From e263b45c8ad058f6276118393b0c9f3e2e3bf1cb Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 28 Mar 2025 15:03:53 +0000 Subject: [PATCH] Auto-Update: 2025-03-28T15:00:20.535463+00:00 --- CVE-2022/CVE-2022-44xx/CVE-2022-4472.json | 22 +- CVE-2022/CVE-2022-44xx/CVE-2022-4496.json | 22 +- CVE-2022/CVE-2022-46xx/CVE-2022-4649.json | 22 +- CVE-2022/CVE-2022-46xx/CVE-2022-4654.json | 22 +- CVE-2023/CVE-2023-223xx/CVE-2023-22332.json | 32 ++- CVE-2023/CVE-2023-495xx/CVE-2023-49544.json | 53 ++++- CVE-2023/CVE-2023-495xx/CVE-2023-49545.json | 53 ++++- CVE-2023/CVE-2023-495xx/CVE-2023-49546.json | 43 +++- CVE-2023/CVE-2023-495xx/CVE-2023-49547.json | 43 +++- CVE-2023/CVE-2023-495xx/CVE-2023-49548.json | 43 +++- CVE-2023/CVE-2023-499xx/CVE-2023-49968.json | 43 +++- CVE-2023/CVE-2023-499xx/CVE-2023-49969.json | 43 +++- CVE-2023/CVE-2023-499xx/CVE-2023-49970.json | 43 +++- CVE-2023/CVE-2023-499xx/CVE-2023-49974.json | 43 +++- CVE-2023/CVE-2023-499xx/CVE-2023-49976.json | 43 +++- CVE-2023/CVE-2023-499xx/CVE-2023-49977.json | 43 +++- CVE-2023/CVE-2023-512xx/CVE-2023-51281.json | 43 +++- CVE-2024/CVE-2024-115xx/CVE-2024-11504.json | 82 +++++++ CVE-2024/CVE-2024-123xx/CVE-2024-12336.json | 42 +++- CVE-2024/CVE-2024-275xx/CVE-2024-27558.json | 34 ++- CVE-2024/CVE-2024-275xx/CVE-2024-27559.json | 34 ++- CVE-2024/CVE-2024-276xx/CVE-2024-27689.json | 34 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27743.json | 33 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27744.json | 33 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27746.json | 33 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27747.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28562.json | 69 +++++- CVE-2024/CVE-2024-285xx/CVE-2024-28563.json | 69 +++++- CVE-2024/CVE-2024-285xx/CVE-2024-28564.json | 69 +++++- CVE-2024/CVE-2024-285xx/CVE-2024-28565.json | 69 +++++- CVE-2024/CVE-2024-285xx/CVE-2024-28566.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28567.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28568.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28569.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28570.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28571.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28572.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28573.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28574.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28575.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28576.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28577.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28578.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28579.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28580.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28581.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28582.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28583.json | 33 ++- CVE-2024/CVE-2024-285xx/CVE-2024-28584.json | 69 +++++- CVE-2024/CVE-2024-442xx/CVE-2024-44276.json | 34 ++- CVE-2024/CVE-2024-74xx/CVE-2024-7407.json | 82 +++++++ CVE-2025/CVE-2025-01xx/CVE-2025-0189.json | 59 +++++- CVE-2025/CVE-2025-01xx/CVE-2025-0190.json | 59 +++++- CVE-2025/CVE-2025-02xx/CVE-2025-0281.json | 65 +++++- CVE-2025/CVE-2025-03xx/CVE-2025-0312.json | 60 +++++- CVE-2025/CVE-2025-09xx/CVE-2025-0986.json | 56 +++++ CVE-2025/CVE-2025-16xx/CVE-2025-1653.json | 43 +++- CVE-2025/CVE-2025-17xx/CVE-2025-1781.json | 78 +++++++ CVE-2025/CVE-2025-201xx/CVE-2025-20124.json | 154 +++++++++++++- CVE-2025/CVE-2025-201xx/CVE-2025-20125.json | 164 +++++++++++++- CVE-2025/CVE-2025-202xx/CVE-2025-20204.json | 108 +++++++++- CVE-2025/CVE-2025-202xx/CVE-2025-20205.json | 108 +++++++++- CVE-2025/CVE-2025-211xx/CVE-2025-21117.json | 71 ++++++- CVE-2025/CVE-2025-282xx/CVE-2025-28219.json | 21 ++ CVE-2025/CVE-2025-282xx/CVE-2025-28220.json | 21 ++ CVE-2025/CVE-2025-282xx/CVE-2025-28221.json | 21 ++ CVE-2025/CVE-2025-28xx/CVE-2025-2854.json | 8 +- CVE-2025/CVE-2025-28xx/CVE-2025-2858.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2859.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2860.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2861.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2862.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2863.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2864.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2865.json | 78 +++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2877.json | 60 ++++++ CVE-2025/CVE-2025-29xx/CVE-2025-2901.json | 60 ++++++ CVE-2025/CVE-2025-29xx/CVE-2025-2908.json | 78 +++++++ CVE-2025/CVE-2025-29xx/CVE-2025-2909.json | 78 +++++++ CVE-2025/CVE-2025-29xx/CVE-2025-2910.json | 78 +++++++ CVE-2025/CVE-2025-29xx/CVE-2025-2911.json | 78 +++++++ README.md | 85 +++++--- _state.csv | 223 +++++++++++--------- 83 files changed, 4118 insertions(+), 411 deletions(-) create mode 100644 CVE-2024/CVE-2024-115xx/CVE-2024-11504.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7407.json create mode 100644 CVE-2025/CVE-2025-09xx/CVE-2025-0986.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1781.json create mode 100644 CVE-2025/CVE-2025-282xx/CVE-2025-28219.json create mode 100644 CVE-2025/CVE-2025-282xx/CVE-2025-28220.json create mode 100644 CVE-2025/CVE-2025-282xx/CVE-2025-28221.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2858.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2859.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2860.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2861.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2862.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2863.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2864.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2865.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2877.json create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2901.json create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2908.json create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2909.json create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2910.json create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2911.json diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4472.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4472.json index c456cfc8ccf..33520cc6582 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4472.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4472.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4472", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:10.780", - "lastModified": "2024-11-21T07:35:19.890", + "lastModified": "2025-03-28T14:15:18.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4496.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4496.json index 125ad5a9686..c7eaec01283 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4496.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4496.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4496", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:10.870", - "lastModified": "2024-11-21T07:35:22.817", + "lastModified": "2025-03-28T14:15:18.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4649.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4649.json index 8c040916ff0..604e732ef8d 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4649.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4649.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4649", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:11.357", - "lastModified": "2024-11-21T07:35:40.203", + "lastModified": "2025-03-28T14:15:18.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4654.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4654.json index 771282d23ab..d80805c145e 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4654.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4654.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4654", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:11.607", - "lastModified": "2024-11-21T07:35:40.747", + "lastModified": "2025-03-28T14:15:18.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22332.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22332.json index 3d237c06257..96dc460e520 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22332.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22332.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22332", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-30T07:15:10.003", - "lastModified": "2024-11-21T07:44:34.840", + "lastModified": "2025-03-28T14:15:18.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json index 14aba927766..5918b1c03e7 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49544.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49544", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.683", - "lastModified": "2024-11-21T08:33:31.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:26:54.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49544", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49544", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49545.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49545.json index e5ea11d4827..52e9ffa0463 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49545.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49545", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.730", - "lastModified": "2024-11-21T08:33:31.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:33:00.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/548.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49545", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://cwe.mitre.org/data/definitions/548.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49545", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json index 1895951df76..af052ba2a7c 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49546", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.077", - "lastModified": "2024-11-21T08:33:31.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:32:41.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49546", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49546", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49547.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49547.json index b45e1c2c516..88aadcf1b39 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49547.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49547.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49547", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.150", - "lastModified": "2024-11-21T08:33:31.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:32:37.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49547", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49547", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49548.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49548.json index ec5471ec421..c3b6d7bf58e 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49548.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49548", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.203", - "lastModified": "2024-11-21T08:33:31.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:32:32.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49548", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49548", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49968.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49968.json index 4abf669f870..6946e4c11db 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49968.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49968.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49968", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.253", - "lastModified": "2024-11-21T08:34:06.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:32:27.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49968", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49968", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json index 94b44ba161c..e58e8106fd0 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49969.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49969", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.303", - "lastModified": "2024-11-21T08:34:06.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:32:21.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49969", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49969", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json index 10e30513329..e62cf6142f4 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49970.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49970", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.350", - "lastModified": "2024-11-21T08:34:06.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:32:11.