514796f54387001a584845450bafd7a7e,2024-11-21T08:50:35.827000 CVE-2024-1444,0,0,56cc1378c4a049cbaf1603e47be22d792d424ac802b4bd15d8f7ed435163d8dc,2024-02-16T17:15:08.710000 CVE-2024-1445,0,0,9033b90861f7285eae992be67e87fa2af5ca400c3f531050c841d15e90f13438,2025-02-27T22:03:40.670000 @@ -248169,7 +248170,7 @@ CVE-2024-1721,0,0,d0c914e77af4545b0584eaf250ba5ee3ac40626828eb6c5198526b9da864dd CVE-2024-1722,0,0,2f8380e4faab36562505848e0f3e8b24fceb1e65479ce875a559cbcf5e30527d,2025-02-14T17:24:40.253000 CVE-2024-1723,0,0,11d3a45a60abd75514c9d5b662d454bbccfffc4644e8e6300f550c3165594abc,2024-11-21T08:51:09.993000 CVE-2024-1724,0,0,b6939c282714eb0a778dca5ac11d48814e19c1fa2e871297c9ec9803570c2103,2024-11-21T08:51:10.117000 -CVE-2024-1725,0,1,c49e15e382bfabd0a0cdb614647abc7293de465c4bc389c49725ead47acce1e9,2025-03-11T16:55:54.263000 +CVE-2024-1725,0,0,c49e15e382bfabd0a0cdb614647abc7293de465c4bc389c49725ead47acce1e9,2025-03-11T16:55:54.263000 CVE-2024-1726,0,0,5f254584205b82d10fa82259cc018f6a7e67209450947674089aa2a53b6163a7,2024-11-21T08:51:10.430000 CVE-2024-1727,0,0,835ea1a8de83b3427eca53b821927695e2fbfdeed0970e648bc2bbc24acad5f8,2024-11-21T08:51:10.560000 CVE-2024-1728,0,0,65ac5027c66230a900a5259c3b3bb10c527fa4ddae212a665be9e3b619bf334f,2024-11-21T08:51:10.707000 @@ -248214,7 +248215,7 @@ CVE-2024-1767,0,0,baef958abb8d02ce0e77d39e5455301fda321cb3c7dbc1f62e744892ba3db0 CVE-2024-1768,0,0,084ea6e85b6e0db23c5de56c4e455942100ac7c25c4612406b0ed1fa01484f30,2024-11-21T08:51:16.190000 CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa566,2024-12-23T17:21:56.777000 CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000 -CVE-2024-1771,0,1,3ea2f5226776062012b591b88fae846979789fdefd15944d103f97583a853f0a,2025-03-11T16:42:28.580000 +CVE-2024-1771,0,0,3ea2f5226776062012b591b88fae846979789fdefd15944d103f97583a853f0a,2025-03-11T16:42:28.580000 CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000 CVE-2024-1773,0,0,8c65223f5516c06a2296cf03b178bcc4f946b8107a149044c776ecc9d166fc1e,2025-02-07T19:25:53.603000 CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000 @@ -248411,7 +248412,7 @@ CVE-2024-1972,0,0,0cc508917c2a729c9424480608443d75bc2e0685066a841069988bd5d702f9 CVE-2024-1973,0,0,bdcc19c6cd3463ae97ce819fbb0ae7d75ae93c2f8b01f9a3134154723cf24538,2024-11-21T08:51:42.740000 CVE-2024-1974,0,0,eaa50a4b08004c31860f05e044d5035945cf42def5f73984f24e27883e4f1dd6,2025-01-22T17:28:42.213000 CVE-2024-1975,0,0,1ae0a6f555a0b739aa7c380171466dc1803a13ce978f8add5306445e96cc4399,2024-11-21T08:51:43 -CVE-2024-1976,0,1,721a06b8c0569106f65a760df35d94dadd89ddf9ce5caee99bfdb33cc6bf531b,2025-03-11T16:47:09.213000 +CVE-2024-1976,0,0,721a06b8c0569106f65a760df35d94dadd89ddf9ce5caee99bfdb33cc6bf531b,2025-03-11T16:47:09.213000 CVE-2024-1977,0,0,b866919a45ab83f05a121c6cfdedc8a9e6189ad67b4d630b7e1d7f06da0f1de5,2025-01-16T17:49:32.567000 CVE-2024-1978,0,0,f34d08f80c401194bafc483f71731efa7c10b199979cff06480c329f89074d9c,2025-01-16T19:01:27.267000 CVE-2024-1979,0,0,450c8bced69f6acee39bec8a0cbc5907a91ea6349c4a430e3400e611d5082a4e,2024-11-21T08:51:43.507000 @@ -248421,10 +248422,10 @@ CVE-2024-1982,0,0,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c65 CVE-2024-1983,0,0,d9c72e827fe08e23ba8309cdc8a75a80cb26ff8e98e26a622c2a30cd23478f17,2024-11-21T08:51:43.910000 CVE-2024-1984,0,0,920a1bc7dc8c1d74f9ff491089d69f3f520c921e97285bdabccea7eeadcef6ee,2024-11-21T08:51:44.100000 CVE-2024-1985,0,0,4057968660f4629a99234942fb0c77f034584df8c8d7585d728187ed350ba8f2,2025-02-05T16:43:56.660000 -CVE-2024-1986,0,1,9b98c609bb8992e2b4aca6821d4dbd4522e2f2a7233df6ab200c59c164e306f3,2025-03-11T16:40:10.820000 +CVE-2024-1986,0,0,9b98c609bb8992e2b4aca6821d4dbd4522e2f2a7233df6ab200c59c164e306f3,2025-03-11T16:40:10.820000 CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000 CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000 -CVE-2024-1989,0,1,fb90ba8d298433814d9991719c5f96161751eef3cf6f5242d4f23501e06d7ccc,2025-03-11T16:41:12.650000 +CVE-2024-1989,0,0,fb90ba8d298433814d9991719c5f96161751eef3cf6f5242d4f23501e06d7ccc,2025-03-11T16:41:12.650000 CVE-2024-1990,0,0,269ecdaa26e7f72c4581113e86aecb027ddb59a00bb2be22c9f1e5fe0de2de0f,2025-01-17T19:30:21.120000 CVE-2024-1991,0,0,609f174783bfbfc114313c7a20f55f994a40d20e0ff7bf44be0d1102da2583fe,2025-01-31T01:32:27.643000 CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000 @@ -249262,7 +249263,7 @@ CVE-2024-20976,0,0,d9e9d842a75999180cd3f8cad15f57db60646afab8913f8de843091e9c63b CVE-2024-20977,0,0,e2c8ac5cdf6105166e03ada781b7e22b6cfa6139535dfabda7b89d42e76cc173,2024-11-21T08:53:33.010000 CVE-2024-20978,0,0,10827d75f3e8fd282801ddc8ce15cf40092565a4e558c0cba817213fcf3baf86,2024-11-21T08:53:33.140000 CVE-2024-20979,0,0,c2e22efcc3391b3cff2af42cbbe4c99448a9ff390e8ac1d56f07df68987a1379,2024-11-21T08:53:33.267000 -CVE-2024-2098,0,0,aeac2e2c8a6fedb966c4447cf4902e8d12dc788c230a9dc90c7b6b9cb4fccb43,2024-11-21T09:09:02.067000 +CVE-2024-2098,0,1,aace50279ae26a437055e6212192313e684d14814480be4552b6484e8f22c833,2025-03-11T17:30:52.803000 CVE-2024-20980,0,0,757ff6975fcbd959a7c8d660b7c3b37dbc1e514e0d5ea371d15eb8ad23a05f8c,2024-11-27T16:37:00.523000 CVE-2024-20981,0,0,1ee7ad07413b3db1b2ff9605089acc5acbfc2edb1a7ca35c8fdeb3b1d7dc96b5,2024-11-21T08:53:33.523000 CVE-2024-20982,0,0,0ac67af3500f3bf313485afaaba382408c1b0c43663924f3423096dc21a9e420,2024-11-27T16:36:58.220000 @@ -250740,21 +250741,21 @@ CVE-2024-22636,0,0,1e4cdb2e19498454c9737dcc475529caca1b19ae7a7edc7a426850b53d2e4 CVE-2024-22637,0,0,039dade77fb191dfff09d08e405b542969a40a1d849914bee2191918ea512437,2024-11-21T08:56:30.870000 CVE-2024-22638,0,0,108c8d542114070b6bb19320dbaaed817ba8f9ac690df310bade69c7c6ad70ee,2024-11-21T08:56:31.130000 CVE-2024-22639,0,0,b53eee7dd80d478ea7b648e5833080319bd362dcf02e89daf46cd874e11917e4,2024-11-21T08:56:31.303000 -CVE-2024-2264,0,1,232f67d48922124185b77f3f2d22dd07a1ecb262fe1a85256c747ae02d4e1317,2025-03-11T16:54:11.227000 +CVE-2024-2264,0,0,232f67d48922124185b77f3f2d22dd07a1ecb262fe1a85256c747ae02d4e1317,2025-03-11T16:54:11.227000 CVE-2024-22640,0,0,36d03e2cc909d79303f2eb78528e93e4fa6104824792fe48795b4980eb53856d,2024-11-21T08:56:31.477000 CVE-2024-22641,0,0,856997cba980d31d366e37b94b0280a7e60234a998b80aca46f5f187c46c3c1f,2024-11-21T08:56:31.717000 CVE-2024-22643,0,0,7d4b7a061bc3ed794466e62486d751770d3631735470a24af5d97437931c0235,2024-11-21T08:56:31.947000 CVE-2024-22646,0,0,897269ea5a23769f1e114da4b7edb99d6a5804625943364785d03f7623433ad8,2024-11-21T08:56:32.110000 CVE-2024-22647,0,0,959369f80422c942be459d7a75ac3f8d8e95fde82ea38d6255b4ac420d054c40,2024-11-21T08:56:32.270000 CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69b0c,2024-11-21T08:56:32.420000 -CVE-2024-2265,0,1,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000 +CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000 CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000 -CVE-2024-2266,0,1,62cdec52c3b043a305a2e8df6661c578fa55e3ccbfd1587b0dddb8b3d043f390,2025-03-11T16:53:46.840000 +CVE-2024-2266,0,0,62cdec52c3b043a305a2e8df6661c578fa55e3ccbfd1587b0dddb8b3d043f390,2025-03-11T16:53:46.840000 CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000 CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000 CVE-2024-22663,0,0,6782a4082917ca38ebefef21e6f884aa140361fc8b102266ad8603a42c670e55,2024-11-21T08:56:33.187000 