From f51bf49e3e8b816fb7bc23d4c30f2d20665fa861 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 28 Feb 2025 15:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-02-28T15:00:20.043026+00:00 --- CVE-2016/CVE-2016-46xx/CVE-2016-4656.json | 10 +- CVE-2016/CVE-2016-46xx/CVE-2016-4657.json | 10 +- CVE-2018/CVE-2018-43xx/CVE-2018-4344.json | 28 ++-- CVE-2019/CVE-2019-62xx/CVE-2019-6223.json | 32 +++-- CVE-2019/CVE-2019-72xx/CVE-2019-7287.json | 10 +- CVE-2019/CVE-2019-85xx/CVE-2019-8506.json | 40 ++++-- CVE-2019/CVE-2019-85xx/CVE-2019-8526.json | 10 +- CVE-2019/CVE-2019-86xx/CVE-2019-8605.json | 34 ++--- CVE-2020/CVE-2020-279xx/CVE-2020-27950.json | 4 +- CVE-2020/CVE-2020-38xx/CVE-2020-3837.json | 4 +- CVE-2020/CVE-2020-98xx/CVE-2020-9818.json | 4 +- CVE-2020/CVE-2020-98xx/CVE-2020-9819.json | 4 +- CVE-2020/CVE-2020-98xx/CVE-2020-9859.json | 10 +- CVE-2020/CVE-2020-99xx/CVE-2020-9907.json | 16 ++- CVE-2020/CVE-2020-99xx/CVE-2020-9934.json | 4 +- CVE-2021/CVE-2021-17xx/CVE-2021-1782.json | 4 +- CVE-2021/CVE-2021-17xx/CVE-2021-1789.json | 4 +- CVE-2021/CVE-2021-18xx/CVE-2021-1870.json | 28 ++-- CVE-2021/CVE-2021-18xx/CVE-2021-1871.json | 24 ++-- CVE-2021/CVE-2021-18xx/CVE-2021-1879.json | 22 +-- CVE-2021/CVE-2021-306xx/CVE-2021-30657.json | 16 ++- CVE-2021/CVE-2021-306xx/CVE-2021-30661.json | 4 +- CVE-2021/CVE-2021-306xx/CVE-2021-30665.json | 4 +- CVE-2021/CVE-2021-307xx/CVE-2021-30713.json | 10 +- CVE-2021/CVE-2021-308xx/CVE-2021-30807.json | 8 +- CVE-2021/CVE-2021-35xx/CVE-2021-3549.json | 6 +- CVE-2021/CVE-2021-37xx/CVE-2021-3735.json | 6 +- CVE-2021/CVE-2021-39xx/CVE-2021-3929.json | 6 +- CVE-2022/CVE-2022-225xx/CVE-2022-22587.json | 22 +-- CVE-2022/CVE-2022-226xx/CVE-2022-22620.json | 4 +- CVE-2022/CVE-2022-226xx/CVE-2022-22674.json | 4 +- CVE-2022/CVE-2022-328xx/CVE-2022-32893.json | 4 +- CVE-2022/CVE-2022-328xx/CVE-2022-32894.json | 4 +- CVE-2022/CVE-2022-329xx/CVE-2022-32917.json | 4 +- CVE-2022/CVE-2022-428xx/CVE-2022-42856.json | 4 +- CVE-2023/CVE-2023-235xx/CVE-2023-23529.json | 28 ++-- CVE-2023/CVE-2023-282xx/CVE-2023-28206.json | 34 +++-- CVE-2023/CVE-2023-323xx/CVE-2023-32373.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34188.json | 6 +- CVE-2024/CVE-2024-232xx/CVE-2024-23222.json | 4 +- CVE-2024/CVE-2024-263xx/CVE-2024-26306.json | 6 +- CVE-2024/CVE-2024-362xx/CVE-2024-36259.json | 67 ++++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40896.json | 6 +- CVE-2025/CVE-2025-03xx/CVE-2025-0395.json | 6 +- CVE-2025/CVE-2025-13xx/CVE-2025-1300.json | 56 ++++++++ CVE-2025/CVE-2025-13xx/CVE-2025-1319.json | 64 +++++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1746.json | 56 ++++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1747.json | 56 ++++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1748.json | 56 ++++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1749.json | 56 ++++++++ CVE-2025/CVE-2025-17xx/CVE-2025-1776.json | 56 ++++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22270.json | 86 +++++++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22271.json | 86 +++++++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22272.json | 86 +++++++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22273.json | 86 +++++++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22274.json | 86 +++++++++++ CVE-2025/CVE-2025-230xx/CVE-2025-23046.json | 105 +++++++++++--- CVE-2025/CVE-2025-230xx/CVE-2025-23083.json | 6 +- CVE-2025/CVE-2025-240xx/CVE-2025-24085.json | 4 +- CVE-2025/CVE-2025-251xx/CVE-2025-25192.json | 46 +++++- CVE-2025/CVE-2025-264xx/CVE-2025-26465.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27110.json | 104 +++++++++++--- CVE-2025/CVE-2025-271xx/CVE-2025-27139.json | 83 ++++++++++- CVE-2025/CVE-2025-271xx/CVE-2025-27142.json | 94 +++++++++--- README.md | 65 ++++++--- _state.csv | 152 +++++++++++--------- 66 files changed, 1696 insertions(+), 370 deletions(-) create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1300.json create mode 100644 CVE-2025/CVE-2025-13xx/CVE-2025-1319.