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49970", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49970", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49974.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49974.json index 9e6e4d50a9c..90386e4ebe7 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49974.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49974.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49974", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T01:15:07.103", - "lastModified": "2024-11-21T08:34:07.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:35:30.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49974", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49974", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49976.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49976.json index 7325c879e28..4bdab385695 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49976.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49976.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49976", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T01:15:07.147", - "lastModified": "2024-11-21T08:34:07.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:35:34.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49976", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49976", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49977.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49977.json index 5688966c4a4..8f9b0d9d5c4 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49977.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49977.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49977", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T01:15:07.187", - "lastModified": "2024-11-21T08:34:07.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:35:38.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49977", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-49977", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51281.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51281.json index 97b96c9d106..9b3485b51c2 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51281.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51281.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51281", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T01:15:52.133", - "lastModified": "2024-11-21T08:37:56.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:35:27.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-51281", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-51281", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json b/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json new file mode 100644 index 00000000000..a1df17af8b1 --- /dev/null +++ b/CVE-2024/CVE-2024-115xx/CVE-2024-11504.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-11504", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-28T13:15:39.663", + "lastModified": "2025-03-28T13:15:39.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Input from multiple fields in\u00a0Streamsoft Presti\u017c is not sanitized properly, leading to an SQL injection vulnerability, which might be exploited by an authenticated remote attacker.\u00a0\nThis issue was fixed in\u00a018.1.376.37 version of the software." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-7407/", + "source": "cvd@cert.pl" + }, + { + "url": "https://www.streamsoft.pl/streamsoft-prestiz/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12336.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12336.json index ac5d777f6f3..0f1b986ee03 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12336.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12336", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T04:15:20.263", - "lastModified": "2025-03-15T04:15:20.263", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:16:07.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codexpert:wc_affiliate:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6", + "matchCriteriaId": "343EFECD-4BB1-4094-8ECC-C99463C7AC34" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wc-affiliate/trunk/src/AJAX.php#L903", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0fb349-4cb8-4cf3-ae7c-5c4dcc6fd4f7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json index 1e4468223bb..e7f08495920 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27558", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T17:15:07.490", - "lastModified": "2024-11-21T09:04:44.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:09:20.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.4", + "matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kilooooo/cms/blob/main/2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/kilooooo/cms/blob/main/2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json index b549fa418ea..bfb659dd7e9 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27559", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T17:15:07.530", - "lastModified": "2024-11-21T09:04:44.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:26:01.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.4", + "matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kilooooo/cms/blob/main/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/kilooooo/cms/blob/main/1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27689.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27689.json index 108486de135..143b8052c77 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27689.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27689.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27689", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T17:15:07.573", - "lastModified": "2024-11-21T09:04:53.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:25:42.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.4", + "matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Xin246/cms/blob/main/2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Xin246/cms/blob/main/2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json index 1466d15a954..f956567a37f 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27743", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.823", - "lastModified": "2025-03-24T18:15:19.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:34:38.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json index 7c210db08d8..c917fa9c39a 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27744", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.870", - "lastModified": "2024-11-21T09:04:58.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:34:30.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json index ebdc2afa3fd..c68749c85e6 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27746", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.923", - "lastModified": "2024-11-21T09:04:59.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:34:25.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27747.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27747.json index 72b5170b42a..95195e59609 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27747.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27747", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.973", - "lastModified": "2024-11-21T09:04:59.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:34:16.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json index ea023592eb3..1323d3d3517 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28562", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:08.127", - "lastModified": "2024-11-21T09:06:32.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:44:56.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json index 9b9c8f7f2cc..c383537b204 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28563.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28563", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:08.780", - "lastModified": "2024-11-21T09:06:32.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:52:00.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28564.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28564.json index 8ac42e82cfd..dee91fc7135 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28564.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28564", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:08.933", - "lastModified": "2024-11-21T09:06:32.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:51:57.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28565.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28565.json index 9cfb2eaf99f..42f946ca527 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28565.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28565", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:09.087", - "lastModified": "2024-12-04T21:15:23.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:51:53.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28566.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28566.json index 5a29a2609b0..12bee7666e0 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28566.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28566.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28566", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:09.270", - "lastModified": "2024-11-21T09:06:34.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:51:49.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28567.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28567.json index 034802b364b..c567a1b2085 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28567.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28567", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:09.447", - "lastModified": "2024-11-21T09:06:34.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:49:08.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28568.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28568.json index 0d275316fc6..23ce5e57289 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28568.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28568", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:09.640", - "lastModified": "2024-11-21T09:06:34.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:49:04.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28569.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28569.json index 4078f56a6dd..9418902ace9 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28569.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28569", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:09.797", - "lastModified": "2024-11-21T09:06:35.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:49:01.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28570.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28570.json index 30a741ba761..59c8830accb 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28570.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28570", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:09.970", - "lastModified": "2024-11-21T09:06:35.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:56.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28571.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28571.json index 63de1129d9c..4912f30bdd2 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28571.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28571", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:10.137", - "lastModified": "2024-11-21T09:06:35.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:54.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28572.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28572.json index a0859ce6104..7a2655ef302 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28572.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28572", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:10.290", - "lastModified": "2024-11-21T09:06:36.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:51.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28573.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28573.json index 88546112851..6f6c2724e2a 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28573.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28573", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:10.460", - "lastModified": "2024-11-21T09:06:37.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:47.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28574.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28574.json index 91b444525a2..7ca229be1e5 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28574.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28574", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:10.623", - "lastModified": "2024-11-21T09:06:37.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:43.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28575.