CVE-2024-22667,0,0,edadec3a89e6c904804bef3249f22b6ef314bb09dc1b9905e67b22ac9563e6a1,2025-02-05T17:29:53.050000 -CVE-2024-2267,0,1,146a68e8c974bf1fe2a1896be2a5d484d82af8e3d85c42d653d86b50d3d2386f,2025-03-11T16:53:27.713000 +CVE-2024-2267,0,0,146a68e8c974bf1fe2a1896be2a5d484d82af8e3d85c42d653d86b50d3d2386f,2025-03-11T16:53:27.713000 CVE-2024-2268,0,0,6d4e388d01cad7696055cb5384a116da443134cd3dd3539603ce459631f4aee3,2024-11-21T09:09:23.440000 CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000 CVE-2024-2269,0,0,b232691159734d72e16ba92082c60703628bf04e21c3699c7081fa618b278db0,2024-11-21T09:09:23.580000 @@ -257847,7 +257848,7 @@ CVE-2024-32115,0,0,c848180be95bbc961b1fa26b25498cb9780e7ec1c116797482a6eccbb7c27 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000 CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 -CVE-2024-32123,1,1,2faf8987365127bdaafb0cb2ff51b70fb8608b065e7754f4c1a57ee6623eb5e0,2025-03-11T15:15:41.353000 +CVE-2024-32123,0,0,2faf8987365127bdaafb0cb2ff51b70fb8608b065e7754f4c1a57ee6623eb5e0,2025-03-11T15:15:41.353000 CVE-2024-32125,0,0,35c62d76638cb3e6e8a0b666fab0d78df4c4a5a2cc2247a2353bf686c3ce91e4,2024-11-21T09:14:30.493000 CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000 CVE-2024-32127,0,0,dded2ba7f0afc7a4f66304fe4ecc3b2ff22d2370ed0fac28ea97950754f4c2c6,2024-11-21T09:14:30.743000 @@ -257855,7 +257856,7 @@ CVE-2024-32128,0,0,08562bbc455e54be5f8c6b603fdb113b59fda8f97c2f76746f7a4630c624f CVE-2024-32129,0,0,d16f8aefb22f7ae6850ec22edd836097dfb4013decd38f841d13287f82cd1751,2024-11-21T09:14:30.977000 CVE-2024-3213,0,0,0931066935674f69235a7221dec8ca90941b739dbef30344508148d34c75f231,2025-02-04T17:32:18.910000 CVE-2024-32130,0,0,7bf1164a6a998708333e0d64cebda06ba259463148889bcafcc9c91bdc11036a,2024-11-21T09:14:31.090000 -CVE-2024-32131,0,0,df37004eee472dc501fb04cdc946e02d07614737a4f2ff805912e381bf35e8b2,2024-11-21T09:14:31.220000 +CVE-2024-32131,0,1,9894ca329fafe727711edc2bbeefdd86f89ea036fad6cf072180142d8c1293f5,2025-03-11T17:41:26.170000 CVE-2024-32132,0,0,c48352a5e10debb82abf505144e53b5a01bf774136d160c7d8561d1df34da5f1,2024-11-21T09:14:31.343000 CVE-2024-32133,0,0,fad67c836d86f52936ca6f02ee7a34a41b2a1f585520422cc319f6beed09c340,2024-11-21T09:14:31.460000 CVE-2024-32134,0,0,d7a77f5f1bea6fb22ee1fe468aa9efbf6c5d44696b2edcdec42322ce671d75b9,2024-11-21T09:14:31.580000 @@ -258851,7 +258852,7 @@ CVE-2024-33498,0,0,1f30c91f4e1fa0f80d47e74558faedb6e33193f008defa74408da9a039105 CVE-2024-33499,0,0,7f116e8c4230ef1848187957908348d64a492aad49a5d13e6d4695a9da304020,2024-11-21T09:17:02.293000 CVE-2024-3350,0,0,e59786b43aa812e979d218752afde9eb031596b29f2efdc76a2915844b443c6f,2025-02-11T14:44:28.947000 CVE-2024-33500,0,0,e05afec9b3c6153d2fb5e689d4f464913d13afee88f2b1108d2e9de13f02b158,2024-11-21T09:17:02.433000 -CVE-2024-33501,1,1,b22f5006f03b3bc1c907ca72d07467e05ec47af4bc9a19214a15fbdfc276e4c8,2025-03-11T15:15:41.550000 +CVE-2024-33501,0,0,b22f5006f03b3bc1c907ca72d07467e05ec47af4bc9a19214a15fbdfc276e4c8,2025-03-11T15:15:41.550000 CVE-2024-33502,0,0,b03ad6bdb7d50af328d0ec93aa8c63cc9d0b53d31f47494a80e249bff05450e0,2025-01-21T21:03:02.247000 CVE-2024-33503,0,0,0c9f63716718c75aeaccba8cd0b99b5f4c042abe278d330de5d973c399a6c93e,2025-01-31T17:36:27.323000 CVE-2024-33504,0,0,4f7a7e539d3a7bb985456ceaf1379824ec92908fe83342e88d744ac81e0ced13,2025-02-11T17:15:22.110000 @@ -259955,7 +259956,7 @@ CVE-2024-34803,0,0,4bd59c52e4726c742dabe78f68aa9239f2a39b899d207b3db7da353fae2dd CVE-2024-34804,0,0,192c4f4f2948d4715ef0440490a467fc315394444be44e40a866e6d39b470021,2024-11-21T09:19:25.987000 CVE-2024-34805,0,0,17283f8f0197e4cc3fd1dcafc03642416e0d29b9f118ddc4dc13af4cc9a86e17,2024-11-21T09:19:26.110000 CVE-2024-34806,0,0,bc168fb5c2b918bd30dcc5e0e6ac744af37131bd8c140e0b100699a7849d397b,2024-11-21T09:19:26.233000 -CVE-2024-34807,0,0,e961bc4047b1bdffa74d67758573fdae85523c2f642277932763ed861dd10ac7,2024-11-21T09:19:26.360000 +CVE-2024-34807,0,1,35bfd452213ea2b730e227fdd3fd76b5671c714b9d8689165b742c6f68f66f12,2025-03-11T17:38:49.987000 CVE-2024-34808,0,0,84689f32b1ce8689e5ecf7d32f667bc17dc2689dc60310c5e26541fa7ba4062c,2024-11-21T09:19:26.480000 CVE-2024-34809,0,0,27dcfb66e470cfc816fdb92de7b354028d4b7284db4e2959235ed5c3b8cd8d83,2024-11-21T09:19:26.600000 CVE-2024-3481,0,0,21441da3ee3d7342e7c1bd8558189b4ec572165ab4d93e0a1b2dd42d65b5a24a,2024-11-21T09:29:41.733000 @@ -262121,7 +262122,7 @@ CVE-2024-37521,0,0,94bcfda156f2b0afbf34ae65d204fdf89b55e41cfa34ea7594fd744cf1c83 CVE-2024-37522,0,0,3295cd978c20643eaff8d6fc73318ce6121ff0f18fc4f60672eec9a4623d1a39,2024-11-21T09:24:00.330000 CVE-2024-37523,0,0,4a58bbd7feffbbcd6d15592605f20e33ff3174176d45dec67c359454fa9e0b47,2024-11-21T09:24:00.747000 CVE-2024-37526,0,0,c14e015b0ffc3c7a03c9b0db87f97695869de965578fe806ccbf05feb4ca6d00,2025-01-27T22:15:11.770000 -CVE-2024-37527,0,0,6abf462216eec4257e29e4f6ffc84596d33ba89c914e5d7120e40f23671d5696,2025-01-27T16:15:30.840000 +CVE-2024-37527,0,1,6763d2ec95c379fac015c64f06a0ed842f326dfae874b513428617a8f178d1d4,2025-03-11T18:14:30.137000 CVE-2024-37528,0,0,0e5038324fe3b6f9799a31c377c6705ebf03b5d5e405d251a1f9d9fdb58c17c2,2024-11-21T09:24:00.887000 CVE-2024-37529,0,0,acfccbcbfe6dfb16aecab8f7e844483580e6eb70a780b71713524bc635ce4565,2024-08-23T18:55:48.257000 CVE-2024-3753,0,0,3b84e54e67f6139460e801ecfefc293595c2c267d83aaee816ff9139d106a385,2024-11-21T09:30:19.350000 @@ -264417,7 +264418,7 @@ CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000 -CVE-2024-40706,0,0,ab5ccaa8da9b2aade90c0b962684413af3eb9227492abc46045419b4cddaf377,2025-01-24T16:15:36.150000 +CVE-2024-40706,0,1,a67e7a494f666e8e983a9c3fd81caf84867a707b4594fd9760d25638c5f340cc,2025-03-11T17:58:30.353000 CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000 CVE-2024-40710,0,0,770af878a2a59ef82e06d03d07cf0408429abb3e03291325079d2d5ef2519547,2024-09-09T17:35:04.207000 @@ -265071,7 +265072,7 @@ CVE-2024-41595,0,0,44455fcc40d68fa8f45347482b1d2168aab0c68de0853c639a8e56e911020 CVE-2024-41596,0,0,dc3f2084e5038ea900afa6eff38a3c06bba61537da6fb1551f36d7de90e75c33,2024-10-04T13:50:43.727000 CVE-2024-41597,0,0,8bc3478a40fad9fe08a5b14f99fcfb65827e68ea30f05fc2a19957f05a35e7ba,2024-11-21T09:32:49.140000 CVE-2024-41599,0,0,30614d0617d8ba4a8002a2d49342f24844a4071ab4521a0a1a838eeaf2171d38,2024-11-21T09:32:49.353000 -CVE-2024-4160,0,0,2fa63d9e92a5c96af28abcc476d69f7b43e8d485ecda246ba53e6c30e455d0d0,2024-11-21T09:42:18.253000 +CVE-2024-4160,0,1,261aaed8c544b2603d79ad449c754e734059b7c4711ffc5fb87ffa60d39b9fde,2025-03-11T17:36:27.910000 CVE-2024-41600,0,0,1db142d721a6fdb3dcf7d45dbc2ad34ddbcff1170a1aab3bfbfee51a34447127,2024-11-21T09:32:49.507000 CVE-2024-41601,0,0,24d5874bc7cb95d07f742d5d1793554eddb41d336e6f486826186b821534efaa,2024-11-21T09:32:49.653000 CVE-2024-41602,0,0,e468936d57b3a3622bfd9d63c4330d90ec2e1727d154efe9fd4cd7b9544c36e1,2024-11-21T09:32:49.867000 @@ -268014,10 +268015,10 @@ CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73 CVE-2024-45320,0,0,278f3e436c23697518810a78c3b9b78245686b4943dd896d4ed03278de6fb6ab,2025-02-18T06:15:12.060000 CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000 CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000 -CVE-2024-45324,1,1,4133e76a2b4058cd57a414a0735ec625febe037e9b94067ea126f144c2293bdd,2025-03-11T15:15:41.743000 +CVE-2024-45324,0,0,4133e76a2b4058cd57a414a0735ec625febe037e9b94067ea126f144c2293bdd,2025-03-11T15:15:41.743000 CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000 CVE-2024-45327,0,0,d09034f28dc7eb04e46d8b30e26f6e91afaa4624a6ce1f471921ca0a81a0814b,2025-01-21T21:58:26.373000 -CVE-2024-45328,1,1,11f11b7289e12a876badbd8e94658387a6a3d463241f480366ea749a2022371c,2025-03-11T15:15:41.963000 +CVE-2024-45328,0,0,11f11b7289e12a876badbd8e94658387a6a3d463241f480366ea749a2022371c,2025-03-11T15:15:41.963000 CVE-2024-4533,0,0,565c4992f22cce399c7ec79b1c1f5241de1ceb51c7019357739f36b97aa0a0ff,2024-11-21T09:43:03.177000 CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000 CVE-2024-45331,0,0,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000 @@ -268759,7 +268760,7 @@ CVE-2024-46655,0,0,619756e28facd4dcca44a3c94ed931cf61b4408f1c51eeb5eca49c9e1ace2 CVE-2024-46657,0,0,a5ced2fc9af0ce563815dae98d1fb612587af65b11df31ab1959075bb6481834,2024-12-11T16:15:11.770000 CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c6d5,2024-10-07T19:37:30.467000 CVE-2024-4666,0,0,b7505f51131c566a65a04c854bf3da56137a32df8f67317652113aca5c7be8be,2024-11-21T09:43:20.073000 -CVE-2024-46663,1,1,02c9063bc1f46f6ec7418f43b4f986605256f7597000bf034817913025656f4e,2025-03-11T15:15:42.130000 +CVE-2024-46663,0,0,02c9063bc1f46f6ec7418f43b4f986605256f7597000bf034817913025656f4e,2025-03-11T15:15:42.130000 CVE-2024-46664,0,0,f54dbed03769eeb78c38ac376a02143972104b9e7c971603cb26dcfe7d10522c,2025-01-31T16:37:48.283000 CVE-2024-46665,0,0,ef84340be5f24c6331b3c4cb8bb0c1f046ee2bbf6a690df5c86ed76a3b7f8a7a,2025-01-31T16:09:23.847000 CVE-2024-46666,0,0,8cb884f5e29fd5cfbec8babcd5171e651caec0625bb78127caef38457e72b5d9,2025-02-18T22:15:11.220000 @@ -272255,11 +272256,11 @@ CVE-2024-51300,0,0,33bc9629d8540cbc2a733d31834d387baeb17f5f2187d5a5ac9dba848e387 CVE-2024-51301,0,0,b66b641e4139e8ebaacd5ea6b531eed897a4506f18dea4aecced28d30671fab9,2024-11-01T12:57:03.417000 CVE-2024-51304,0,0,1e110f5dd97c111e86ad4208bc6fd08aebd2d72d5bb280d26d0c29b8a309ef6b,2024-11-01T12:57:03.417000 CVE-2024-5131,0,0,da5e519e37c4c18d994f27345cf3977fa837f039bcfa4f9d0e1faf90c1e84ff4,2024-11-21T09:47:02.353000 -CVE-2024-51319,1,1,2e10ad98f289bc32afe74a5132b79998845ade77f388d58a7300df2e3a60ac10,2025-03-11T15:15:42.313000 +CVE-2024-51319,0,0,2e10ad98f289bc32afe74a5132b79998845ade77f388d58a7300df2e3a60ac10,2025-03-11T15:15:42.313000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 -CVE-2024-51320,1,1,148a9b02d8313a38924d776ff31fd5c461323d8ed756be9f7a634f21c9e2ac8c,2025-03-11T15:15:42.447000 -CVE-2024-51321,1,1,3694f3f7720c2bc27f120049121c7803418bcb2120cd7be5fe47551e76c383a6,2025-03-11T15:15:42.570000 -CVE-2024-51322,1,1,f2b808cf5678dc485ab43515f10449914ab03abadd8400eebe996db1d2691758,2025-03-11T15:15:42.700000 +CVE-2024-51320,0,0,148a9b02d8313a38924d776ff31fd5c461323d8ed756be9f7a634f21c9e2ac8c,2025-03-11T15:15:42.447000 +CVE-2024-51321,0,0,3694f3f7720c2bc27f120049121c7803418bcb2120cd7be5fe47551e76c383a6,2025-03-11T15:15:42.570000 +CVE-2024-51322,0,0,f2b808cf5678dc485ab43515f10449914ab03abadd8400eebe996db1d2691758,2025-03-11T15:15:42.700000 CVE-2024-51324,0,0,eae5779c3dbd2366931d9bbf9284e8b16a0b71d3d019224bd3ee356a90e26f8b,2025-02-12T22:15:39.830000 CVE-2024-51326,0,0,32849095581e0af021d41eb6c3bbf891e7ba8499eb2382e7af07f008ba32d1d0,2024-11-06T15:02:12.403000 CVE-2024-51327,0,0,5850f25922ddeec5e8ef2cdf5d18bbd20c5c5a49e7b4e65d69d89cf904135f25,2024-11-06T15:02:55.710000 @@ -273021,7 +273022,7 @@ CVE-2024-52359,0,0,369d7e884d604d2eb0066df48107e087ee920c6d8b4747eda22757a28e2ab CVE-2024-5236,0,0,72033f225b8e0f124fc18b2ff12bb6275fc9f43982b89fe31becf9dbada4218d,2025-02-26T21:40:19.337000 CVE-2024-52360,0,0,c4fe414474e842e8d63dc12dceaaf2879cc1099be8df01a296711ea8cd0807c0,2025-03-04T18:19:12.327000 CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26140,2024-12-18T16:15:13.967000 -CVE-2024-52363,0,0,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000 +CVE-2024-52363,0,1,020088c656f01af56fe92b05626fc44e51ac8fe8d3809ea0243ca671ceb559be,2025-03-11T17:53:21.153000 CVE-2024-52364,0,0,82606ab35773dfde3fb3002f292688c503168f9c71015cb6232e593a409c127a,2025-02-05T12:15:28.743000 CVE-2024-52365,0,0,67d0593b9ab22b3d0e70ebc54cc166e413b2572e8cebaba6bf7845898f27108c,2025-02-05T12:15:28.917000 CVE-2024-52366,0,0,8d4807b7da1551c2337cd8fbb0f4960a85f72dc7f8084a3578c5eac6aee2fa69,2025-03-04T19:30:24.047000 @@ -273466,8 +273467,8 @@ CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be50 CVE-2024-52958,0,0,98e92315476166e2b33ba1e5334b4d282532d45d1556c1889e5c3ca4b973b75e,2024-11-27T06:15:18.590000 CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931881,2024-11-27T06:15:19.083000 CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000 -CVE-2024-52960,1,1,233636e10d8786909f484dfb9dcd5a910159cd5a09c9722d5ccf26e64c25bdee,2025-03-11T15:15:42.813000 -CVE-2024-52961,1,1,8f690f3ac82316cb2ca972521b76bf71dc739ec9aa0a660930965a33c544d76c,2025-03-11T15:15:42.960000 +CVE-2024-52960,0,0,233636e10d8786909f484dfb9dcd5a910159cd5a09c9722d5ccf26e64c25bdee,2025-03-11T15:15:42.813000 +CVE-2024-52961,0,0,8f690f3ac82316cb2ca972521b76bf71dc739ec9aa0a660930965a33c544d76c,2025-03-11T15:15:42.960000 CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000 CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000 CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000 @@ -274237,10 +274238,10 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 CVE-2024-54015,0,0,15d5e1f3ec3d810c595ec1f32b64edabb37773d7fc12e946dfae697ba0178074,2025-03-11T10:15:15.450000 -CVE-2024-54018,1,1,dc8039244849f098489d5e2d0a96dd0b014c4c4a2ca7cba777f8b01232f5b796,2025-03-11T15:15:43.113000 +CVE-2024-54018,0,0,dc8039244849f098489d5e2d0a96dd0b014c4c4a2ca7cba777f8b01232f5b796,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 -CVE-2024-54026,1,1,c81b5f16f7918a61df17870ba5998cee06532556ca31b9249a0a740899d5fa57,2025-03-11T15:15:43.307000 +CVE-2024-54026,0,0,c81b5f16f7918a61df17870ba5998cee06532556ca31b9249a0a740899d5fa57,2025-03-11T15:15:43.307000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000 CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000 @@ -274325,7 +274326,7 @@ CVE-2024-54135,0,0,77abd8154d8be3db4d7c9a03332ccd4782b63a6662a48190c38b32b12c923 CVE-2024-54136,0,0,80704e0566a081b20b8eab10be4518ccdfa42ef09f8212c54ca1e875893e5b3f,2024-12-06T16:15:22.500000 CVE-2024-54137,0,0,399d2df4e6b74eb8cfc8f334c4fdddeca2483bd8f66667dd2fd1dfb49e3c09f3,2024-12-06T16:15:22.637000 CVE-2024-54138,0,0,24479f8b306f3a947f6a1356e02b128912af7a0f233c0d8af6849988772fc0dd,2024-12-06T22:15:21.880000 -CVE-2024-54139,0,1,85f4ecc3d5596ad60d965730d70a86223263f918fe4ceea08e540d594e22e620,2025-03-11T16:44:20.720000 +CVE-2024-54139,0,0,85f4ecc3d5596ad60d965730d70a86223263f918fe4ceea08e540d594e22e620,2025-03-11T16:44:20.720000 CVE-2024-5414,0,0,5121b02a6b535c7a985e876782b07c16fe258b67f2027b8e6e110fd30fd4eea8,2024-11-21T09:47:36.480000 CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f669,2024-12-05T22:15:20.400000 CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000 @@ -275033,11 +275034,11 @@ CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000 -CVE-2024-55590,1,1,2314eaa7dec81b8bed45b970c8c49b68532c401ec78d9b49350e5348ba11fcd2,2025-03-11T15:15:43.650000 +CVE-2024-55590,0,0,2314eaa7dec81b8bed45b970c8c49b68532c401ec78d9b49350e5348ba11fcd2,2025-03-11T15:15:43.650000 