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28575.json index d3e7c037a0c..dcefe17f264 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28575.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28575", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:10.790", - "lastModified": "2024-11-21T09:06:37.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:40.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28576.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28576.json index 7fd7ee08280..b024de97b2c 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28576.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28576", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:10.950", - "lastModified": "2024-11-21T09:06:37.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:37.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28577.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28577.json index 640bfacd42b..ea7aae0ed5a 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28577.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28577", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:11.120", - "lastModified": "2024-11-21T09:06:38.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:33.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28578.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28578.json index 384b5641628..7fe0884115d 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28578.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28578", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:11.277", - "lastModified": "2024-11-21T09:06:38.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:28.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28579.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28579.json index 9da3ac27a81..23af8f0f60f 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28579.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28579", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:11.440", - "lastModified": "2024-11-21T09:06:38.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:24.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28580.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28580.json index 96d1cdf5f28..11b12a6908d 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28580.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28580", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:11.590", - "lastModified": "2024-11-21T09:06:39.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:19.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28581.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28581.json index d5c3444efab..f67d3088145 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28581.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28581", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:11.770", - "lastModified": "2024-11-21T09:06:39.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:15.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28582.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28582.json index 1661a9f52a1..8789627e9c5 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28582.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28582", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:11.920", - "lastModified": "2024-11-21T09:06:39.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:12.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28583.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28583.json index 0572d9f7d19..53a6721b5a2 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28583.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28583", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:12.087", - "lastModified": "2024-11-21T09:06:40.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:48:08.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json index adc01a56649..e9e2afc2460 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28584", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T06:15:12.247", - "lastModified": "2024-11-21T09:06:40.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:47:52.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/11/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44276.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44276.json index 4ec54c46bca..ec25281be19 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44276.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44276", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-17T20:15:13.130", - "lastModified": "2025-03-21T17:15:38.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T14:09:35.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json new file mode 100644 index 00000000000..5655f0a529b --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7407.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-7407", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-03-28T13:15:40.760", + "lastModified": "2025-03-28T13:15:40.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of a custom password encoding algorithm\u00a0in Streamsoft Presti\u017c software allows straightforward decoding of passwords using their encoded forms, which are stored in the application's database. One has to know the encoding algorithm, but it can be deduced by observing how password are transformed.\u00a0\nThis issue was fixed in 18.2.377 version of the software." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-261" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2024-7407/", + "source": "cvd@cert.pl" + }, + { + "url": "https://www.streamsoft.pl/streamsoft-prestiz/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0189.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0189.json index 9efde97da70..7de67f01ba7 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0189.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0189.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0189", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:51.660", - "lastModified": "2025-03-20T10:15:51.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T14:31:37.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,12 +71,43 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9850B23-8420-4636-8BCF-DBFB56C51026" + } + ] + } + ] } ], "references": [ { "url": "https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0190.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0190.json index 4e476dd9210..2973a4b9425 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0190.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0190.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0190", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:51.780", - "lastModified": "2025-03-20T10:15:51.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T14:28:25.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,12 +71,43 @@ "value": "CWE-1049" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9850B23-8420-4636-8BCF-DBFB56C51026" + } + ] + } + ] } ], "references": [ { "url": "https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0281.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0281.json index 563cc12f654..85c0e164470 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0281.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0281.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0281", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:52.153", - "lastModified": "2025-03-20T10:15:52.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T14:22:53.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,16 +71,51 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.10", + "matchCriteriaId": "5106B674-3156-4590-AE06-FB38C5CF7424" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/fa0fd7742ae029ed934690d282519263f5d838de", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/b3f4a655-5b08-4fef-be2c-aac8703ad5d0", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0312.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0312.json index 24796661f72..52e2c483e53 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0312.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0312.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0312", "sourceIdentifier": "security@huntr.dev", "published": "2025-03-20T10:15:52.280", - "lastModified": "2025-03-20T10:15:52.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T14:11:12.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,12 +71,44 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.3.14", + "matchCriteriaId": "F416AD53-06BC-45FB-A167-23869CC4E37A" + } + ] + } + ] } ], "references": [ { "url": "https://huntr.com/bounties/522c87b6-a7ac-41b2-84f3-62fd58921f21", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json new file mode 100644 index 00000000000..2c3bcaf87ec --- /dev/null +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0986.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0986", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-28T14:15:19.357", + "lastModified": "2025-03-28T14:15:19.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerVM Hypervisor FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20 could allow a local user, under certain Linux processor combability mode configurations, to cause undetected data loss or errors when performing gzip compression using HW acceleration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.4, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-409" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7229349", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1653.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1653.json index 8d9d9ed9b9b..589d117509c 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1653.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1653.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1653", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T03:15:34.457", - "lastModified": "2025-03-15T03:15:34.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:17:33.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,51 @@ "value": "CWE-266" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.7", + "matchCriteriaId": "FD860D19-4C83-4043-8152-782413B7C1B0" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/ulisting/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4181b26e-89c7-4020-a3d4-29bdc88d7438?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json new file mode 100644 index 00000000000..589a9519243 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1781.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-1781", + "sourceIdentifier": "cve-coordination@google.com", + "published": "2025-03-28T14:15:19.687", + "lastModified": "2025-03-28T14:15:19.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is a XXE in W3CSS Validator versions before\u00a0cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF).\u00a0 This could be exploited to read arbitrary local files if an attacker has access to exception messages." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/google/security-research/security/advisories/GHSA-745m-xmq6-g6x7", + "source": "cve-coordination@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json index 2b9af9d580f..91ca5367e21 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20124", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:22.457", - "lastModified": "2025-02-05T17:15:22.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:22:42.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,136 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1", + "matchCriteriaId": "742B3761-9FD6-4E67-BDDD-D4DD2C3111D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json index e9086a6d161..3e7ba84cda3 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20125", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:22.610", - "lastModified": "2025-02-05T17:15:22.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:37:16.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 5.3 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,12 +69,148 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1", + "matchCriteriaId": "742B3761-9FD6-4E67-BDDD-D4DD2C3111D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json index 41f7f501397..0e4abbfac25 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20204", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:26.077", - "lastModified": "2025-02-05T17:15:26.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:42:57.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,10 +71,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.2", + "matchCriteriaId": "AB8613FB-8E3D-4DA9-9A1D-9161090C7890" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "5733512D-12B5-4098-AF90-9D68217FAC27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D23905E0-E525-49B1-8E5F-4EB42D186768" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json index 4cecac9c442..508808aaae8 100644 --- a/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20205", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-05T17:15:26.243", - "lastModified": "2025-02-05T17:15:26.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:46:02.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,10 +71,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.2", + "matchCriteriaId": "AB8613FB-8E3D-4DA9-9A1D-9161090C7890" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D23905E0-E525-49B1-8E5F-4EB42D186768" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json index c9fa4198df7..559e442d08d 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21117.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21117", "sourceIdentifier": "security_alert@emc.com", "published": "2025-02-05T14:15:27.417", - "lastModified": "2025-02-05T14:15:27.417", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T13:24:51.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.4:*:*:*:*:*:*:*", + "matchCriteriaId": "A19DD36F-1EE9-4FBF-9968-DF270C5FD1C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.7:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C50D2C-B787-4366-AAED-057F9439A6A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.8:*:*:*:*:*:*:*", + "matchCriteriaId": "41028ABC-C574-42AE-897B-E1C65CD0D0BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D9257-AA6C-4D68-B209-E72128A017D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:-:*:*:*:*:*:*", + "matchCriteriaId": "7ADB97BD-3E80-439D-950C-93EF391DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:avamar_server:19.10:sp1:*:*:*:*:*:*", + "matchCriteriaId": "D0075FDA-26E4-4687-9D94-21283E2B5028" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000281275/dsa-2025-071-security-update-for-dell-avamar-for-multiple-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json new file mode 100644 index 00000000000..c3aed70f2bc --- /dev/null +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28219.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28219", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-28T14:15:20.253", + "lastModified": "2025-03-28T14:15:20.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Netgear DC112A V1.0.0.64 has an OS command injection vulnerability in the usb_adv.cgi, which allows remote attackers to execute arbitrary commands via parameter \"deviceName\" passed to the binary through a POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/DC112A_V1.0.0.64/sub_69600.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json new file mode 100644 index 00000000000..080eaa60bc6 --- /dev/null +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28220.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28220", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-28T14:15:20.377", + "lastModified": "2025-03-28T14:15:20.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the setcfm function, which allows remote attackers to cause web server crash via parameter funcpara1 passed to the binary through a POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/setcfm.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json new file mode 100644 index 00000000000..d49f74d76e9 --- /dev/null +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28221.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28221", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-28T14:15:20.483", + "lastModified": "2025-03-28T14:15:20.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the set_local_time function, which allows remote attackers to cause web server crash via parameter time passed to the binary through a POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/time.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json index 7876b789b52..0b0a0621c1e 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2854.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2854", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-27T15:16:01.713", - "lastModified": "2025-03-27T16:45:12.210", + "lastModified": "2025-03-28T13:15:40.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -126,7 +126,7 @@ "source": "cna@vuldb.com" }, { - "url": "https://github.com/Fizz-L/CVE/blob/main/sql-fizz.md", + "url": "https://github.com/hak0neP/cve/blob/main/sql-fizz.md", "source": "cna@vuldb.com" }, { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json new file mode 100644 index 00000000000..d2dd06ec955 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2858.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2858", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:20.650", + "lastModified": "2025-03-28T14:15:20.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2859.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2859.json new file mode 100644 index 00000000000..6886c4c3f1e --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2859.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2859", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:20.810", + "lastModified": "2025-03-28T14:15:20.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker with access to the network where the vulnerable device is located could capture traffic and obtain cookies from the user, allowing them to steal a user's active session and make changes to the device via the web, depending on the privileges obtained by the user." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json new file mode 100644 index 00000000000..1404ea16caa --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2860.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2860", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:20.967", + "lastModified": "2025-03-28T14:15:20.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SaTECH BCU in its firmware version 2.1.3, allows an authenticated attacker to access information about the credentials that users have within the web (.xml file). In order to exploit this vulnerability, the attacker must know the path, regardless of the user's privileges on the website." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json new file mode 100644 index 00000000000..ec4b2a1560b --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2861.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2861", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:21.113", + "lastModified": "2025-03-28T14:15:21.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json new file mode 100644 index 00000000000..1facdc93ee6 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2862.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2862", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:21.257", + "lastModified": "2025-03-28T14:15:21.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SaTECH BCU, in its firmware version 2.1.3, performs weak password encryption. This allows an attacker with access to the device's system or website to obtain the credentials, as the storage methods used are not strong enough in terms of encryption." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-261" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json new file mode 100644 index 00000000000..ab8adf46fd1 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2863.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2863", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:21.410", + "lastModified": "2025-03-28T14:15:21.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-site request forgery (CSRF) vulnerability in the web application of saTECH BCU firmware version 2.1.3, which could allow an unauthenticated local attacker to exploit active administrator sessions and perform malicious actions. The malicious actions that can be executed by the attacker depend on the logged-in user, and may include rebooting the device or modifying roles and permissions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json new file mode 100644 index 00000000000..7a3b12a3b50 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2864.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2864", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:21.570", + "lastModified": "2025-03-28T14:15:21.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SaTECH BCU in its firmware version 2.1.3 allows an attacker to inject malicious code into the legitimate website owning the affected device, once the cookie is set. This attack only impacts the victim's browser (reflected XSS)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json new file mode 100644 index 00000000000..fab53bdbd12 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2865.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2865", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T14:15:21.727", + "lastModified": "2025-03-28T14:15:21.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SaTECH BCU, in its firmware version 2.1.3, could allow XSS attacks and other malicious resources to be stored on the web server. An attacker with some knowledge of the web application could send a malicious request to the victim users. Through this request, the victims would interpret the code (resources) stored on another malicious website owned by the attacker." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-942" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2877.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2877.json new file mode 100644 index 00000000000..3da01068a71 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2877.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2877", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-03-28T14:15:21.877", + "lastModified": "2025-03-28T14:15:21.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the Ansible Automation Platform's Event-Driven Ansible. In configurations where verbosity is set to \"debug\", inventory passwords are exposed in plain text when starting a rulebook activation. This issue exists for any \"debug\" action in a rulebook and also affects Event Streams." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1295" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-2877", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355540", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json new file mode 100644 index 00000000000..4ddf99dd839 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2901.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2901", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-03-28T14:15:22.020", + "lastModified": "2025-03-28T14:15:22.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-2901", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355685", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json new file mode 100644 index 00000000000..d6e5c0b62b0 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2908.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2908", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T13:15:41.217", + "lastModified": "2025-03-28T13:15:41.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The exposure of credentials in the call forwarding configuration module in MeetMe products in versions prior to 2024-09 allows an attacker to gain access to some important assets via configuration files." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json new file mode 100644 index 00000000000..c394ba9a605 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2909.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2909", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T13:15:41.387", + "lastModified": "2025-03-28T13:15:41.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The lack of encryption in the DuoxMe (formerly Blue) application binary in versions prior to 3.3.1 for iOS devices allows an attacker to gain unauthorised access to the application code and discover sensitive information." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json new file mode 100644 index 00000000000..6484089a6b3 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2910.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2910", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T13:15:41.533", + "lastModified": "2025-03-28T13:15:41.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "User enumeration in the password reset module of the MeetMe authentication service in versions prior to 2024-09 allows an attacker to determine whether an email address is registered through specific error messages." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json new file mode 100644 index 00000000000..e6a7dbea5f1 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2911.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2911", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-03-28T13:15:41.673", + "lastModified": "2025-03-28T13:15:41.