CVE-2024-55591,0,0,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000 -CVE-2024-55592,1,1,fb226d1a840c3545d9fec57f603b2bc6540521c0208c0d286c3f12f6787fcb0e,2025-03-11T15:15:43.823000 +CVE-2024-55592,0,0,fb226d1a840c3545d9fec57f603b2bc6540521c0208c0d286c3f12f6787fcb0e,2025-03-11T15:15:43.823000 CVE-2024-55593,0,0,4651565ceba3085bb8ca70fe9039d9f6a893a058022ead3391b6c8b5d7155600,2025-02-03T22:06:19.163000 -CVE-2024-55597,1,1,69e67101b9cbc9c0c4538abf03d0ccea9cd7cc11d97b2f16830f06083c78931a,2025-03-11T15:15:44.010000 +CVE-2024-55597,0,0,69e67101b9cbc9c0c4538abf03d0ccea9cd7cc11d97b2f16830f06083c78931a,2025-03-11T15:15:44.010000 CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000 CVE-2024-55601,0,0,9b35d862d187fd3c6770804bae011b28b724e76b6c1dd4a3a89f0f4207a3e507,2024-12-09T22:15:23.100000 CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000 @@ -275322,8 +275323,8 @@ CVE-2024-56186,0,0,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8 CVE-2024-56187,0,0,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000 CVE-2024-56188,0,0,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 -CVE-2024-56191,0,1,77d84834f877e83cc26c98877dcd83bef54eea22cda79a792579609d9f5e120c,2025-03-11T16:15:16.743000 -CVE-2024-56192,0,1,e891313d3a3d881ff3fb16ff06f440a0adf6d5a24add6a642e38837e41b3d035,2025-03-11T16:15:16.900000 +CVE-2024-56191,0,0,77d84834f877e83cc26c98877dcd83bef54eea22cda79a792579609d9f5e120c,2025-03-11T16:15:16.743000 +CVE-2024-56192,0,0,e891313d3a3d881ff3fb16ff06f440a0adf6d5a24add6a642e38837e41b3d035,2025-03-11T16:15:16.900000 CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000 CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 @@ -275469,6 +275470,7 @@ CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000 CVE-2024-56336,0,0,af67c51d7330cb9b4c5f720a010c0e0f7809d3f12c90e78bbe6079a468ddee2e,2025-03-11T10:15:16.007000 CVE-2024-56337,0,0,53003cbffc45df9623db82452361ba8a0a459ad2bf417245b4c8041b16113fd7,2025-01-03T12:15:26.787000 +CVE-2024-56338,1,1,69734fbb13906b69d9d8e77083d5ef9ea7381f6fc8ce7dd1b9da766506b235a4,2025-03-11T17:16:17.120000 CVE-2024-5634,0,0,a3b1c7a96781d36c1038c26ab5a2d267e349913830cb93adfed7285bdb2a684b,2024-11-21T09:48:03.610000 CVE-2024-56340,0,0,9b453f173d43e3f7b37887ea91bdbb36629dfe55ccdad720659cf38188277eaa,2025-02-28T03:15:10.363000 CVE-2024-56348,0,0,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000 @@ -275992,7 +275994,7 @@ CVE-2024-57076,0,0,a4301dc8c719713b2bf3ef14d74b374b3b1326bf632a40667748381175882 CVE-2024-57077,0,0,7e91ecaeb331b325dd9c83a7290691dffc4a313d4038d1623436c32c21c6ab03,2025-02-18T19:15:20.913000 CVE-2024-57078,0,0,8a97c0044f9389b0d62cf913697a59c2df3cf0e5be07cc788ae566056503f0a1,2025-02-06T16:15:40.497000 CVE-2024-57079,0,0,003892d85d009f7cff445d154f4ad03f2f15d06fb8c24131e51b075d037788a3,2025-02-18T19:15:21.027000 -CVE-2024-5708,0,0,b04ad0f913b2d245d6b4a372a855e76f4715557d716e5955439a341f72db96e9,2024-08-06T16:30:24.547000 +CVE-2024-5708,0,1,277198536a944775deb4cab7421e27d09aeec44244d8a7c393c8c0d82d0875be,2025-03-11T17:28:36.350000 CVE-2024-57080,0,0,ed4464ba7930048d62a3426c26c5515301e6750f4a9c17de192f847c86cb0b80,2025-02-06T17:15:19.933000 CVE-2024-57081,0,0,e5538b4430076c7a9a0b171f687994ba9875abfe26c27caa7e074dfeaf041a22,2025-02-18T19:15:21.140000 CVE-2024-57082,0,0,e4f71ce57a79c34c72f0ce234fbf504f73bfa623a35d6784e5d6f316dc7db45f,2025-02-18T20:15:22.483000 @@ -276986,7 +276988,7 @@ CVE-2024-6257,0,0,3c450049ad1a84e0b297a8d37be25b1d0e2549032909d0064d332ba84cab26 CVE-2024-6258,0,0,9f8fd150e46db75469fd7fc658db5aa120700d36ac5826497f097b978edd30a4,2024-09-19T01:40:32.813000 CVE-2024-6259,0,0,c6f96fdcb3ff3fff17080c8c4b550038410883f348096d5bc80a22f11eca4cfc,2024-09-19T01:33:36.477000 CVE-2024-6260,0,0,d4af7b4cfc44f08d8432811020e56f72bfcd7f1f60b9158bd5a407cfd9935f76,2024-11-22T20:15:12.013000 -CVE-2024-6261,0,1,4b0ca53c793968c715a704527aa4216ee372b1d4251b03a5da1b268d5ce019b7,2025-03-11T16:32:04.440000 +CVE-2024-6261,0,0,4b0ca53c793968c715a704527aa4216ee372b1d4251b03a5da1b268d5ce019b7,2025-03-11T16:32:04.440000 CVE-2024-6262,0,0,25f9bfdcc4aa7fbe45f36b65288775ce8759f234561b7e68f77257c5e457e984,2024-11-21T09:49:17.823000 CVE-2024-6263,0,0,64ac66a765d88001d3119809569f68e9e73208abe19a92eeb56f7a4ffa929880,2024-11-21T09:49:17.943000 CVE-2024-6264,0,0,02e86a9a4bf982b67050a877dc734ef40fad5667e32ddac6d7d5d04963214bed,2024-11-21T09:49:18.070000 @@ -279519,6 +279521,7 @@ CVE-2024-9150,0,0,a71859d524acf6115eb959ba60ad17bd5abb4a22b920695c51f16760c31265 CVE-2024-9154,0,0,10c686be97e780f4f6e6444839c6c04b63fc77477fab652ecfbb9dcc548afff5,2024-12-22T07:15:06.307000 CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000 CVE-2024-9156,0,0,f51f01b34d81b342f8758ec8a55450b2ee8e6ae57d651f88883c804dd1af5436,2024-10-15T14:40:45.093000 +CVE-2024-9157,1,1,510030c595263b915cc1e4f89337d9290a00c6ef0d416adc0a4e880e821f15be,2025-03-11T17:16:17.330000 CVE-2024-9158,0,0,0b7269f695a88179972d1f8bd54450607592163690fc2a1df7db61f3d67ca9ad,2024-10-07T16:13:49.027000 CVE-2024-9160,0,0,31ee71c8694d32148d135e3bd44456b5f7d24b3275d5c1de1c0a53c0e831c3e8,2024-09-30T12:45:57.823000 CVE-2024-9161,0,0,5b42d22c820a004a18d0659ab11e5cf7b6b17ebdad8f937ff212dcc2ad59ab5f,2025-01-29T18:56:32.393000 @@ -279547,7 +279550,7 @@ CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000 CVE-2024-9193,0,0,e9fcabeca8c2a679cb4268e62dc1a9ef8ec799fb5d366ccb5b675730020983a2,2025-02-28T09:15:11.437000 CVE-2024-9194,0,0,1077144cc77b6254f33936a25ffd1f7bfdaa1a60153ac4b35fb53e4c8f3eb6e6,2024-11-21T17:15:27.480000 -CVE-2024-9195,0,1,fc36972059984bb59ac8e6b7f38a03aaaa1f1346862dca07117632e8f3cf8c55,2025-03-11T15:49:13.197000 +CVE-2024-9195,0,0,fc36972059984bb59ac8e6b7f38a03aaaa1f1346862dca07117632e8f3cf8c55,2025-03-11T15:49:13.197000 CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000 CVE-2024-9197,0,0,33c1567de1a18762ef3858935357bc00f6cde05df47d6c1305df2581bf9eb8d5,2025-01-21T21:18:24.393000 CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000 @@ -280281,6 +280284,9 @@ CVE-2025-0145,0,0,fa1cca7a3820491168930060335690235606867b1573b086001c6a9b0b6497 CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0ed,2025-01-30T20:15:34.907000 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 +CVE-2025-0149,1,1,3ad1add32e98e485e7a54777b18096b40d101b40e1fc61cd189f47f97285948d,2025-03-11T18:15:29.663000 +CVE-2025-0150,1,1,57a18e4097b8c594c3156d21e3a95ebf256ebcc90d3cf1e0211dd0013217533b,2025-03-11T18:15:29.800000 +CVE-2025-0151,1,1,e21eec9dd70c0c2895afef7aa40462ce96e04afb5ed26df2696d388972a78287,2025-03-11T18:15:29.940000 CVE-2025-0158,0,0,9c1de144d1a0a3d7e92dd988e0992691cec26ba223fe44dad9f5ed52755dc256,2025-02-06T21:15:21.923000 CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000 CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000 @@ -280580,7 +280586,7 @@ CVE-2025-0583,0,0,3309be0bd9417030616155e70103c52eaa78dc57edd605475e0a342fdeb599 CVE-2025-0584,0,0,b6ebfcb7703542335a8173fc5a4ab8c33a7e3e0c6c92bba5dc58412b0c892d56,2025-01-20T03:15:09.120000 CVE-2025-0585,0,0,119134bf231d480ab92b157699965013bafbfc56920a2e232ae3b58aecfc3ffd,2025-01-20T03:15:09.283000 CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b437,2025-01-20T03:15:09.433000 -CVE-2025-0587,0,0,758bde2366f1b5a4a9cf6a8b0b502beae68c942d297edfdae91b1d36d418c373,2025-03-04T04:15:11.240000 +CVE-2025-0587,0,1,cd639fd4fa3e9545151aa64e7b65f4904390ed415b165d16be2ffa54e634512b,2025-03-11T18:07:22.823000 CVE-2025-0588,0,0,105c6e2f1707afb6fe1d795e929817750010d681e996f4066665b271dfe4e5c8,2025-02-11T15:15:19.673000 CVE-2025-0589,0,0,b8e8405a2d4c9e015de1ea53fbbafdf6cbc934d741c73f04d4cecba6da66759b,2025-02-11T16:15:49.667000 CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237d6,2025-02-18T20:15:23.477000 @@ -281002,7 +281008,7 @@ CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9 CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 -CVE-2025-1282,0,1,124879e93e6bb778f215176375d975ac746201c3f19a3ffa344b76a1a781600c,2025-03-11T16:08:00.790000 +CVE-2025-1282,0,0,124879e93e6bb778f215176375d975ac746201c3f19a3ffa344b76a1a781600c,2025-03-11T16:08:00.790000 CVE-2025-1283,0,0,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000 CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9dfb,2025-03-08T09:15:31.590000 CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 @@ -281088,7 +281094,7 @@ CVE-2025-1435,0,0,d840829e9adebbd2e05cc9e4789e2ef73a3bfba41e90989d315c56fa7ea84a CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000 CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000 CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000 -CVE-2025-1450,0,1,6ec73f6e6cf96ef1bc86e6c9120d538e032062f45d5e518108c7bc768f28c558,2025-03-11T15:46:05.180000 +CVE-2025-1450,0,0,6ec73f6e6cf96ef1bc86e6c9120d538e032062f45d5e518108c7bc768f28c558,2025-03-11T15:46:05.180000 CVE-2025-1459,0,0,84da8b0d00734a81887e372630f8aae1161cbf72d12203a68a08585146659d7a,2025-03-01T07:15:10.980000 CVE-2025-1460,0,0,a5c8e5382cd35abbaca03691402634777bdd210b53f824eaa70027825fcc1ff3,2025-02-26T23:15:10.193000 CVE-2025-1463,0,0,66bff7e70ca672b5367a8323921deb52eeae1be259f6bf189f389bd789ca9f1c,2025-03-05T12:15:35.270000 @@ -281200,8 +281206,8 @@ CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e10 CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000 CVE-2025-1686,0,0,aeb3e336ffe94b1c0a7e4872f92b31f7de132db0e69b60fe0611b8798ab6716d,2025-02-27T15:15:40.940000 CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000 -CVE-2025-1689,0,1,049ae4dee98f065b7f7f52ce04df5123177e15522ad59dafeab6f6ff67faccdb,2025-03-11T16:19:41.870000 -CVE-2025-1690,0,1,c42b6345f56018d5d381c14a2d743b6ae6c7942dfe15639a3c3d47de6c96a0de,2025-03-11T15:59:35.800000 +CVE-2025-1689,0,0,049ae4dee98f065b7f7f52ce04df5123177e15522ad59dafeab6f6ff67faccdb,2025-03-11T16:19:41.870000 +CVE-2025-1690,0,0,c42b6345f56018d5d381c14a2d743b6ae6c7942dfe15639a3c3d47de6c96a0de,2025-03-11T15:59:35.800000 CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000 CVE-2025-1692,0,0,2e6d02e2120ba7cdd2d2dce988c300f2bd2785f615f13934cbd4bb5f104f2bf7,2025-02-27T13:15:11.413000 CVE-2025-1693,0,0,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f50,2025-02-27T13:15:11.563000 @@ -281210,7 +281216,7 @@ CVE-2025-1696,0,0,ce6275a845a1290c62e8c0fe3a0fcacdf1abe14eafe526218c3da3df65c4ed CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000 CVE-2025-1714,0,0,61e824a1ccdf54ec33bae3dd88565effb2433516529becf60015224f7bb0775a,2025-03-07T05:15:16.233000 CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000 -CVE-2025-1717,0,1,a3187f28d4c7b205f040a730275c0f286adbd6d6550e77331f01e3625795de14,2025-03-11T16:12:42.783000 +CVE-2025-1717,0,0,a3187f28d4c7b205f040a730275c0f286adbd6d6550e77331f01e3625795de14,2025-03-11T16:12:42.783000 CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000 CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000 CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000 @@ -281621,6 +281627,7 @@ CVE-2025-21160,0,0,862a1ab6d16666907185ea583ef8abbee75c3f385bb77ad9385a3d5ed46ee CVE-2025-21161,0,0,dc98f450f7090ac4cd4a639e59b5d7f88758fc138feafd7efe5d6027c5043e86,2025-02-19T23:12:47.180000 CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000 CVE-2025-21163,0,0,e26246ff0281e90ae86c0be76f49aa0531c32701df080849dd0c8c5912fa53e9,2025-02-19T23:11:21.383000 +CVE-2025-21169,1,1,fd1c8f0f2fb3c5ab40d3e4996ff7b4a80f698b48b0446a2e3cb496a6f34532e5,2025-03-11T17:16:18.423000 CVE-2025-2117,0,0,c433443c2971686df66591821ce3726fca7e6d58366225dfa17baadb1f9075a7,2025-03-09T08:15:10.533000 CVE-2025-21171,0,0,2ad53d6d5d0803fb4c8aaf281e1d8978f4a504076700f4a844166f5f5c037cc2,2025-02-05T20:07:01.797000 CVE-2025-21172,0,0,2752dda13ef4b5444713f530f6b1dbc287b8cc852b11521802b533a0d95a9bbd,2025-02-05T20:03:33.053000 @@ -281630,6 +281637,7 @@ CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65e CVE-2025-21178,0,0,c7959eb5f27aa12e423969f2bfc0eb3fb196cb3a2af9c2f656ceade14ab294a1,2025-01-27T18:42:39.560000 CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000 CVE-2025-2118,0,0,1ac16eac1541ef81454bddc60b2e4c9422f4e5c218b8688a4337305f337d463b,2025-03-09T09:15:11.240000 +CVE-2025-21180,1,1,df9a5774b476b7c7e8a9c59dd98ab36f2559c0ce22032f63117614521956818a,2025-03-11T17:16:18.790000 CVE-2025-21181,0,0,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000 CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000 CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000 @@ -281644,6 +281652,7 @@ CVE-2025-21190,0,0,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 CVE-2025-21198,0,0,409f66843b554eefbda1b14eaef7f0d6b61447a101bf7413282917ca002ecb4d,2025-02-28T16:02:50.353000 +CVE-2025-21199,1,1,7802d942fb0256d9f643a8ffbf7c65274c5fae2612e4004220d1b7e1e414398a,2025-03-11T17:16:19.670000 CVE-2025-2120,0,0,10248c9048201befa4f8181190c48cf1217aeca23433be817032d43a13b2d918,2025-03-10T16:15:14.347000 CVE-2025-21200,0,0,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000 CVE-2025-21201,0,0,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000 @@ -281690,6 +281699,7 @@ CVE-2025-21243,0,0,47f3c7fdb1f8388df8473b12c4def680fb786309202939e1fdbdff3e7fe50 CVE-2025-21244,0,0,8fb15ea0226862a5c2086f0f524884716b3904e26dd6182191fd12c6fcba414c,2025-01-24T21:53:59.660000 CVE-2025-21245,0,0,f8977154881a23caac2cbfb367fae61be05ee6a5797e98c1fce578f1bb50e44a,2025-01-24T21:54:08.047000 CVE-2025-21246,0,0,2355d5f1e5f99349a2c983a1867ed42b3be58a725316ed8d7e78af1b25b93990,2025-01-24T21:54:27.603000 +CVE-2025-21247,1,1,81204696069926bcccbb630b7404c444b9ac5f119ecdaf34ce8d47975011092b,2025-03-11T17:16:20.400000 CVE-2025-21248,0,0,5fec9176d3491513238c849ca9f8b98246abbf6bcab1978fcfceaa9a87899f2d,2025-01-24T21:54:19.163000 CVE-2025-21249,0,0,cc0cd96bf402d287899c115acc983f6d8b986d6d0cc004dd6bff6ad28b81b32e,2025-01-24T21:54:39.180000 CVE-2025-2125,0,0,0bb426b75b2dbff3e29d363e4cca36b4e2e1281937adf61b4bb676fb3fe4258b,2025-03-09T16:15:12.550000 @@ -282214,7 +282224,7 @@ CVE-2025-2192,0,0,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee CVE-2025-2193,0,0,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000 CVE-2025-2194,0,0,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000 CVE-2025-2195,0,0,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000 -CVE-2025-2196,0,1,2e4abd9c4f34d1ee0490e793cc34c4f7350a86f2ca91a96b3d64b855f88f05ff,2025-03-11T15:15:45.820000 +CVE-2025-2196,0,0,2e4abd9c4f34d1ee0490e793cc34c4f7350a86f2ca91a96b3d64b855f88f05ff,2025-03-11T15:15:45.820000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 @@ -282246,6 +282256,7 @@ CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977c CVE-2025-22210,0,0,abd3877e40c6e9332d48e0a8769aa45708e26e2efdd35254a970ae6f9ad61b2e,2025-02-25T22:15:15.060000 CVE-2025-22211,0,0,701fcba8693972a604c82eb97a96bbdace18ebf7fb6001a7afd61c15a8dd5788,2025-03-03T16:15:39.843000 CVE-2025-22212,0,0,587f2bcb35f24add109a85302f7771cf3c9f55817e236b14182bc2f7d7261bea,2025-03-05T16:15:37.643000 +CVE-2025-22213,1,1,a58d8d585e5f07002f46f250559f24f93bb62c44229ba6aa07813a1a11542dc4,2025-03-11T17:16:24.577000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855e8c,2025-01-31T18:15:38.247000 @@ -282371,7 +282382,7 @@ CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7 CVE-2025-22447,0,0,a09e9c6c341148275cdf7848d50c90872c1118351a20ee6b95f2dabdacf4dbd2,2025-03-06T04:15:25.377000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 -CVE-2025-22454,1,1,1046ed7645c2324b9db0513cc36c6430cb7f73bcf372319688f1d7839792ac01,2025-03-11T15:15:44.737000 +CVE-2025-22454,0,0,1046ed7645c2324b9db0513cc36c6430cb7f73bcf372319688f1d7839792ac01,2025-03-11T15:15:44.737000 CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 @@ -283401,9 +283412,40 @@ CVE-2025-24031,0,0,f001af7155fa77b1de37ced441ee4e39c1454b911ef9ca1ee83e5bda55f8d CVE-2025-24032,0,0,711d73fff4d7a126365e2f8021790ef1ecebb007f98bc189e7d31602a906fbac,2025-02-18T14:15:28.770000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 +CVE-2025-24035,1,1,b26dc4828c78bd6e05c737ec508138ca7dcce2a6d394a0dd79312033536465d6,2025-03-11T17:16:25.373000 CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000 CVE-2025-24039,0,0,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000 CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000 +CVE-2025-24043,1,1,f1a2d87ebf7a6bf16bf47a534139a8c146ac1bb48d0be3f4bfdf41019641d8e5,2025-03-11T17:16:25.897000 +CVE-2025-24044,1,1,4623d7576021ec936f92a4d95680a350c8d7772e359ef420c6ae102a3d8b92ce,2025-03-11T17:16:26.093000 +CVE-2025-24045,1,1,56567d288cee79d0a8e427e424a36c136b2b0af554de561456fc47a34e229dfb,2025-03-11T17:16:26.290000 +CVE-2025-24046,1,1,81958792fafc7c86167d97ecb4fba4d882c6479936a4c51392ed41e57d5f86fb,2025-03-11T17:16:26.503000 +CVE-2025-24048,1,1,bbceb75a300017b19f460fbf1e634ea963a1b7b326c2180093388e7532c35b83,2025-03-11T17:16:26.703000 +CVE-2025-24049,1,1,dc3eabcd16da1a83e1faec542d78edaf4379de6056bb1896a8a4bc65ac738e2b,2025-03-11T17:16:26.907000 +CVE-2025-24050,1,1,d03c32ef4729c43bf1cf1511608bd2551539ad00ace362a1ea66693b11879994,2025-03-11T17:16:27.273000 +CVE-2025-24051,1,1,13f7b8faac82458093426dafaf7dc4cf9639d8b19e749039fa9d21eada486764,2025-03-11T17:16:27.467000 +CVE-2025-24054,1,1,a14caafb83f5c5889b4aea36f8fa3f67edddeb6afaf57d5e8cec0b041251ba08,2025-03-11T17:16:27.660000 +CVE-2025-24055,1,1,234e6c62f2cdddc94d7ab82d2e74d16a16f9abf17f75d505faad51b75c046cfa,2025-03-11T17:16:27.887000 +CVE-2025-24056,1,1,30acac13e9bc393bc8e55100d538fe919ea8355c2df76ca26ff212c41e4450fd,2025-03-11T17:16:28.130000 +CVE-2025-24057,1,1,adef09dd7c661ef2877dab0a260a2850658ebc67209d7c2c5728d4d2cbef594b,2025-03-11T17:16:28.390000 +CVE-2025-24059,1,1,128154408b6b1de0c4b0729e0950403f9ead186ca13a12644260ba5253382d15,2025-03-11T17:16:28.593000 +CVE-2025-24061,1,1,c198c774089a23f1a5e0d22ec398764229c711b725e4902db61cd159afc28812,2025-03-11T17:16:28.800000 +CVE-2025-24064,1,1,5cadfd9a3fa5d01883c14a68c27e5a865e1f55188589a428ea844ec3cb86b146,2025-03-11T17:16:29.007000 +CVE-2025-24066,1,1,7dd67034aa278778592b7f9808ca1a9157d66a56dbae8590f5a6d20c00024d4e,2025-03-11T17:16:29.223000 +CVE-2025-24067,1,1,52eaf1d9765f3da20ee1ace835521771d6cfa7584bbaa0837f7234d1e80f1fbc,2025-03-11T17:16:29.477000 +CVE-2025-24070,1,1,266d36bb82c66b60a15af1f25bc797ba25b09b0a7d7016e077e9a5550de5778a,2025-03-11T17:16:29.680000 +CVE-2025-24071,1,1,7e10c11ea74036917e2a110f1a364db45ec3570d96a8ad5242fcd0f1ade37311,2025-03-11T17:16:29.867000 +CVE-2025-24072,1,1,08bdc8626b33fcc629e977045f6cae2ec816e1198401d825c727d06e27202d83,2025-03-11T17:16:30.070000 +CVE-2025-24075,1,1,00f1f5516f4da6052aa6cf362c7a33aee2b2874dde5717b947653e9578c10d72,2025-03-11T17:16:30.270000 +CVE-2025-24076,1,1,f47150c1f47c6621533fd00ba5e75165433d3b29b9114f84cde41abdaa01d5ce,2025-03-11T17:16:30.480000 +CVE-2025-24077,1,1,3f842ffabe455d6e6c4fd7304249627631091ab9a542cb59b5f50fddc754ed98,2025-03-11T17:16:30.657000 +CVE-2025-24078,1,1,72c8918a8afbc8c19caf0dba130a1b02d1af77ef22f955a3f9be12b0dbc10770,2025-03-11T17:16:30.863000 +CVE-2025-24079,1,1,30dd51b91bbee173d485367d35f4ddfb50aabe16bba4ad4bcd55621dbb1593b5,2025-03-11T17:16:31.100000 +CVE-2025-24080,1,1,59c07cce6c74e20c53216e6e67b0fe57f9b278a4bd1a25ecf4be913d9801aa76,2025-03-11T17:16:31.323000 +CVE-2025-24081,1,1,3c7e80b9f406c24fd4566e75ef43382fcc4cf6b6f50c5b8d268cdf5ca178133d,2025-03-11T17:16:32.533000 +CVE-2025-24082,1,1,c4ca64b357dd3068f0a6d8d8e0dff3c62d1f03ee0618b64108ae206c22ebdf79,2025-03-11T17:16:33.087000 +CVE-2025-24083,1,1,0b3194a26c39a1f646286511debfb85f71e9acd5bc48214f91f8894440471604,2025-03-11T17:16:33.310000 +CVE-2025-24084,1,1,8d1e1bc2d5cff22458553dde9e0f3eba32a3bdec34ab85116926b24e414808f4,2025-03-11T17:16:33.523000 CVE-2025-24085,0,0,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 @@ -283469,6 +283511,7 @@ CVE-2025-24174,0,0,95dfb379df306aeb43eb6243b1abac4c2b93f5fa4cc8ec6eac185094887da CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24200,0,0,25400eb87be817df8c7c87a3279a41776a1e6f982935bdc20765635067fa7eed,2025-03-06T19:48:51.880000 +CVE-2025-24201,1,1,0971ece7289a54a612dcd5369ae26bb94f1c0b832478a9248a11b65da90055d2,2025-03-11T18:15:30.190000 CVE-2025-24301,0,0,053ad1655536b1ab1dd3f965481b1a26b1fc614d01aa30bb417618912a6f4ec7,2025-03-04T17:12:06.513000 CVE-2025-24309,0,0,e0b728d88c10e7a52424c580fcfcdafa41ec5aecc92adb9e7dcec0028f63ad77,2025-03-04T17:12:06.513000 CVE-2025-24312,0,0,95c47bb536b453078b50948ffe457339fcccb14868a3af4b230325aee112d79c,2025-02-05T18:15:34.060000 @@ -283536,12 +283579,26 @@ CVE-2025-24427,0,0,5b51070717e613f4f555703bbc42c95f36096634d78669e629005b80ebbef CVE-2025-24428,0,0,6f3bfb62e88d069c8bfb9f9cb6b3a3a8a2df49dbf20d09db54a464cce8414b85,2025-03-03T15:31:07.747000 CVE-2025-24429,0,0,4d04a778412031aca079c9ff56172e80337374f9460cca8b388e11a6b62a962d,2025-03-03T15:31:07.747000 CVE-2025-24430,0,0,4eb06266fd7847e2baa675fe7677c830ad926011feeec64352e65e743c1785ba,2025-03-03T15:31:07.747000 +CVE-2025-24431,1,1,ab38feec43ba82261378221efb055821f7a6e76a83ab2573974cc7c953b2dbc4,2025-03-11T18:15:30.277000 CVE-2025-24432,0,0,58a0f1e795d23f9cf4e0ca6e03bf6a0d61e3a2662bbadcf516ffb8aad14cbabb,2025-03-03T15:31:07.747000 CVE-2025-24434,0,0,608d3c85a91b7323de06305611259a66544c938d1496f623d24d8f0cc0037f37,2025-02-27T21:15:41.317000 CVE-2025-24435,0,0,dfc219e78a67a41fbf4a8e3541666eb64d6263e8ba5c2874da58cad45ab47be4,2025-02-27T21:15:41.437000 CVE-2025-24436,0,0,fa6e1028e6b05751859f5712ef24bba808cb1ae0a39dca5196099fca50ecb47a,2025-02-27T21:15:41.553000 CVE-2025-24437,0,0,972c47e05b6f52dc6e19f4c1285b87e9410af4d32e9f6ebd4dac4600d3f09d2c,2025-02-27T21:15:41.673000 CVE-2025-24438,0,0,12d3860fa1429cfe71ef9cfbc827b2859fe934554fcc5b7031f28e164bbbaa42,2025-02-27T21:15:41.800000 +CVE-2025-24439,1,1,99a972559673c8dc99fde69eae525fb5c2de6aa37db973815ae853a59c8a73e6,2025-03-11T18:15:30.437000 +CVE-2025-24440,1,1,d37e7808c372c6eed69705038f48e633eb9cf9f44fbf24730b1c17c92b6a25e3,2025-03-11T18:15:30.603000 +CVE-2025-24441,1,1,a45ee895b302b57d5158de5cc1af333e56f7cc0842567d74b477749dbc37e1fe,2025-03-11T18:15:30.753000 +CVE-2025-24442,1,1,62d1c06b41fa40782750069c6c168adf21ac55cc3608f9b62a5a7ee0097e8e6a,2025-03-11T18:15:30.903000 +CVE-2025-24443,1,1,f70cea8c250d91f913df4e922570900d46d8a014a28d911e6c354c34ad4647b2,2025-03-11T18:15:31.047000 +CVE-2025-24444,1,1,ffa13e257c04ef027d524d98d12a0274a88556eafb14e2d98ee0a4908ecb3cb2,2025-03-11T18:15:31.203000 +CVE-2025-24445,1,1,fe9d5a1e80fb54a799436c7a9cd593a9fb2eb5d158e4d9ee563df31807ea294c,2025-03-11T18:15:31.370000 +CVE-2025-24448,1,1,92bcacadd903b211fa1300bbcd2890e9447e6f34c01d8fa0f9978c12b2004bd6,2025-03-11T18:15:31.543000 +CVE-2025-24449,1,1,3443aecbc19c1316610713c3c6db6e9eddebf08fe3a81b937eba399ee20a3d7a,2025-03-11T18:15:31.700000 +CVE-2025-24450,1,1,3745eb1fe6b1f2351a39c7daf957967cc47132f688e51c3f3da7be7fd584b8ba,2025-03-11T18:15:31.840000 +CVE-2025-24451,1,1,4679b07590e9b24b111559db06e0c3c4007c7cf76c066b35286e020d2b3c8bb0,2025-03-11T18:15:31.993000 +CVE-2025-24452,1,1,a4caa241f733995fa520112d742aeeb5452633f7ecdf948ed9a62482f1d0d120,2025-03-11T18:15:32.140000 +CVE-2025-24453,1,1,50613df4949b8ecbe8d44b1dd6ba4e6330c7651a1710fc2bc477fcdca764145d,2025-03-11T18:15:32.297000 CVE-2025-24456,0,0,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000 CVE-2025-24457,0,0,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000 CVE-2025-24458,0,0,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000 @@ -283876,7 +283933,23 @@ CVE-2025-24976,0,0,d3c2a0ec7f5c1f646ba24311fc47878f0806891920501766ac3a68c935b89 CVE-2025-24980,0,0,a17fd16fc181710dc23e803283e1d6d1f933f1a8ebddaf620892759c050de87c,2025-02-07T22:15:14.617000 CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000 +CVE-2025-24983,1,1,041abc7e9b8bfd41183b46f5ceb3e87224d4be5a71d3f5df5904d8317b2edfd0,2025-03-11T17:16:33.890000 +CVE-2025-24984,1,1,e65b3bbf7bca2eb8b9c75384cfa1b7cc88d4a21f0e1fb3e3c5288db6766f4274,2025-03-11T17:16:34.090000 +CVE-2025-24985,1,1,eabd19d79beb18590b87c5f4776aab0491f736b417f416c542495500cd991624,2025-03-11T17:16:34.303000 +CVE-2025-24986,1,1,e1877c59243f5d547254d4f6772c953b520a88b15321dc3221f0d35254bd5f84,2025-03-11T17:16:34.563000 +CVE-2025-24987,1,1,c7a1cbb5a71ae6e3e6d1799d10cb5c9cddfe49ddb322f5e708e845195bf89c7f,2025-03-11T17:16:34.767000 +CVE-2025-24988,1,1,d2dc18cbba7fa7e4718279aea26338414e3d5b56f46a93a917dc4ee3527382fb,2025-03-11T17:16:35.013000 CVE-2025-24989,0,0,41bc3ff3ec452f1ed2e007691180803f1ca2c43c5c00d6d0ec8842763c09b177,2025-02-24T14:55:58.823000 +CVE-2025-24991,1,1,3a8b2918c8ffd37a0c891123f0a52e4610d849702d10370cfc600f405be3d9e0,2025-03-11T17:16:35.297000 +CVE-2025-24992,1,1,7cc7111991abc0c8699a7019f1ec108fb363878b1a310c2aa2ed9b54079dfba0,2025-03-11T17:16:35.523000 +CVE-2025-24993,1,1,fdcff599216d167c9ac424c57e0e7eced943ffad2871682037a3585092c1adfd,2025-03-11T17:16:35.797000 +CVE-2025-24994,1,1,56e7cb732b9270c7c1289711e1c55157dd14ceb84f92f2c45d4006bb55c876fd,2025-03-11T17:16:36.150000 +CVE-2025-24995,1,1,306a93262acb05e655915a5ce93d4066475820220d6bb6dcd2b11098c2a1d82f,2025-03-11T17:16:36.490000 +CVE-2025-24996,1,1,004764468085c1b494a7b30fcef4d61a5ff8b37885453a6eaf3e33ec2459d6c9,2025-03-11T17:16:36.803000 +CVE-2025-24997,1,1,9b9b0e4bb963cf2d30a71fe8816bba347c9a08deb549b148395f6d09ef61e68e,2025-03-11T17:16:37.103000 +CVE-2025-24998,1,1,87cf9ebbd3630eb3f2416cf5baaf162632796fe90e065cb968e8007fd266c604,2025-03-11T17:16:37.670000 +CVE-2025-25003,1,1,d4b03eb1acfb3ce75c45e0f0cacc1a942d67a5e5d8175ca3a86c7d72d8e7d2db,2025-03-11T17:16:38.043000 +CVE-2025-25008,1,1,0cee80bdfb016b4e8c80e83c20e4e54775249dc699e28be84b28c1a5dbf64db5,2025-03-11T17:16:38.483000 CVE-2025-25015,0,0,1728a18585006aac4e3f477b411ddf25ead2fc2546118a111f01cd9522231a49,2025-03-05T10:15:20.160000 CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000 CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000 @@ -284139,7 +284212,7 @@ CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000 CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000 CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 -CVE-2025-25680,1,1,8769235f7dfed6dab81aa90fd879cc3d4a3649aa255c188d45e8deb5967072c7,2025-03-11T16:15:17.413000 +CVE-2025-25680,0,0,8769235f7dfed6dab81aa90fd879cc3d4a3649aa255c188d45e8deb5967072c7,2025-03-11T16:15:17.413000 CVE-2025-25723,0,0,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000 CVE-2025-25724,0,0,b38e9501f3518fc8b79ccc8bc6f4bc07f2a4c98992aa95823eb5aac9be02cfc0,2025-03-02T02:15:36.603000 CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000 @@ -284155,7 +284228,9 @@ CVE-2025-25743,0,0,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977 CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000 CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 -CVE-2025-25747,1,1,a1c6ddcced5f18ec040d1d1e271930e310c5eb290a17db4d61127328dc681262,2025-03-11T16:15:17.547000 +CVE-2025-25747,0,0,a1c6ddcced5f18ec040d1d1e271930e310c5eb290a17db4d61127328dc681262,2025-03-11T16:15:17.547000 +CVE-2025-25748,1,1,97d86b07efd43cb77c646f6b6a4f2a09dc14c74443bef5bb7225d191b7f2bf21,2025-03-11T18:15:32.810000 +CVE-2025-25749,1,1,2ee440ae003eb53b628305f09af3163dbc7c742efb8a1778db0e910c737ffb6d,2025-03-11T18:15:32.933000 CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000 CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000 CVE-2025-25761,0,0,f248f6741f63a9a7aedabfe16b412988575b28956c4c9e9dd6d7c9dcf3c9c70f,2025-02-27T15:15:41.777000 @@ -284397,7 +284472,14 @@ CVE-2025-26620,0,0,67bb16c31832fa279abf82fbaaa24277d7470c8a03c406771fcdd9b2a5168 CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0aa0,2025-02-22T16:15:31.033000 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 -CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000 +CVE-2025-26627,1,1,213363a255cf8a5be4e2d9d01c58ab051704c76d0d2fef8faca8fb14c705a0c4,2025-03-11T17:16:38.930000 +CVE-2025-26629,1,1,e91c3157209e703be4dd88a0bde2a4dac53e9ad6c98d58e09e22fb296066be2e,2025-03-11T17:16:39.537000 +CVE-2025-26630,1,1,4810410c2500666ef354db229b00042787dbf2395a709ae921cb4d057fabeaa1,2025-03-11T17:16:42.820000 +CVE-2025-26631,1,1,e4ce48a440d6fd90cd3c231dc179df4243811be14e6152755466e8db6f7254f1,2025-03-11T17:16:43.110000 +CVE-2025-26633,1,1,f9bbed806e3b92f561b63c92154c7e22ba361830f85cc7a9c9820e7f48bef79a,2025-03-11T17:16:43.390000 +CVE-2025-26634,1,1,c00bcd3c8d4900044a7eb48dc94ed2e5d6cc0372df624a14233622fbbeb35421,2025-03-11T17:16:43.743000 +CVE-2025-26643,0,1,6c684f208820ccd1b91d47986d3bf6ae24e229199ddff36ffbce1fb6fd272180,2025-03-11T17:16:44.040000 +CVE-2025-26645,1,1,0bc3887270eb9f9d50894713e32b674b2e2553d8883b7cee1f7c35be7c0ff22d,2025-03-11T17:16:44.200000 CVE-2025-26655,0,0,0f3a08ccef3d70b6b204225ccf1d375dcff58cae567d22996a8c9a79c45ba0ba,2025-03-11T01:15:35.230000 CVE-2025-26656,0,0,1a812f43138149f2d7d6651efca463558863ccdacf3acc529b62dbfb2f3c3007,2025-03-11T01:15:35.383000 CVE-2025-26658,0,0,d118441d3436a47c606b50b102cf03d9c402c14a6366b95d69e29a7d79e0e3de,2025-03-11T01:15:35.533000 @@ -284409,6 +284491,7 @@ CVE-2025-26696,0,0,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171c CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 +CVE-2025-26701,1,1,b1c1cb7319508b5fecfc5095676f1b80dcdc41dd872096670fdb9057c0b4c0c3,2025-03-11T18:15:33.210000 CVE-2025-26702,0,0,bfeb5079bd3ac8d37700c71bd3530f53924a2369bd0c6d5adf64ce6544c8dd54,2025-03-11T07:15:34.133000 