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthorised access to the call forwarding service system in MeetMe products in versions prior to 2024-09 allows an attacker to identify multiple users and perform brute force attacks via extensions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cb32692c0bb..9c979692665 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-28T13:00:19.840324+00:00 +2025-03-28T15:00:20.535463+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-28T12:59:00.413000+00:00 +2025-03-28T14:52:00.437000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -287218 +287239 ``` ### CVEs added in the last Commit -Recently added CVEs: `37` +Recently added CVEs: `21` -- [CVE-2025-31440](CVE-2025/CVE-2025-314xx/CVE-2025-31440.json) (`2025-03-28T12:15:16.770`) -- [CVE-2025-31443](CVE-2025/CVE-2025-314xx/CVE-2025-31443.json) (`2025-03-28T12:15:16.927`) -- [CVE-2025-31444](CVE-2025/CVE-2025-314xx/CVE-2025-31444.json) (`2025-03-28T12:15:17.080`) -- [CVE-2025-31447](CVE-2025/CVE-2025-314xx/CVE-2025-31447.json) (`2025-03-28T12:15:17.227`) -- [CVE-2025-31448](CVE-2025/CVE-2025-314xx/CVE-2025-31448.json) (`2025-03-28T12:15:17.377`) -- [CVE-2025-31449](CVE-2025/CVE-2025-314xx/CVE-2025-31449.json) (`2025-03-28T12:15:17.527`) -- [CVE-2025-31450](CVE-2025/CVE-2025-314xx/CVE-2025-31450.json) (`2025-03-28T12:15:17.677`) -- [CVE-2025-31451](CVE-2025/CVE-2025-314xx/CVE-2025-31451.json) (`2025-03-28T12:15:17.817`) -- [CVE-2025-31452](CVE-2025/CVE-2025-314xx/CVE-2025-31452.json) (`2025-03-28T12:15:17.960`) -- [CVE-2025-31453](CVE-2025/CVE-2025-314xx/CVE-2025-31453.json) (`2025-03-28T12:15:18.103`) -- [CVE-2025-31456](CVE-2025/CVE-2025-314xx/CVE-2025-31456.json) (`2025-03-28T12:15:18.250`) -- [CVE-2025-31457](CVE-2025/CVE-2025-314xx/CVE-2025-31457.json) (`2025-03-28T12:15:18.393`) -- [CVE-2025-31458](CVE-2025/CVE-2025-314xx/CVE-2025-31458.json) (`2025-03-28T12:15:18.543`) -- [CVE-2025-31459](CVE-2025/CVE-2025-314xx/CVE-2025-31459.json) (`2025-03-28T12:15:18.680`) -- [CVE-2025-31460](CVE-2025/CVE-2025-314xx/CVE-2025-31460.json) (`2025-03-28T12:15:18.820`) -- [CVE-2025-31463](CVE-2025/CVE-2025-314xx/CVE-2025-31463.json) (`2025-03-28T12:15:18.960`) -- [CVE-2025-31464](CVE-2025/CVE-2025-314xx/CVE-2025-31464.json) (`2025-03-28T12:15:19.107`) -- [CVE-2025-31465](CVE-2025/CVE-2025-314xx/CVE-2025-31465.json) (`2025-03-28T12:15:19.237`) -- [CVE-2025-31466](CVE-2025/CVE-2025-314xx/CVE-2025-31466.json) (`2025-03-28T12:15:19.383`) -- [CVE-2025-31469](CVE-2025/CVE-2025-314xx/CVE-2025-31469.json) (`2025-03-28T12:15:19.530`) -- [CVE-2025-31470](CVE-2025/CVE-2025-314xx/CVE-2025-31470.json) (`2025-03-28T12:15:19.673`) -- [CVE-2025-31471](CVE-2025/CVE-2025-314xx/CVE-2025-31471.json) (`2025-03-28T12:15:19.820`) -- [CVE-2025-31472](CVE-2025/CVE-2025-314xx/CVE-2025-31472.json) (`2025-03-28T12:15:19.963`) -- [CVE-2025-31473](CVE-2025/CVE-2025-314xx/CVE-2025-31473.json) (`2025-03-28T12:15:20.110`) -- [CVE-2025-31474](CVE-2025/CVE-2025-314xx/CVE-2025-31474.json) (`2025-03-28T12:15:20.257`) +- [CVE-2024-11504](CVE-2024/CVE-2024-115xx/CVE-2024-11504.json) (`2025-03-28T13:15:39.663`) +- [CVE-2024-7407](CVE-2024/CVE-2024-74xx/CVE-2024-7407.json) (`2025-03-28T13:15:40.760`) +- [CVE-2025-0986](CVE-2025/CVE-2025-09xx/CVE-2025-0986.json) (`2025-03-28T14:15:19.357`) +- [CVE-2025-1781](CVE-2025/CVE-2025-17xx/CVE-2025-1781.json) (`2025-03-28T14:15:19.687`) +- [CVE-2025-28219](CVE-2025/CVE-2025-282xx/CVE-2025-28219.json) (`2025-03-28T14:15:20.253`) +- [CVE-2025-28220](CVE-2025/CVE-2025-282xx/CVE-2025-28220.json) (`2025-03-28T14:15:20.377`) +- [CVE-2025-28221](CVE-2025/CVE-2025-282xx/CVE-2025-28221.json) (`2025-03-28T14:15:20.483`) +- [CVE-2025-2858](CVE-2025/CVE-2025-28xx/CVE-2025-2858.json) (`2025-03-28T14:15:20.650`) +- [CVE-2025-2859](CVE-2025/CVE-2025-28xx/CVE-2025-2859.json) (`2025-03-28T14:15:20.810`) +- [CVE-2025-2860](CVE-2025/CVE-2025-28xx/CVE-2025-2860.json) (`2025-03-28T14:15:20.967`) +- [CVE-2025-2861](CVE-2025/CVE-2025-28xx/CVE-2025-2861.json) (`2025-03-28T14:15:21.113`) +- [CVE-2025-2862](CVE-2025/CVE-2025-28xx/CVE-2025-2862.json) (`2025-03-28T14:15:21.257`) +- [CVE-2025-2863](CVE-2025/CVE-2025-28xx/CVE-2025-2863.json) (`2025-03-28T14:15:21.410`) +- [CVE-2025-2864](CVE-2025/CVE-2025-28xx/CVE-2025-2864.json) (`2025-03-28T14:15:21.570`) +- [CVE-2025-2865](CVE-2025/CVE-2025-28xx/CVE-2025-2865.json) (`2025-03-28T14:15:21.727`) +- [CVE-2025-2877](CVE-2025/CVE-2025-28xx/CVE-2025-2877.json) (`2025-03-28T14:15:21.877`) +- [CVE-2025-2901](CVE-2025/CVE-2025-29xx/CVE-2025-2901.json) (`2025-03-28T14:15:22.020`) +- [CVE-2025-2908](CVE-2025/CVE-2025-29xx/CVE-2025-2908.json) (`2025-03-28T13:15:41.217`) +- [CVE-2025-2909](CVE-2025/CVE-2025-29xx/CVE-2025-2909.json) (`2025-03-28T13:15:41.387`) +- [CVE-2025-2910](CVE-2025/CVE-2025-29xx/CVE-2025-2910.json) (`2025-03-28T13:15:41.533`) +- [CVE-2025-2911](CVE-2025/CVE-2025-29xx/CVE-2025-2911.json) (`2025-03-28T13:15:41.673`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `60` -- [CVE-2023-42118](CVE-2023/CVE-2023-421xx/CVE-2023-42118.json) (`2025-03-28T12:15:14.780`) -- [CVE-2024-13847](CVE-2024/CVE-2024-138xx/CVE-2024-13847.json) (`2025-03-28T12:50:32.090`) -- [CVE-2025-1657](CVE-2025/CVE-2025-16xx/CVE-2025-1657.json) (`2025-03-28T12:59:00.413`) -- [CVE-2025-1667](CVE-2025/CVE-2025-16xx/CVE-2025-1667.json) (`2025-03-28T12:46:27.840`) +- [CVE-2024-28572](CVE-2024/CVE-2024-285xx/CVE-2024-28572.json) (`2025-03-28T14:48:51.143`) +- [CVE-2024-28573](CVE-2024/CVE-2024-285xx/CVE-2024-28573.json) (`2025-03-28T14:48:47.437`) +- [CVE-2024-28574](CVE-2024/CVE-2024-285xx/CVE-2024-28574.json) (`2025-03-28T14:48:43.373`) +- [CVE-2024-28575](CVE-2024/CVE-2024-285xx/CVE-2024-28575.json) (`2025-03-28T14:48:40.390`) +- [CVE-2024-28576](CVE-2024/CVE-2024-285xx/CVE-2024-28576.json) (`2025-03-28T14:48:37.483`) +- [CVE-2024-28577](CVE-2024/CVE-2024-285xx/CVE-2024-28577.json) (`2025-03-28T14:48:33.360`) +- [CVE-2024-28578](CVE-2024/CVE-2024-285xx/CVE-2024-28578.json) (`2025-03-28T14:48:28.610`) +- [CVE-2024-28579](CVE-2024/CVE-2024-285xx/CVE-2024-28579.json) (`2025-03-28T14:48:24.560`) +- [CVE-2024-28580](CVE-2024/CVE-2024-285xx/CVE-2024-28580.json) (`2025-03-28T14:48:19.057`) +- [CVE-2024-28581](CVE-2024/CVE-2024-285xx/CVE-2024-28581.json) (`2025-03-28T14:48:15.920`) +- [CVE-2024-28582](CVE-2024/CVE-2024-285xx/CVE-2024-28582.json) (`2025-03-28T14:48:12.423`) +- [CVE-2024-28583](CVE-2024/CVE-2024-285xx/CVE-2024-28583.json) (`2025-03-28T14:48:08.290`) +- [CVE-2024-28584](CVE-2024/CVE-2024-285xx/CVE-2024-28584.json) (`2025-03-28T14:47:52.610`) +- [CVE-2024-44276](CVE-2024/CVE-2024-442xx/CVE-2024-44276.json) (`2025-03-28T14:09:35.787`) +- [CVE-2025-0189](CVE-2025/CVE-2025-01xx/CVE-2025-0189.json) (`2025-03-28T14:31:37.077`) +- [CVE-2025-0190](CVE-2025/CVE-2025-01xx/CVE-2025-0190.json) (`2025-03-28T14:28:25.273`) +- [CVE-2025-0281](CVE-2025/CVE-2025-02xx/CVE-2025-0281.json) (`2025-03-28T14:22:53.790`) +- [CVE-2025-0312](CVE-2025/CVE-2025-03xx/CVE-2025-0312.json) (`2025-03-28T14:11:12.457`) +- [CVE-2025-1653](CVE-2025/CVE-2025-16xx/CVE-2025-1653.json) (`2025-03-28T13:17:33.270`) +- [CVE-2025-20124](CVE-2025/CVE-2025-201xx/CVE-2025-20124.json) (`2025-03-28T13:22:42.077`) +- [CVE-2025-20125](CVE-2025/CVE-2025-201xx/CVE-2025-20125.json) (`2025-03-28T13:37:16.650`) +- [CVE-2025-20204](CVE-2025/CVE-2025-202xx/CVE-2025-20204.json) (`2025-03-28T13:42:57.807`) +- [CVE-2025-20205](CVE-2025/CVE-2025-202xx/CVE-2025-20205.json) (`2025-03-28T13:46:02.393`) +- [CVE-2025-21117](CVE-2025/CVE-2025-211xx/CVE-2025-21117.json) (`2025-03-28T13:24:51.620`) +- [CVE-2025-2854](CVE-2025/CVE-2025-28xx/CVE-2025-2854.json) (`2025-03-28T13:15:40.923`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 210a36e7541..2dfe2fb5306 100644 --- a/_state.csv +++ b/_state.csv @@ -170164,7 +170164,7 @@ CVE-2021-24002,0,0,addc5eef10d2818e03f7e15b6eac319d4f4160522b2da84506fdf9afee446 CVE-2021-24005,0,0,90b643847db1ffbda88a1e24fd39a6d41ba3ed869904aacfe0f12013ff128369,2024-11-21T05:52:11.520000 CVE-2021-24006,0,0,86422d585823531724bba7d81a507595d8b212f8cd4a7e1633c3ead27b68d9ca,2024-11-21T05:52:11.643000 CVE-2021-24007,0,0,220048f00966eddc01c92bfbc5adffcb09ffb6bb101362af86860eb6aad6c3d8,2024-11-21T05:52:11.773000 -CVE-2021-24008,1,1,ad739447e0ed4d35a8cb16bb14292da3b34e66046247843babdfa7aadfdb6b58,2025-03-28T11:15:36.620000 +CVE-2021-24008,0,0,ad739447e0ed4d35a8cb16bb14292da3b34e66046247843babdfa7aadfdb6b58,2025-03-28T11:15:36.620000 CVE-2021-24009,0,0,fb92da175d73dc74b6a1a2076c75478b767f109414e2f9be9cbde10ba77e9f4b,2024-11-21T05:52:11.923000 CVE-2021-2401,0,0,e836cbf9b9529d542b335d1267d910fa46c8af303aca0af0f04193133dede53f,2024-11-21T06:03:03.020000 CVE-2021-24010,0,0,10717fa162d2085ac94ce76810cd605f18c622ea6cfe839a903f2b0b65019295,2024-11-21T05:52:12.053000 @@ -210139,7 +210139,7 @@ CVE-2022-44715,0,0,5b241799ae6b884fe57141f2d8c41ed6fa02914a646428e290f97256578fe CVE-2022-44717,0,0,370b019989f037e96a2c2262b0f3225e0b3668c0e0eb0527ab6534489888b4cf,2024-11-21T07:28:21.630000 CVE-2022-44718,0,0,c025de4fda89deb0c067b8ab3aea8e39e154a2f234fe3d24caaab84771ed0768,2024-11-21T07:28:21.773000 CVE-2022-44719,0,0,95f36d24d2c2f52c1dda61947950688f864c0a30d123ed3b6f30e7b10efb6d32,2024-11-21T07:28:21.920000 -CVE-2022-4472,0,0,0ea638e835bc1d80a1ffb9e044f212975fba8567f11fdf1ed75f1e27845c977f,2024-11-21T07:35:19.890000 +CVE-2022-4472,0,1,b29e148154b8d93946c2fa2b80f2586b95f0fb1c529e9a6fe708b58805235ad4,2025-03-28T14:15:18.053000 CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311beff67,2024-11-21T07:28:22.087000 CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000 CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000 @@ -210260,7 +210260,7 @@ CVE-2022-44955,0,0,e6b0c638389d060355a0f3905e6dd762d666f9040db16167319772a36a253 CVE-2022-44956,0,0,d1b70adfdab776c1c5c0b014d9feac2cad77496972cb9a7a631c2121e94f64d3,2024-11-21T07:28:35.273000 CVE-2022-44957,0,0,fe0e43a3c399e52a8e98ea2a394a187e7e1da0eea6ef55796b0674d6e8d37057,2024-11-21T07:28:35.423000 CVE-2022-44959,0,0,afe42cf127e64338dbf62adbd3682575b6ae471a5c7331b91c6e58ec6af6d692,2024-11-21T07:28:35.567000 -CVE-2022-4496,0,0,4209ce18f0602b75266699a7fea741ade7db9543f5f266ec65bb4f4113acf480,2024-11-21T07:35:22.817000 +CVE-2022-4496,0,1,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5c1,2025-03-28T14:15:18.247000 CVE-2022-44960,0,0,5c57a054c5232484ba125138b2e5ab52b6bc141f4e49d5a562f6cefb060d96f3,2024-11-21T07:28:35.707000 CVE-2022-44961,0,0,dc0026edf8d696785d4ad8685d73d54e682943337771cc165b834e50c32149f7,2024-11-21T07:28:35.863000 CVE-2022-44962,0,0,e872b1aec92c00d7b59fb3535b11b1ddc2890769fa87f1d1b3c5799210cb1ca3,2024-11-21T07:28:36.020000 @@ -211342,7 +211342,7 @@ CVE-2022-46485,0,0,c0c6dff55283dfb771f1a5b37a71bcda6eb783b9616964cb839caae868642 CVE-2022-46486,0,0,273bdea328c05f53d2935ee8b7a4d92db36b6cf750418b0fcbf9c9ac94631bba,2024-11-21T07:30:37.913000 CVE-2022-46487,0,0,65fe5e22876afc2cb9c6b96f2f17c89cd6669debe9e703f15386e0a779e67884,2024-11-21T07:30:38.080000 CVE-2022-46489,0,0,7e5278eabce0e4178abbc2321c3e1cb938d848560691becda1a2dd3dbb795ffc,2024-11-21T07:30:38.257000 -CVE-2022-4649,0,0,5190915e0998b8a32aaf3a07b1fe27236b601a9523d83e7aac8c0fa4989a67d3,2024-11-21T07:35:40.203000 +CVE-2022-4649,0,1,4397e99c546f206fb5608e5d52d00f6a11918bbe5a94a37f22c72384e078b82d,2025-03-28T14:15:18.420000 CVE-2022-46490,0,0,0aba57b3e2c6acedfab8943eea7d30e9d0d314e0e1ad14ca907ef24ac2a1aeb4,2024-11-21T07:30:38.400000 CVE-2022-46491,0,0,1935572f3715f36fc93538c008dc76c9b9fcc6be4c0c502750bd2d8154d14b6b,2024-11-21T07:30:38.557000 CVE-2022-46492,0,0,ea33259e380519928079c589c50e4fd70a12dd967d5e0ef95d74810d65324acf,2024-11-21T07:30:38.693000 @@ -211370,7 +211370,7 @@ CVE-2022-46536,0,0,ba5b7d5056f87a59e895d74fb72cc3d15f19f4be6f0ad992b5fba775595bc CVE-2022-46537,0,0,12906b63d2f5ad59fda29ada33f3d31b7a7c5331fff3bd5aa033e84dc3f38b67,2024-11-21T07:30:41.460000 CVE-2022-46538,0,0,d9bc61ef0e5ef0fa6f8492952fe761045187c8f765eaebfc4f01b4f3011fd250,2024-11-21T07:30:41.603000 CVE-2022-46539,0,0,fbb842b44c65b836721a9ca80d64c29a6175b84f4a452e4905d88976fa78e76e,2024-11-21T07:30:41.753000 -CVE-2022-4654,0,0,0ea5d85160f95bb36c64b655c1e31a22e86b1a408e894ebf014bc7af90927578,2024-11-21T07:35:40.747000 +CVE-2022-4654,0,1,a11ae60e7a08e302805d9954c19f704fabaa96a1b3e3cb64005becb7d6259b17,2025-03-28T14:15:18.587000 CVE-2022-46540,0,0,371160f698a610d84ddca173575f46caef28646a1f08e43352262b6cad9c9354,2024-11-21T07:30:41.893000 CVE-2022-46541,0,0,42d88c6d87824269997cb6db2986e2590b1873121ed705f61857a8ae4a496132,2024-11-21T07:30:42.043000 CVE-2022-46542,0,0,12f57bc9080a641356a575564eaec43bb7c38161002f8b8efec9ad7b6d66cc25,2024-11-21T07:30:42.187000 @@ -218005,7 +218005,7 @@ CVE-2023-22329,0,0,f87a257a3f491ed4d593d771327413fcc27bcb682b9124de27e798796cef2 CVE-2023-2233,0,0,03f299c1d59d076f3123647077160e666b5ecb77282bd585e0ab47f916f62f95,2024-11-21T07:58:12.350000 CVE-2023-22330,0,0,2f72b562c10a58f1bde1370f048bf90c89a94766f9eeedb9676c2eca440dc010,2024-11-21T07:44:34.537000 CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404e77,2024-11-21T07:44:34.737000 -CVE-2023-22332,0,0,5b53881cc7f561923a7307a21fa724cf6206fbff5ce2eff252fbfaafd93e829c,2024-11-21T07:44:34.840000 +CVE-2023-22332,0,1,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000 CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000 CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000 CVE-2023-22335,0,0,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000 @@ -233754,7 +233754,7 @@ CVE-2023-42114,0,0,ad1a046a818ca4b20463d80ac89b1049e84653b66c693cc244ddfc0c00b1e CVE-2023-42115,0,0,21769ede9e84e26c1380598e55d2f624532dccb5b8b369223818c2ae41774076,2024-11-21T08:22:18.330000 CVE-2023-42116,0,0,9899b100c38c999410b18eeecefc878bbc0323520bcc7d06ff618379e98e6aa1,2024-11-21T08:22:18.447000 CVE-2023-42117,0,0,ab08f119534538e55f65871fd32c926ab70b39b85c50a7f7fe2c5b05738aa08e,2024-11-21T08:22:18.567000 -CVE-2023-42118,0,1,b1bbcc0c160baa5cb550278009c048889080ece1a70ce0e420235d67073e726f,2025-03-28T12:15:14.780000 +CVE-2023-42118,0,0,b1bbcc0c160baa5cb550278009c048889080ece1a70ce0e420235d67073e726f,2025-03-28T12:15:14.780000 CVE-2023-42119,0,0,b1d4aac8a3f507a8b31b7bd5e8dc22c958e0e00f7935a091d5ed823b09b4b3a2,2024-11-21T08:22:18.800000 CVE-2023-4212,0,0,f7298e966ffc27e10318893d708c8b683881dff5cadb9b4411422a970ebf2514,2024-11-21T08:34:37.997000 CVE-2023-42120,0,0,84a1fd81aae92051990d5fe3a42231e8412a6ff7d68907f4300cca585c000a9a,2024-11-21T08:22:18.917000 @@ -239044,11 +239044,11 @@ CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b CVE-2023-49539,0,0,fa31534f56545ea133b0ffca594c9cec771dfcd7a58fe43a64b5181a65ad6cb7,2024-11-21T08:33:30.410000 CVE-2023-49540,0,0,e1bbeead0d4c47048abd2a39187eb4c0af1ee24fb9641e708f014f21bbd6a369,2024-11-21T08:33:30.643000 CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000 -CVE-2023-49544,0,0,badf3336354fd428ac051cb158cc2c42075aafeb25a1b391644301fd9a1b0704,2024-11-21T08:33:31.077000 -CVE-2023-49545,0,0,7570226ead50169cb0268ad44f464d13fced0980a94a18172fe7d25f2d6c9844,2024-11-21T08:33:31.297000 -CVE-2023-49546,0,0,14bf84d5f066cb1d89d1ee61eac57297f8caa27e955851129c11b8a32ccabacb,2024-11-21T08:33:31.500000 -CVE-2023-49547,0,0,e0538cc52a0cdaf8e61e583e2e310cd671a3c72017eae9bcfe30b65867f891f0,2024-11-21T08:33:31.720000 -CVE-2023-49548,0,0,e5c89103e97bb2744a3548d98ad1b6269e2bd4690ee8567560a3b7d544f875b8,2024-11-21T08:33:31.930000 +CVE-2023-49544,0,1,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000 +CVE-2023-49545,0,1,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000 +CVE-2023-49546,0,1,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000 +CVE-2023-49547,0,1,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000 +CVE-2023-49548,0,1,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000 CVE-2023-49549,0,0,9a2cebaebaf97239f2bfd9173576257a692bf9d1d5d1560d13729dd131766317,2024-11-21T08:33:32.147000 CVE-2023-49550,0,0,90ae251e67635b7fa54b057d1493ed9eea320b49928086b9b51c17ca0a7c6b29,2024-11-21T08:33:32.297000 CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000 @@ -239373,15 +239373,15 @@ CVE-2023-49963,0,0,716a28f46de42a2e56dd2dbb762be5dc774690d8da0a8361cd05a453c1e45 CVE-2023-49964,0,0,68e81d9007921be61201b4b69446355cbaa46e44d19df4f8532af74e68f85bb0,2024-11-21T08:34:06 CVE-2023-49965,0,0,ef388bac4cc546bedef71999d058081ade12398c6f30adb285e66370d4c444b9,2025-03-27T17:15:41.540000 CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000 -CVE-2023-49968,0,0,e27c0d39fec3cc8d78cbcdbda5600060aa4aa6025ea7df0c05b60635677b9f80,2024-11-21T08:34:06.490000 -CVE-2023-49969,0,0,1c6e721c03f56e0577536da9bf5b7c5c7b3559914e0b7dbdfb0a379adc55a5d7,2024-11-21T08:34:06.703000 +CVE-2023-49968,0,1,97377596cdba5536ff0311c7d520808ab6dc15969b28250280847661805e1558,2025-03-28T14:32:27.133000 +CVE-2023-49969,0,1,b0aa2df24f015e2ec9dd6eaf374adcb2f950caeca313a4a225d569537ebe772a,2025-03-28T14:32:21.523000 CVE-2023-4997,0,0,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000 -CVE-2023-49970,0,0,b6b21cd662c6188652027dde752dfbe4d17bfefd4a2e3df151e2c3955d71ee50,2024-11-21T08:34:06.910000 +CVE-2023-49970,0,1,554f580e23ae19185eca0545f17817222c5a39acf2827ea39ca7f2b008b86908,2025-03-28T14:32:11.623000 CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000 CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000 -CVE-2023-49974,0,0,7f488a86d0ae45569225fc0c424bbd7132352109d96dc64d8e092ba38bbad293,2024-11-21T08:34:07.537000 -CVE-2023-49976,0,0,dc813de2d491266ed91a01eb71b0caae473397cd5b519c212f1230a701290a59,2024-11-21T08:34:07.757000 -CVE-2023-49977,0,0,e2d356c1ee7ec3d1bf058adc4ff2c7dbd4c712f6da8f95ff297395fbe12d4026,2024-11-21T08:34:07.977000 +CVE-2023-49974,0,1,348ee359439081d72ce9187bf69627ba1126d6b681312b67518b561274e51026,2025-03-28T14:35:30.683000 +CVE-2023-49976,0,1,7842662c4b0af2daa6730e8628313d9027337d2060a5820d0de30539d035a521,2025-03-28T14:35:34.803000 +CVE-2023-49977,0,1,b7af45a0db923330a861cac6d351021b003f94dac16375865374f3de5ce43d3d,2025-03-28T14:35:38.520000 CVE-2023-49978,0,0,fa500e23f48da6df2a860b98eda481781ba05e9f7f13de0b425bad34116a5f73,2025-03-05T18:51:00.240000 CVE-2023-49979,0,0,75f23943a375ce8279e3286ef1840c70cb95a9e90cf00813fe39f1dd23977277,2025-03-05T18:51:45.150000 CVE-2023-4998,0,0,e165eb9587ade3f2685138122c6908d08aa666717671177d785c6c36e56a4e40,2025-02-11T02:15:32.447000 @@ -240145,7 +240145,7 @@ CVE-2023-5126,0,0,9ada6a8f2e9b9491a8fe3f4eeafb2a31d386842291921479a06d9dd8a73add CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130e0,2024-11-21T08:41:06.983000 CVE-2023-51277,0,0,ab81eaea8de114fbc99d2d9587fb99b0e511144ce0a98dd0d340bbd095f06374,2024-11-21T08:37:56.290000 CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000 -CVE-2023-51281,0,0,13c5d72ef411be7896310c619236218fa85e3239b473c76db8a7fc7598f5af7d,2024-11-21T08:37:56.467000 +CVE-2023-51281,0,1,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000 CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 CVE-2023-51293,0,0,572ed6a446805f6a16a7884a5b142aaa064f4477ce8cda8bdc3dc8fa68963f57,2025-02-20T16:15:34.460000 @@ -245947,6 +245947,7 @@ CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000 +CVE-2024-11504,1,1,2d88e5e7be479df873d338e951bab20c84937b0425549a8c20401e5aaf19ae80,2025-03-28T13:15:39.663000 CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000 CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000 CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000 @@ -246788,7 +246789,7 @@ CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4db CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000 CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000 CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000 -CVE-2024-12336,0,0,b86f4af004d571796d9d81fc12500ffb5f7f4413ff686cdb6692c2f887191e69,2025-03-15T04:15:20.263000 +CVE-2024-12336,0,1,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000 CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000 CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000 CVE-2024-12339,0,0,3eb83436990555e2815b093662c73c0abac18956e62294ddc11370b3651631b5,2025-02-19T08:15:13.907000 @@ -248252,7 +248253,7 @@ CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567 CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000 CVE-2024-13844,0,0,df23a30d386c8f5781c2dae0c047c9a36c6ad162f944596bb205e62e61aafc42,2025-03-13T13:10:31.303000 CVE-2024-13846,0,0,bc15bbce097a905951a0b88c5b6aded5de0269f145c99c529b730210812bf05d,2025-02-25T03:27:13.767000 -CVE-2024-13847,0,1,7374deac36adec445bd3a6895bad5f61cf78eb6111cd9143014657300e12cfeb,2025-03-28T12:50:32.090000 +CVE-2024-13847,0,0,7374deac36adec445bd3a6895bad5f61cf78eb6111cd9143014657300e12cfeb,2025-03-28T12:50:32.090000 CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000 CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000 CVE-2024-1385,0,0,123d772d2fc5a1002531080710a3a85de4715677f769e2db13af2736e10a6c92,2024-11-21T08:50:27.933000 @@ -254944,8 +254945,8 @@ CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b79432618 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 CVE-2024-2754,0,0,3c146feabec526a8d57153969ca10ec7861e0891282d7465bc0903e40372f4e2,2025-02-18T16:56:54.550000 -CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000 -CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000 +CVE-2024-27558,0,1,5761ec9fdce6ef2e5e63b6775d933b83bee2438c99df0ca7e9c1f4893296dc22,2025-03-28T14:09:20.343000 +CVE-2024-27559,0,1,ae8f360ea3bfb9b14662fbb3b1eacc93b9bb3567ce84bd5abdf4e632b00e9db4,2025-03-28T14:26:01.253000 CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000 CVE-2024-27561,0,0,fc16f92d17651bc7c1c4e9050d562b06f5135d4a3f335b425cd240bae1399bcf,2025-01-21T15:08:34.140000 CVE-2024-27563,0,0,5533c243cccd53d02317f51d488d5c114a766a4a03a83659e29f733a18ae8237,2025-01-21T15:08:45.213000 @@ -255006,7 +255007,7 @@ CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab4 CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000 CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000 CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000 -CVE-2024-27689,0,0,b8125c9204d9b7912d4a758cf2a362c6f50eefc46a69eade4a7f53332972070e,2024-11-21T09:04:53.813000 +CVE-2024-27689,0,1,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000 CVE-2024-2769,0,0,f5fed59b7bca296011d1da69594ac44436bea25a4aa43870a75a391217b8bea1,2025-02-21T17:14:54.783000 CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000 CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000 @@ -255036,10 +255037,10 @@ CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000 CVE-2024-27734,0,0,5520fe6516adbd7c3f921cf16d2643163c02ae324582977bf7301b0b4ba5b2bc,2024-11-21T09:04:58.490000 CVE-2024-2774,0,0,0c25920b57d442dd5a233b579cf27e95446a07cdad8c6e0e7b03eb2c3014b13c,2025-02-21T17:49:07.243000 -CVE-2024-27743,0,0,0540c412bdea80c8596cda3a58c6fc461f8217735346b7c84cfb5c47eeb10d9e,2025-03-24T18:15:19.060000 -CVE-2024-27744,0,0,d87bcdd72cf7cf7c0ffdb2aaccde30128c133219c9b50f003c292157283c3c73,2024-11-21T09:04:58.937000 -CVE-2024-27746,0,0,cccbd29f894f9698774bcae5e4bc2377fa7c94e3f6464de4b19ea803ef2d352b,2024-11-21T09:04:59.170000 -CVE-2024-27747,0,0,730bf8bc21e4bbd04a9fa6e13239843c2634744b55e747c9304ef4f250570fce,2024-11-21T09:04:59.400000 +CVE-2024-27743,0,1,cd7c0a0ce5fe4f27e3ad8aff189ec43ab8a8aa92d1fa4e983c682c35b1e638a4,2025-03-28T14:34:38.150000 +CVE-2024-27744,0,1,d280c6a50d1acc2279803f87f5fd590eca421c9059b05f8d5d568ff9b17bc89a,2025-03-28T14:34:30.930000 +CVE-2024-27746,0,1,b585be55013faaaa137868651d1760039a51ba5162ac0d5a3114230e67117775,2025-03-28T14:34:25.407000 +CVE-2024-27747,0,1,6f1ddae8b249acf53b9166e440726ecfc1ce36472977a70dc04ccd917691be1b,2025-03-28T14:34:16.973000 CVE-2024-2775,0,0,c7ffaeb0461f05cca21e646af6acc77ea3eef3d3454b74ba7b43a7ce629618f8,2025-02-20T18:29:08.757000 CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000 CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000 @@ -255639,31 +255640,31 @@ CVE-2024-28558,0,0,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0c CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000 CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000 CVE-2024-28560,0,0,bb940286b1ac2c7041e7fd9a499645864d82efca5b646de14d7cabba2bdacf62,2024-11-21T09:06:31.887000 -CVE-2024-28562,0,0,c23ec7d823a2a23e2493c2b6a806d90969d2ecfa7e74ea1bf53aa21020a44d03,2024-11-21T09:06:32.213000 -CVE-2024-28563,0,0,9d20a62f27af2278ecc98d77f5752e3b254c56fa684c78e9f54bb2334840b7c3,2024-11-21T09:06:32.600000 -CVE-2024-28564,0,0,a8ef29c6a90869a6dfc5492ac9b9ac5f45e11589d92c3c49160e3eb562887c0a,2024-11-21T09:06:32.927000 -CVE-2024-28565,0,0,5a6ceee2d5138821eecccd0d3bd97028a77e63b602fbf1848ccb99b554d0096c,2024-12-04T21:15:23.083000 -CVE-2024-28566,0,0,c4cb53a722870a1e466972d057623fe51132fbd1f271e535243e850dfdacf7cb,2024-11-21T09:06:34.113000 -CVE-2024-28567,0,0,2233c8d561911bbfcae8b480b60c96357013bfcfd626417e55d935d27a853308,2024-11-21T09:06:34.490000 -CVE-2024-28568,0,0,b6239db453737ce12112565e6329ee4005b4bde8803bac4e3f3aeac673f44c68,2024-11-21T09:06:34.790000 -CVE-2024-28569,0,0,e18c17dc7c140f78b0c49e6b86f735b0249b9ad9ad5fd08bb7943d60924aafdf,2024-11-21T09:06:35.107000 +CVE-2024-28562,0,1,546f9e95f1ac7221637a3c37ac915ba60e52c8426360cde1cf4cc63831388938,2025-03-28T14:44:56.623000 +CVE-2024-28563,0,1,822cdb8b0e5e61e29acef8fcea7528fc6793f08518f6f570a4af369999fc5e2b,2025-03-28T14:52:00.437000 +CVE-2024-28564,0,1,edb16379ed48243b327497243e538094e4fe994646ba0dedf46e13be97bb55f2,2025-03-28T14:51:57.007000 +CVE-2024-28565,0,1,618b66620abb3c0bb79b06e8932dfaaac3a3b1cac10f5266e1bbed23527a9220,2025-03-28T14:51:53.900000 +CVE-2024-28566,0,1,81ac8320f758b1290567ab5bbff6732548d5cbd00ed4018aa55d9406326b287b,2025-03-28T14:51:49.903000 +CVE-2024-28567,0,1,30291626499bb9e642bdbcddcc7d995098d34c83a7fdbb9365bc256dab3d9e35,2025-03-28T14:49:08.173000 +CVE-2024-28568,0,1,5dcf253cce1d2e0ec342a381869dbadcf4885f82a3c38c89389ff9298b986b10,2025-03-28T14:49:04.690000 +CVE-2024-28569,0,1,89f94c291c3764568419aeba0eea5234bfeda10e1719928f6e04eda112f29a96,2025-03-28T14:49:01.337000 