CVE-2025-26703,0,0,2d818fbffb58c3a4e6a22419691d4a83d4c845e0fe28512ef4ce6f4a935d76a6,2025-03-11T07:15:34.580000 CVE-2025-26704,0,0,9dd9a2b307ba9aef1a138700104ec6919301ce59b18089c31702eb0ec54320a9,2025-03-11T07:15:34.967000 @@ -284572,6 +284655,26 @@ CVE-2025-27154,0,0,dacf6cef3721a4218d4e6810dd59da982acbb3d6686247b093e3a212d3c26 CVE-2025-27155,0,0,5c027c234aa912efbf95720eb50f967aaf5747b42cdc6393b40f1f04caedeb07,2025-03-04T17:15:18.833000 CVE-2025-27156,0,0,5dd627e3b6db05617238f04696d11de69e6dc5f5c7dd17c4f99850bff75da73b,2025-03-04T17:15:18.997000 CVE-2025-27157,0,0,82eb8d36063536d774ee636a24e368a87d8a8dd12b6203e709015057d075f7b0,2025-02-27T17:15:16.867000 +CVE-2025-27158,1,1,e1e4913b32d84cdd2e31c23a09989d3c0217863dda0aa1a6a25c9ebdc4211a1e,2025-03-11T18:15:33.540000 +CVE-2025-27159,1,1,5036806905015fef023ce295ced2874e1daaac3906c8bec7951c076a2407e74b,2025-03-11T18:15:33.687000 +CVE-2025-27160,1,1,ff2ef7b78c093229d632bd5008489d5c74a66aaf1585080ca6feecc5458bfe33,2025-03-11T18:15:33.840000 +CVE-2025-27161,1,1,b2ca010c31a804a9c8c0a0c00b7c1ab00d68cdb67d4069875883cbb0ceda0e6c,2025-03-11T18:15:33.993000 +CVE-2025-27162,1,1,61c6f3a6996ad8fb534ff004fe02374d9e2e54349861809c00f1f470ee029e00,2025-03-11T18:15:34.150000 +CVE-2025-27163,1,1,4740e7fd0b1d788edf0f1ff223347960fc2363254530b6e97479bb70ea36a5a3,2025-03-11T18:15:34.293000 +CVE-2025-27164,1,1,468be8db1c90a33044fd3d8efb592dab7d4edc0a5a0ff77a8a85b6a67f5244fb,2025-03-11T18:15:34.437000 +CVE-2025-27166,1,1,676be683ff063e1c1b28462f1838c147e161609b5bdfbf821f550797c4709126,2025-03-11T18:15:34.580000 +CVE-2025-27167,1,1,eaa7fc63b7d44342fcbca5ac84d27afae5284ac202c74578b5c4566929fe3739,2025-03-11T18:15:34.730000 +CVE-2025-27168,1,1,836c7cac0ba978ae9d85092b27732de5962e56a82e7d8d81ac8bb05ec9d3e720,2025-03-11T18:15:34.893000 +CVE-2025-27169,1,1,49068745d30f2345e36c1a09551564290a944047980d5bb129209e87997d3336,2025-03-11T18:15:35.077000 +CVE-2025-27170,1,1,65b66301465f0de9cdf464701386362ee5f10e28cd65243e6d7223ac305b7d7b,2025-03-11T18:15:35.227000 +CVE-2025-27171,1,1,ed3baf56abc5f1284e1d46f367e5c2c17e7b75edf550b48b3e8fd7877c6e6384,2025-03-11T18:15:35.377000 +CVE-2025-27172,1,1,8378694b1e6f1eab939dd75c9df5e97185768569e98b0478c0d31690498a939d,2025-03-11T17:16:44.420000 +CVE-2025-27174,1,1,29d7160e77b8fde587fbfb9f2cb30b5c9a4dec081e6e9ad27d954c2c0d6962c0,2025-03-11T18:15:35.600000 +CVE-2025-27175,1,1,2aef63a67658833cd51ed2191d18b28f3c48422778bcf8379e145946c5532a92,2025-03-11T18:15:35.743000 +CVE-2025-27176,1,1,4e7a4cc4c582206edf25775900adc735c3be53cbb18b231523863eaf6cf4ccfb,2025-03-11T18:15:35.897000 +CVE-2025-27177,1,1,8fed7ebed5a2acaf32fa883a422525a34bb989790d05c538e1064e1cc2d9511c,2025-03-11T18:15:36.047000 +CVE-2025-27178,1,1,89127db54da33f12d77b502660f9707e7e5697816b7c6499fccdede2e721e742,2025-03-11T18:15:36.200000 +CVE-2025-27179,1,1,9532ccaeb1756efead1cd9cc44ffc094628b7fdffa05ea64a72a704d30c70adc,2025-03-11T18:15:36.353000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,26edee725f061a3765542776ac788c3175c25b1ef75e4fb56599c36f84b19b30,2025-03-05T14:05:15.387000 CVE-2025-27220,0,0,a02d37616d39b53901b34b45fe17d833959193f3655f17498861fe751a8ed44e,2025-03-05T14:05:49.230000 @@ -284657,7 +284760,7 @@ CVE-2025-27399,0,0,39035d656129062238f81ef47ca04f7a1e8421cb055350242877932e69dd8 CVE-2025-27400,0,0,09b6d518bf48aeab880dbe66e6bc2a5dd8752164e9bf158ed67c63f0b7ab8431,2025-02-28T16:15:40.237000 CVE-2025-27401,0,0,a0a9ff73f453a0c4b6de03870f141abd84f19622792f55cbc6c22475d44e32fa,2025-03-04T17:15:19.547000 CVE-2025-27402,0,0,920b5ec493a4fe20f3d86d2225a25091e0d3f71f7744b6da408c9c08d3dfbc7c,2025-03-04T17:15:19.703000 -CVE-2025-27403,1,1,70337e0a3800c5c59ee3032fe8368851fa8455e67e280b02d352e4fa8ed0ce9f,2025-03-11T15:15:45.570000 +CVE-2025-27403,0,0,70337e0a3800c5c59ee3032fe8368851fa8455e67e280b02d352e4fa8ed0ce9f,2025-03-11T15:15:45.570000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000 CVE-2025-27411,0,0,3bb429b2a417984eb72d2c43dc11687835b7b048bd7b98fbb69cff47d115b00f,2025-03-05T16:15:40.310000 @@ -284682,6 +284785,8 @@ CVE-2025-27433,0,0,802ef576da4ee45fc183584d31950306c1fc4ab770cdfb1d54c7001bee2b2 CVE-2025-27434,0,0,3af8a235aaed03ea586bcafb82e3517b0d2a276ddea4b00764a6bc5e730dd53f,2025-03-11T01:15:36.760000 CVE-2025-27436,0,0,04f316589a1bbdce7cd6902d63c8b5944fa23ffbd5c8a89b29a1531f5831ed0c,2025-03-11T01:15:36.920000 CVE-2025-27438,0,0,5e936f7fd64a3cd61ff7c89f017c645e4373df9dc5d57bc88e73d5beb46cdf58,2025-03-11T10:15:19.407000 +CVE-2025-27439,1,1,1161b404fa7dd8b12dd93dcdec816cdb940175c40666cd493a98c858fef7426a,2025-03-11T18:15:36.510000 +CVE-2025-27440,1,1,d46c9455e41125df027e827920989a1dfe027d97f9a35c0d6e339996998fd432,2025-03-11T18:15:36.653000 CVE-2025-27493,0,0,f57dbe2a862002f0110104b8e9c725f67f14a4b91f716b6250e7ec87e43080e9,2025-03-11T10:15:19.577000 CVE-2025-27494,0,0,47899696c14b1aad31647f36008cd08fe5ab14b6e682d9f4d1cd30e28c474a82,2025-03-11T10:15:19.783000 CVE-2025-27497,0,0,04993fdb1d20329c81d2ff19baac9002b619ad4067b2189fb1ebe9ca1d230777,2025-03-05T16:15:40.587000 @@ -284710,15 +284815,15 @@ CVE-2025-27590,0,0,201e48bfcc12fc16d983254396bffb4f767e29b88b32a1b2192e9772fcd99 CVE-2025-27597,0,0,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000 CVE-2025-27598,0,0,f103b7cfc03d14de6c0bad2d3d92bc8b207a423383ddf9a01b7e7a34a226a3e7,2025-03-07T20:15:38.660000 CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3b90,2025-03-06T19:15:28.117000 -CVE-2025-27601,1,1,df52cc35c591bba27e95164eee6faf7b1153751f41839962728fd4c8e26597ca,2025-03-11T16:15:17.943000 -CVE-2025-27602,1,1,b9bde515c15b535cbdce5201f55bcf595c4355929bcf374774ce8cbee47e8318,2025-03-11T16:15:18.100000 +CVE-2025-27601,0,0,df52cc35c591bba27e95164eee6faf7b1153751f41839962728fd4c8e26597ca,2025-03-11T16:15:17.943000 +CVE-2025-27602,0,0,b9bde515c15b535cbdce5201f55bcf595c4355929bcf374774ce8cbee47e8318,2025-03-11T16:15:18.100000 CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000 CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000 CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000 CVE-2025-27610,0,0,c33d0784ac28efda70daeefbc9e57202288568b88569c58831907a224f199e9e,2025-03-10T23:15:35.073000 CVE-2025-27615,0,0,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000 CVE-2025-27616,0,0,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000 -CVE-2025-27617,1,1,8fc9cf979b73fa6ba29c977f6cb88da60f3e6ce7e9df90300e90513f74a659ec,2025-03-11T16:15:18.310000 +CVE-2025-27617,0,0,8fc9cf979b73fa6ba29c977f6cb88da60f3e6ce7e9df90300e90513f74a659ec,2025-03-11T16:15:18.310000 CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000 CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 @@ -284782,7 +284887,7 @@ CVE-2025-27824,0,0,bbbadd94bca912d17091ba5687790372eed06151266f5eb5403da18d55309 CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fee41,2025-03-07T22:15:38.380000 CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000 CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 -CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 +CVE-2025-27840,0,1,a5fa25ad9832def776c748e95f870f10c4994d7783f5fa8cc7c1128513d3d92b,2025-03-11T17:16:44.627000 CVE-2025-27893,0,0,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000 CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000 CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000