CVE-2024-2857,0,0,6295ecc20584366c794ee0ccb42f15320623f61e630cf97810cfc422fe1c34d8,2024-11-21T09:10:41.607000 -CVE-2024-28570,0,0,cd43c950e92d5fb85fda8d55d430af60c3766505129358221264cfe21f7d1579,2024-11-21T09:06:35.440000 -CVE-2024-28571,0,0,77821d61ceb1300ed2b24e5619fbf76f2fcecc8669ad3a2082e5ad2bc7ba64af,2024-11-21T09:06:35.760000 -CVE-2024-28572,0,0,3bb27a3adeafd1fb4ed083baafbdea4ecb9669cd8370041f5067e336474f9469,2024-11-21T09:06:36.090000 -CVE-2024-28573,0,0,92a1aa05a0925f8e0d13ea69c87ea3f5c0a150b14964c861265af5650677d388,2024-11-21T09:06:37.043000 -CVE-2024-28574,0,0,61a0b950619f652f02e3676284c06d6b9e691dcc0a7ff3c3f5fd34459e372949,2024-11-21T09:06:37.343000 -CVE-2024-28575,0,0,3dc2726b4ac33cf5f9bbc002474d5e874eac209d915b34a448166c2b93ece6cd,2024-11-21T09:06:37.643000 -CVE-2024-28576,0,0,185448f5a53bd09b9a8344f16402235ff6ababf796fba0b80a7c9822ec33996f,2024-11-21T09:06:37.980000 -CVE-2024-28577,0,0,49a541d4928b94265658ace3c346e57f6b187582c36ad32ce075967892160e48,2024-11-21T09:06:38.280000 -CVE-2024-28578,0,0,81b54243ee9a5cd52843af67b64a0053311cb00bf594a5f9ffe53c9e3612ebb4,2024-11-21T09:06:38.590000 -CVE-2024-28579,0,0,8a00dc64b0e12a997407db93510392e7be4a1411310af762d68a642a06dde63e,2024-11-21T09:06:38.930000 +CVE-2024-28570,0,1,ad2785ae9617051620d5840e06eafe4ff9dfef47c56d434ee1acd01fb2e620e8,2025-03-28T14:48:56.937000 +CVE-2024-28571,0,1,40b1f850be2810c82e5fb19cd21bcf0a3e3ac534513afaedf079c7e24a03f718,2025-03-28T14:48:54.140000 +CVE-2024-28572,0,1,04fc282e4b7f64248bc2cb60eff2823593936b427825c6a62dff9231c9ea838e,2025-03-28T14:48:51.143000 +CVE-2024-28573,0,1,f48b33ec35392a77c74384a73dbb40982da7413ac85987a6ae26244b20fcb870,2025-03-28T14:48:47.437000 +CVE-2024-28574,0,1,e24221c7f9c0dc767f1a4af68f67dac8b863bc93b77a4d3fc34c5f9e8dd5eb3a,2025-03-28T14:48:43.373000 +CVE-2024-28575,0,1,6d698b31f6a8ee56112b639023cf9679319442f063850d57ad76a28d58acd6a3,2025-03-28T14:48:40.390000 +CVE-2024-28576,0,1,0351857f9663fe04411fd141642711a40532f1c9ea1f0c9c81917feb5c58bf9d,2025-03-28T14:48:37.483000 +CVE-2024-28577,0,1,a7cb6c7ed03f3487ca50cdc6503815f6723fe0131c0bbe949ef36ec326df72a7,2025-03-28T14:48:33.360000 +CVE-2024-28578,0,1,cf270d69ca34a93783a0b985174a8c47f840b263a63da4a88622d3d39feb79cb,2025-03-28T14:48:28.610000 +CVE-2024-28579,0,1,7a9c0efba9c8a73c1ffa4bd3ee26fdfe2e3e640138bbe9e85ad9a2ceb4968d3a,2025-03-28T14:48:24.560000 CVE-2024-2858,0,0,1b76ee215a17131c0be72ed024c7b73b1e03349dc8f6072a53a0e1699d6fdc20,2024-11-21T09:10:41.807000 -CVE-2024-28580,0,0,21016dfa398d7ab18a333730814af582263ab196c0f628886bb2dd18ec9f99ec,2024-11-21T09:06:39.213000 -CVE-2024-28581,0,0,ad58e0c381e7b5558a330d002f43ec5a22ea846a59a430c220c528f9a9a974ec,2024-11-21T09:06:39.493000 -CVE-2024-28582,0,0,04799e93ceccd9cc4b3d5e6db53e76424895199be69cbe96cfb9fe2b3cd39628,2024-11-21T09:06:39.790000 -CVE-2024-28583,0,0,dd3c0b8d8072bd6a8dcd0e860b02c395eb40124b9c8f43138e219d628568beb0,2024-11-21T09:06:40.073000 -CVE-2024-28584,0,0,48b2b30bfacc95821daf411318d5a1df0132f3fefe454b07829432d1245ec198,2024-11-21T09:06:40.357000 +CVE-2024-28580,0,1,0c82968f6366c553f74f7c6ec07a86559c4777b7d5e30537a1d20c17d787afcb,2025-03-28T14:48:19.057000 +CVE-2024-28581,0,1,191b8c9324750f099e546daee36bcabaa27fb826baee53f51e3285fbb77b43a2,2025-03-28T14:48:15.920000 +CVE-2024-28582,0,1,6e69e62a685361851f0997bc47167c320b84ea905c873f3b4702a12de5a6a826,2025-03-28T14:48:12.423000 +CVE-2024-28583,0,1,871d5e7614a91d5aa7be768444e4b1a611dd29c5c2e4535b36fd330788bc9c11,2025-03-28T14:48:08.290000 +CVE-2024-28584,0,1,280815d56b9906ce1763261fe7a802bfeefc69e503ae39d7d5e342479901b86d,2025-03-28T14:47:52.610000 CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000 CVE-2024-2859,0,0,caa75afab36dcf492b03d579a92cc4d5b32496de16e8a53f8ac97b57d5699ab1,2025-03-19T19:15:40.793000 CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000 @@ -267884,7 +267885,7 @@ CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000 CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000 CVE-2024-44275,0,0,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000 -CVE-2024-44276,0,0,853c05d3f4de752a5779d9ab38688aa26cee392bebe6566daa96ce87ff3947db,2025-03-21T17:15:38.070000 +CVE-2024-44276,0,1,1cb833ffb18fa9f2e36eaf915a97fc850b9e1576b6bef756fa1155e91f6af5a1,2025-03-28T14:09:35.787000 CVE-2024-44277,0,0,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000 CVE-2024-44278,0,0,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000 CVE-2024-44279,0,0,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000 @@ -278653,6 +278654,7 @@ CVE-2024-7399,0,0,c63a2f56ac97180c8eeaff7425fc4e1891afb5117e5e5ee0a06426ef5c6cec CVE-2024-7400,0,0,b76f467bea873c8198d239fa89d885a8d397522f6f80ed1fa2b1862679c1bdd0,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,0c1aa626bf1f013cd6efcf64cafc89bc58668305e616bb93bc951d283ad465e7,2024-09-05T18:34:17.433000 CVE-2024-7404,0,0,6148e9ce6d58228af84e4655cbde2088c6036af50794e9b6097ba0e8b415003e,2024-12-12T21:48:13.673000 +CVE-2024-7407,1,1,d00d43dbbd913d662b499a9096f6a0c797a075c158935863f0d5c141726d1d39,2025-03-28T13:15:40.760000 CVE-2024-7408,0,0,941fb6d771fbc604d540f68018eab8ecb75ec650c1b66e874ba92cbbafa4a029,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,745add50a7f9f83aeae3165fe582507d9b760d467cb9268750136f81de9a6463,2024-12-12T04:15:08.177000 CVE-2024-7410,0,0,3acc879284fb297363138787309c2aa9ff410cc3958418c08efd55e0119fa6e8,2024-08-12T13:41:36.517000 @@ -281085,8 +281087,8 @@ CVE-2025-0184,0,0,b184a63ccfba52aab27fef6691d340e1daddf4d99a47576e2d38909af97d37 CVE-2025-0185,0,0,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000 CVE-2025-0187,0,0,d12a337bc74d87519d5374b684a3dea7ffdd06cf77effdc0f40e0dc463609868,2025-03-20T10:15:51.413000 CVE-2025-0188,0,0,e9031ff53ffef21475c8aa9f8ab1c19b6522b51f136de0f15b15cb0b70e0e528,2025-03-20T10:15:51.533000 -CVE-2025-0189,0,0,fca222ba5bcbefdec4f0f915caf83951aab0638cdf91dbb61c81c563a9c01f3f,2025-03-20T10:15:51.660000 -CVE-2025-0190,0,0,87463b3557c4bc61fb931a39e3e245581aed7238b9b83b8060f262ebd2487c12,2025-03-20T10:15:51.780000 +CVE-2025-0189,0,1,eb102a6a48c92eda67c16e70908cbfabd41b03486056a8f701abee55cf0ab25b,2025-03-28T14:31:37.077000 +CVE-2025-0190,0,1,53e2908612bb73c2c24609187f041bdce849fd9fe447d49d2376c215d06f80fc,2025-03-28T14:28:25.273000 CVE-2025-0191,0,0,64c66c7c1427f64cc3892b0da850af5ec28804e7cd62aedbe5c560debd12fdd9,2025-03-20T10:15:51.907000 CVE-2025-0192,0,0,4efec9c1255ccd0a3d2bb956c84c31801bd3aa354ef28ec5fc9595ff9332bb67,2025-03-20T10:15:52.033000 CVE-2025-0193,0,0,e17fc9e0ccd728e301ded30b14f7be42c74aa85aac5db475710fd304e3ff3102,2025-01-15T11:15:09.280000 @@ -281145,7 +281147,7 @@ CVE-2025-0254,0,0,c0b515e46d918691acf880cf7e48dd1484bbbda9200e70d05e0bbba9fd762e CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000 CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000 CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000 -CVE-2025-0281,0,0,3eed2c9ac115be61f8948fe5ec86ee9cb61bbdd7dd3b065a4b62fe68aa7cd3a6,2025-03-20T10:15:52.153000 +CVE-2025-0281,0,1,2f178337cc54bece29a62c185e27ac31b0fc9ea32855fcb9c996c42739c26e1a,2025-03-28T14:22:53.790000 CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 CVE-2025-0285,0,0,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000 @@ -281170,7 +281172,7 @@ CVE-2025-0306,0,0,d624312a1c8b12756fc5d0bd3e740f6bb7afb0946b71499dfca32a0f9d8ebf CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da39d,2025-02-07T18:15:28.337000 CVE-2025-0308,0,0,69aa7199372cd49af22bdf53a6d4af3a3fe1a182a67295d9df7e0ede45a3d01c,2025-02-25T22:14:17.707000 CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000 -CVE-2025-0312,0,0,1db620337b03173e2a129e5a59186b34821b78014a02642160c03623255c750e,2025-03-20T10:15:52.280000 +CVE-2025-0312,0,1,a77dfe55b9b8e9fd0cba677d874c5e6e1fc87ea1c4a7421660dac4e10405e186,2025-03-28T14:11:12.457000 CVE-2025-0313,0,0,e04e59ca18724183fc504276fd01824f7c821656cc44b0d64bb8f617e07b8fd8,2025-03-20T16:15:14.923000 CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000 CVE-2025-0315,0,0,5d98fa6a770161856e42c23257da6b1a5bceff2066d6b0d41a72d94c75bb0350,2025-03-20T10:15:52.530000 @@ -281653,6 +281655,7 @@ CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b5 CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000 CVE-2025-0985,0,0,b7e69fe9aab5a8f8f386d8658128b018c3bd5d2957b0618e798c2f6db4110f39,2025-02-28T17:15:15.937000 +CVE-2025-0986,1,1,ed15f2edadbeabb249f8bae31b072a394f7d803c08951aaaa5c8a49022221b78,2025-03-28T14:15:19.357000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000 CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000 @@ -282094,13 +282097,13 @@ CVE-2025-1649,0,0,3b5fbb2e4731dcc40a7a4ed88d2c8a60211ff1f5cbe5c969993021f107517e CVE-2025-1650,0,0,4218c32cbb82256e1ff0a9ceabf09dcbbee0c890d930e1b88a57eb073009cf05,2025-03-13T17:15:35.990000 CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf17c,2025-03-13T17:15:36.153000 CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000 -CVE-2025-1653,0,0,45c5b5763cb35873214a415caf0c192b98443eb35cd3acdbf4f60c0bf83ce0e5,2025-03-15T03:15:34.457000 -CVE-2025-1657,0,1,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000 +CVE-2025-1653,0,1,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000 +CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000 CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000 CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000 CVE-2025-1664,0,0,2ddafd8220da97f286feaff6915cac1d1018546efd24c59b88969afcb5318c21,2025-03-11T21:25:56.700000 CVE-2025-1666,0,0,578bd41069680734171dab8b0d965c7a5d9feef84ecb4800477ec06c1e88653d,2025-03-06T12:15:36.117000 -CVE-2025-1667,0,1,0a7578ad0c7de4d6aeb33733f4906f5ca6d53d4d71b45718607596d6bed0ce27,2025-03-28T12:46:27.840000 +CVE-2025-1667,0,0,0a7578ad0c7de4d6aeb33733f4906f5ca6d53d4d71b45718607596d6bed0ce27,2025-03-28T12:46:27.840000 CVE-2025-1668,0,0,fb6fe17ba902179b9f864e7701447d584a85a08da3f165d7c1b4a87eba49d58c,2025-03-15T04:15:21.457000 CVE-2025-1669,0,0,bb0ba6e29c17865aece93ca88373c70e2636476bd67e8ad6897876d52b0f2fbe,2025-03-15T04:15:21.630000 CVE-2025-1670,0,0,34f6432a2c4ff486a01a5492943cf82db27fc67975886281ea3f8042dbb52fed,2025-03-15T04:15:21.810000 @@ -282162,6 +282165,7 @@ CVE-2025-1773,0,0,8ec8dbded090ba64a07cfd6b14e86950d4c62160e124de793edae4c60a6f92 CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000 CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000 CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000 +CVE-2025-1781,1,1,9110731c3988f380d19d25549f49f14dcac832bed7aa92d5e3ee29cdbb0c344e,2025-03-28T14:15:19.687000 CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000 CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000 CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000 @@ -282361,8 +282365,8 @@ CVE-2025-20118,0,0,46ee44de51b9da02bd8d432dfa199efdea3d4009128ccc31daf3be958d7ba CVE-2025-20119,0,0,966174a4c9d991ad6b83e65d9f7d13b4b14250c9460c971b03cac87408097d39,2025-02-26T18:15:14.570000 CVE-2025-2012,0,0,0b8d8afd00eda96ec005af8edf0d7d04b1fb0ed2ed11512934641682f43663d5,2025-03-11T21:15:52.333000 CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 -CVE-2025-20124,0,0,a552df7c1491927fb804e7dc9b9a36b3c2e8600d44023d2c0543cde9f617a5df,2025-02-05T17:15:22.457000 -CVE-2025-20125,0,0,4979feeb29abd7ebb200e1d60ab3dfc583af50ced839733628565f6d68c7724f,2025-02-05T17:15:22.610000 +CVE-2025-20124,0,1,6db356d2fcd38b26aa3e47d7a0ec82ed7c18925211d51966c9b8a29c55acd1c9,2025-03-28T13:22:42.077000 +CVE-2025-20125,0,1,d061ff1519e48d95901944b45526454224b9d67046eae5a72bdd0b7b8937d87d,2025-03-28T13:37:16.650000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000 CVE-2025-2013,0,0,7432ed434a81be08eebea71dc536132f3b4153ef4361ce42ddf523e2ec29dcd5,2025-03-11T21:15:52.473000 @@ -282402,8 +282406,8 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000 CVE-2025-2020,0,0,ce26c5965e99864b9e0a9b9af3af837a751d1f222c43aeb691010c4ea46e517a,2025-03-11T21:15:53.477000 -CVE-2025-20204,0,0,e2329a8c28cf5009e8a52cfcdda91fee2624e7d144e716f9c9385179bd8ebf9f,2025-02-05T17:15:26.077000 -CVE-2025-20205,0,0,66723e04ee64d8f2ce9c062ef81145ef5093d18d03a4e1c8ebd198732ad0d765,2025-02-05T17:15:26.243000 +CVE-2025-20204,0,1,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000 +CVE-2025-20205,0,1,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000 CVE-2025-20206,0,0,9a82394590b91b4aed7223068e34dd2e6c890c30b29f73231c2aa9f9587d8fd0,2025-03-05T17:15:14.450000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 CVE-2025-20208,0,0,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000 @@ -282587,7 +282591,7 @@ CVE-2025-21105,0,0,7769ede7d6d67929cda835ad36f1b7f8a4f0b24a4fa55bfbbf6043d06ace2 CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2f91,2025-02-20T12:15:11.373000 CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000 CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 -CVE-2025-21117,0,0,dd144b173b452426d878a3667413e685d7e43f03cad313557afe62f172876567,2025-02-05T14:15:27.417000 +CVE-2025-21117,0,1,645b1da2e8af06c5f3d21bae0eae50f754102ea2f31528d1d042846d09e2ec44,2025-03-28T13:24:51.620000 CVE-2025-2112,0,0,12876043094c79f81e904e1d2257170a373b17e7d0d24c6eb1a19e93cc051c0d,2025-03-10T16:15:13.817000 CVE-2025-21121,0,0,802c8ab06cca7a283fc5df774dee22f4815bee93ce4d27eceff64530964239b4,2025-03-03T14:59:35.637000 CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000 @@ -286627,9 +286631,12 @@ CVE-2025-28015,0,0,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9 CVE-2025-2804,0,0,84020102f277b538ffb8ab51ba7022798f05e2dde9899675eb282f2dc201e37b,2025-03-28T06:15:34.157000 CVE-2025-28135,0,0,67520c1f57ea15ce6a3fbebf8fb1a036612a258dbeeaf68f8167eb1360c1936d,2025-03-27T16:45:12.210000 CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b947848b,2025-03-27T16:45:12.210000 -CVE-2025-2815,1,1,ae8483c7dc37fd3e44032d03f541292a385437aa962e27f88b8c36a255e50f41,2025-03-28T12:15:15.550000 +CVE-2025-2815,0,0,ae8483c7dc37fd3e44032d03f541292a385437aa962e27f88b8c36a255e50f41,2025-03-28T12:15:15.550000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000 +CVE-2025-28219,1,1,d7fe6408904eaf7d1b8df2498bf4e47705c64034b5d3901d1f8d354d75fdc406,2025-03-28T14:15:20.253000 +CVE-2025-28220,1,1,19854ddd28ca5587c3d8eceae6031d6a48f7eae409d298a89bc08248184124c1,2025-03-28T14:15:20.377000 +CVE-2025-28221,1,1,ae9d4c3b6977b54666ee5723ceeaac1c5cc795e338ba7aa47e34a0f2f6384543,2025-03-28T14:15:20.483000 CVE-2025-2825,0,0,b0ac602f299249f0031cd4605db7336883e5a9c727d54fb2508254997b2a81ae,2025-03-27T16:45:27.850000 CVE-2025-28253,0,0,817483eedee34c743a4481820dc3dbf577051ae76a82bf6f0b0a1c9d13de7780,2025-03-27T23:15:34.867000 CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000 @@ -286643,13 +286650,22 @@ CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e5 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000 CVE-2025-2852,0,0,765e659269b1e0d3eb25b4a8bbde2d93ec95002b11855016ed47d09f9b6497d1,2025-03-27T16:45:12.210000 -CVE-2025-2854,0,0,185208968a442a85cdd6b4f4f60fcb2b65d89a8cdf76ae7b9385fd96015563ab,2025-03-27T16:45:12.210000 +CVE-2025-2854,0,1,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000 CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000 CVE-2025-2857,0,0,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000 +CVE-2025-2858,1,1,6bbee639dd0aab6dd26bbfcd974d0bcddafdc32a33a61593861e278ccf5bda8f,2025-03-28T14:15:20.650000 +CVE-2025-2859,1,1,67f56f2fbf417b2f61e42c53ed212a256361b5ba25b19b84b5ca84c7ed2c0b9d,2025-03-28T14:15:20.810000 +CVE-2025-2860,1,1,2f5f3312ae65adf4f8e2a2e3b13946f9917e6188fdcd30086ab5d086b3970fba,2025-03-28T14:15:20.967000 +CVE-2025-2861,1,1,45a0b85fdef388e3fa22ae322d4e453181f488a75d88d85c29f8ce89913c6443,2025-03-28T14:15:21.113000 +CVE-2025-2862,1,1,fe00293c4cf30ffbab114d7bf2f7dee730dc374d918c22070c7ec496d286c22c,2025-03-28T14:15:21.257000 +CVE-2025-2863,1,1,34e0071c0cdcac7436cc82f177934ff700cbed706c62795b825c9d44db7660cc,2025-03-28T14:15:21.410000 +CVE-2025-2864,1,1,493b556778b174bf0df7fb7bf034c03dcd1c20da8165cd4f2a8ad8b89ce26c0e,2025-03-28T14:15:21.570000 +CVE-2025-2865,1,1,3b9a08d9359bdaa5849a4681ad69ec471503afa2c59d2d24179744630a925929,2025-03-28T14:15:21.727000 CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000 -CVE-2025-2868,1,1,33f03011f98d9b773c14b1eaa32de439498e396e9d02b847bc09f3a2dda95cda,2025-03-28T11:15:37.840000 -CVE-2025-2869,1,1,70e39c53ec99674bbca84518f2d52539d24d976a5693f00166c6a21ea8ec0e44,2025-03-28T11:15:38.053000 -CVE-2025-2870,1,1,b58b8becc9dd52506e052ae4c75da0c6f2fc105e0d55b4b26829d67c68e704ee,2025-03-28T11:15:38.207000 +CVE-2025-2868,0,0,33f03011f98d9b773c14b1eaa32de439498e396e9d02b847bc09f3a2dda95cda,2025-03-28T11:15:37.840000 +CVE-2025-2869,0,0,70e39c53ec99674bbca84518f2d52539d24d976a5693f00166c6a21ea8ec0e44,2025-03-28T11:15:38.053000 +CVE-2025-2870,0,0,b58b8becc9dd52506e052ae4c75da0c6f2fc105e0d55b4b26829d67c68e704ee,2025-03-28T11:15:38.207000 +CVE-2025-2877,1,1,cc98c6b852ffd3902484764384f64302df452aade6e9454fddef82a200fbdcb4,2025-03-28T14:15:21.877000 CVE-2025-2878,0,0,28f11500fb554822acb92093abd5f7f7b4e10dac47c29b89b43c371fafe7f359,2025-03-27T23:15:35.067000 CVE-2025-2885,0,0,1f299ee6f9c1687c7ad3d5b4a66ac1f9f94c352f666602218763c98e2dde7ca0,2025-03-27T23:15:35.240000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 @@ -286744,13 +286760,18 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 +CVE-2025-2901,1,1,38f9c417a6c20fb5be2bc1a8b73e0b30e4b01f4859c5680551c20eedbe06df17,2025-03-28T14:15:22.020000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 CVE-2025-29072,0,0,35ce48c77c318e6003a1e18972edd70a67880d00b73ee6fdb606d5e887da4951,2025-03-27T16:45:12.210000 +CVE-2025-2908,1,1,f64cd7fcb5d24ae83e31008923f3bbe96834955e323591c3be0523672ebfdf4d,2025-03-28T13:15:41.217000 +CVE-2025-2909,1,1,3a720593aa3fbf005f652d39614ce0640eb45ef48808a9985cc786293f08c174,2025-03-28T13:15:41.387000 +CVE-2025-2910,1,1,4978130c69eda3969fc4aaa24df412c9ffafc7d3ed2c7fd50401dcf2d877cc1e,2025-03-28T13:15:41.533000 CVE-2025-29100,0,0,0625adea7bf9c09ffed0ed9abe2303de146d9db5873c20263fd526077ae2d8d9,2025-03-27T16:45:46.410000 CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000 +CVE-2025-2911,1,1,9bae5cfa1688da65016914b89758dc8a004a890da707071921228c5eff17be45,2025-03-28T13:15:41.673000 CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000 CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000 CVE-2025-29135,0,0,da45252de14e5b082a9bdba4d9fc8b7a9e0d31f1a0a6a8b0f99fb851cd8fdacf,2025-03-27T16:45:46.410000 @@ -287185,35 +287206,35 @@ CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80 CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000 CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000 CVE-2025-31335,0,0,10ae6e3d427bfe13348b2d10ee12f129bdeadfbd4a1839e0c92366307e617223,2025-03-28T06:15:34.723000 -CVE-2025-31432,1,1,25bc159d068d8b11bbfd2e82882b60badd159381fb91fbbb09310647eacf62d9,2025-03-28T12:15:15.720000 -CVE-2025-31433,1,1,fb5feb10c87b50d2292ab26087cbe0271a286f1ad7b9900a875f0e928bbfc8d5,2025-03-28T12:15:15.877000 -CVE-2025-31434,1,1,f404c1f9296f5cc4f6608e82db18e122e85aac73710e020cf75329c9f05a252e,2025-03-28T12:15:16.030000 -CVE-2025-31435,1,1,e6720d556a315fb5a211c472b7222f2a6f7b8c6717119885dbdd250540398a1f,2025-03-28T12:15:16.183000 -CVE-2025-31437,1,1,6619e9d7a38250b6f6e54aa033b353b5ac4953a756154ec02cae2afcccd74de3,2025-03-28T12:15:16.330000 -CVE-2025-31438,1,1,39f33e0b7da32d2575d9bf5ffb03241e690c196e8d3f3a185b3211122b278e56,2025-03-28T12:15:16.473000 -CVE-2025-31439,1,1,4e88cdb3c6771b0ba0705ab38a02b0f8153fab9cb4a31cb566006ea9daf66bcd,2025-03-28T12:15:16.630000 -CVE-2025-31440,1,1,6d4cd64caa25a1035545924fe771e499dd195b9060f85377542b0e224ccb188c,2025-03-28T12:15:16.770000 -CVE-2025-31443,1,1,cf1e9bdc25ab04035766a90ff493a0813fa3d3e26bee5e776223158138f0799b,2025-03-28T12:15:16.927000 -CVE-2025-31444,1,1,da9687bcad9e851f822c4ab3e2dd95151115a8fb1aed688ad6dcf4b25b8a57f5,2025-03-28T12:15:17.080000 -CVE-2025-31447,1,1,257473642ea4b5a122b9318424269372438457c148e9e51c4d9cfa0b09fba970,2025-03-28T12:15:17.227000 -CVE-2025-31448,1,1,8d805d1c02631c331a604e706ab9fd43da5d4954bff250791de953b728f862df,2025-03-28T12:15:17.377000 -CVE-2025-31449,1,1,80af217e5222584ec3432efe3af573bfa671778545d7d32bf0789ad62fe59c7b,2025-03-28T12:15:17.527000 -CVE-2025-31450,1,1,f5fc950c056d9fa39b0981b5c58995b3d79c63ba1dc02e3fb588a9734560d362,2025-03-28T12:15:17.677000 -CVE-2025-31451,1,1,4adbbca474cfd1c9cac9ebbb4ba368570f2357c569c2a8a1fdebb675c6e186d1,2025-03-28T12:15:17.817000 -CVE-2025-31452,1,1,edda209bd6d18c8a5e97937d344298652229ef3d6bf32c221955123472d3660c,2025-03-28T12:15:17.960000 -CVE-2025-31453,1,1,62fc5563c1134340d25faf0dbe1fda654a217144034f86cf305b62c3d34b274f,2025-03-28T12:15:18.103000 -CVE-2025-31456,1,1,813401e651397cd511522aeaedc628247fe69c087bdffff4a153b7d2eb9c43f0,2025-03-28T12:15:18.250000 -CVE-2025-31457,1,1,4e03e3de7a5103e4f6eb3a101a8047ca557ffc69b0f5a54554fa254aac451bb9,2025-03-28T12:15:18.393000 -CVE-2025-31458,1,1,37f0a6996a0fb42f0944f4486b2201fec6ff17bae16d9d6544311969c986c8be,2025-03-28T12:15:18.543000 -CVE-2025-31459,1,1,8ffce8584c771b9ae4083e062635ffe966165a1d39a6e6a7d5e6af26e7dad25a,2025-03-28T12:15:18.680000 -CVE-2025-31460,1,1,64d79fdc8e018eacfd020142bf950144e98c3acbf9cb16393fafe3453ebb86bf,2025-03-28T12:15:18.820000 -CVE-2025-31463,1,1,ff257a1ace8748a77178f2aa592768ef98203ab278c94a47629901b247e69c24,2025-03-28T12:15:18.960000 -CVE-2025-31464,1,1,843f0754c7eb11f753c3d2538edba550c3e711dbef07a870784201a3f8460ed8,2025-03-28T12:15:19.107000 -CVE-2025-31465,1,1,10f874d8e2a3a666b99aee57560ff73c98d10fd5c3c545b86fd7b96b2950f724,2025-03-28T12:15:19.237000 -CVE-2025-31466,1,1,d83e5defa81c9a6cf405fdc1b6dcc9194362770a11a27f2195cf99940a0f7d7d,2025-03-28T12:15:19.383000 -CVE-2025-31469,1,1,3feb53cd0a36b9081325de9ecedb3d10c939d49f5083eb8620a74858238e2af3,2025-03-28T12:15:19.530000 -CVE-2025-31470,1,1,ab0bf34d871d75b080c897ac4241a4d4ae70b8bcad1095860dfaae42c5e81856,2025-03-28T12:15:19.673000 -CVE-2025-31471,1,1,7e2d1c5850e6e581133a26f55dd506e0806e9e4475c733bb8298a165a51a92ab,2025-03-28T12:15:19.820000 -CVE-2025-31472,1,1,93d2fa62c30bcb35ff3749d1a4b02b0e459ed099b73e00ba33ed099624a1498e,2025-03-28T12:15:19.963000 -CVE-2025-31473,1,1,05715cac65626e990bcb1403e6662740a9c505e5ac6f6115908360db5e4dbf0c,2025-03-28T12:15:20.110000 -CVE-2025-31474,1,1,19485a4efcf74b35a8e81d54b4ca4fc9d240e836e203a816dbd62ab8fa82bd2f,2025-03-28T12:15:20.257000 +CVE-2025-31432,0,0,25bc159d068d8b11bbfd2e82882b60badd159381fb91fbbb09310647eacf62d9,2025-03-28T12:15:15.720000 +CVE-2025-31433,0,0,fb5feb10c87b50d2292ab26087cbe0271a286f1ad7b9900a875f0e928bbfc8d5,2025-03-28T12:15:15.877000 +CVE-2025-31434,0,0,f404c1f9296f5cc4f6608e82db18e122e85aac73710e020cf75329c9f05a252e,2025-03-28T12:15:16.030000 +CVE-2025-31435,0,0,e6720d556a315fb5a211c472b7222f2a6f7b8c6717119885dbdd250540398a1f,2025-03-28T12:15:16.183000 +CVE-2025-31437,0,0,6619e9d7a38250b6f6e54aa033b353b5ac4953a756154ec02cae2afcccd74de3,2025-03-28T12:15:16.330000 +CVE-2025-31438,0,0,39f33e0b7da32d2575d9bf5ffb03241e690c196e8d3f3a185b3211122b278e56,2025-03-28T12:15:16.473000 +CVE-2025-31439,0,0,4e88cdb3c6771b0ba0705ab38a02b0f8153fab9cb4a31cb566006ea9daf66bcd,2025-03-28T12:15:16.630000 +CVE-2025-31440,0,0,6d4cd64caa25a1035545924fe771e499dd195b9060f85377542b0e224ccb188c,2025-03-28T12:15:16.770000 +CVE-2025-31443,0,0,cf1e9bdc25ab04035766a90ff493a0813fa3d3e26bee5e776223158138f0799b,2025-03-28T12:15:16.927000 +CVE-2025-31444,0,0,da9687bcad9e851f822c4ab3e2dd95151115a8fb1aed688ad6dcf4b25b8a57f5,2025-03-28T12:15:17.080000 +CVE-2025-31447,0,0,257473642ea4b5a122b9318424269372438457c148e9e51c4d9cfa0b09fba970,2025-03-28T12:15:17.227000 +CVE-2025-31448,0,0,8d805d1c02631c331a604e706ab9fd43da5d4954bff250791de953b728f862df,2025-03-28T12:15:17.377000 +CVE-2025-31449,0,0,80af217e5222584ec3432efe3af573bfa671778545d7d32bf0789ad62fe59c7b,2025-03-28T12:15:17.527000 +CVE-2025-31450,0,0,f5fc950c056d9fa39b0981b5c58995b3d79c63ba1dc02e3fb588a9734560d362,2025-03-28T12:15:17.677000 +CVE-2025-31451,0,0,4adbbca474cfd1c9cac9ebbb4ba368570f2357c569c2a8a1fdebb675c6e186d1,2025-03-28T12:15:17.817000 +CVE-2025-31452,0,0,edda209bd6d18c8a5e97937d344298652229ef3d6bf32c221955123472d3660c,2025-03-28T12:15:17.960000 +CVE-2025-31453,0,0,62fc5563c1134340d25faf0dbe1fda654a217144034f86cf305b62c3d34b274f,2025-03-28T12:15:18.103000 +CVE-2025-31456,0,0,813401e651397cd511522aeaedc628247fe69c087bdffff4a153b7d2eb9c43f0,2025-03-28T12:15:18.250000 +CVE-2025-31457,0,0,4e03e3de7a5103e4f6eb3a101a8047ca557ffc69b0f5a54554fa254aac451bb9,2025-03-28T12:15:18.393000 +CVE-2025-31458,0,0,37f0a6996a0fb42f0944f4486b2201fec6ff17bae16d9d6544311969c986c8be,2025-03-28T12:15:18.543000 +CVE-2025-31459,0,0,8ffce8584c771b9ae4083e062635ffe966165a1d39a6e6a7d5e6af26e7dad25a,2025-03-28T12:15:18.680000 +CVE-2025-31460,0,0,64d79fdc8e018eacfd020142bf950144e98c3acbf9cb16393fafe3453ebb86bf,2025-03-28T12:15:18.820000 +CVE-2025-31463,0,0,ff257a1ace8748a77178f2aa592768ef98203ab278c94a47629901b247e69c24,2025-03-28T12:15:18.960000 +CVE-2025-31464,0,0,843f0754c7eb11f753c3d2538edba550c3e711dbef07a870784201a3f8460ed8,2025-03-28T12:15:19.107000 +CVE-2025-31465,0,0,10f874d8e2a3a666b99aee57560ff73c98d10fd5c3c545b86fd7b96b2950f724,2025-03-28T12:15:19.237000 +CVE-2025-31466,0,0,d83e5defa81c9a6cf405fdc1b6dcc9194362770a11a27f2195cf99940a0f7d7d,2025-03-28T12:15:19.383000 +CVE-2025-31469,0,0,3feb53cd0a36b9081325de9ecedb3d10c939d49f5083eb8620a74858238e2af3,2025-03-28T12:15:19.530000 +CVE-2025-31470,0,0,ab0bf34d871d75b080c897ac4241a4d4ae70b8bcad1095860dfaae42c5e81856,2025-03-28T12:15:19.673000 +CVE-2025-31471,0,0,7e2d1c5850e6e581133a26f55dd506e0806e9e4475c733bb8298a165a51a92ab,2025-03-28T12:15:19.820000 +CVE-2025-31472,0,0,93d2fa62c30bcb35ff3749d1a4b02b0e459ed099b73e00ba33ed099624a1498e,2025-03-28T12:15:19.963000 +CVE-2025-31473,0,0,05715cac65626e990bcb1403e6662740a9c505e5ac6f6115908360db5e4dbf0c,2025-03-28T12:15:20.110000 +CVE-2025-31474,0,0,19485a4efcf74b35a8e81d54b4ca4fc9d240e836e203a816dbd62ab8fa82bd2f,2025-03-28T12:15:20.257000