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1746.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1747.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1748.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1749.json create mode 100644 CVE-2025/CVE-2025-17xx/CVE-2025-1776.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22270.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22271.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22272.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22273.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22274.json diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json index 1fe5b72de72..305a64b03fb 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json @@ -2,8 +2,8 @@ "id": "CVE-2016-4656", "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:01.087", - "lastModified": "2025-01-29T18:15:27.380", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -166,7 +166,8 @@ "url": "https://support.apple.com/HT207107", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { @@ -215,7 +216,8 @@ "url": "https://support.apple.com/HT207107", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json index 1bbbc4f0c53..dff41b07e92 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json @@ -2,8 +2,8 @@ "id": "CVE-2016-4657", "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:02.150", - "lastModified": "2025-01-29T18:15:27.607", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -166,7 +166,8 @@ "url": "https://support.apple.com/HT207107", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { @@ -222,7 +223,8 @@ "url": "https://support.apple.com/HT207107", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { diff --git a/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json b/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json index 4a529785a16..7094624c0ab 100644 --- a/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json +++ b/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4344", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:09.173", - "lastModified": "2025-01-29T18:15:30.723", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -151,56 +151,64 @@ "url": "https://support.apple.com/kb/HT209106", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209107", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209108", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209139", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209106", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209107", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209108", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/kb/HT209139", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2019/CVE-2019-62xx/CVE-2019-6223.json b/CVE-2019/CVE-2019-62xx/CVE-2019-6223.json index fd18470cbcd..4306fca3901 100644 --- a/CVE-2019/CVE-2019-62xx/CVE-2019-6223.json +++ b/CVE-2019/CVE-2019-62xx/CVE-2019-6223.json @@ -2,8 +2,8 @@ "id": "CVE-2019-6223", "sourceIdentifier": "product-security@apple.com", "published": "2019-03-05T16:29:02.060", - "lastModified": "2025-01-29T18:15:32.017", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", @@ -131,28 +129,32 @@ "url": "https://support.apple.com/HT209520", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209521", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209520", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209521", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2019/CVE-2019-72xx/CVE-2019-7287.json b/CVE-2019/CVE-2019-72xx/CVE-2019-7287.json index ba79672c8dd..8b63dfca786 100644 --- a/CVE-2019/CVE-2019-72xx/CVE-2019-7287.json +++ b/CVE-2019/CVE-2019-72xx/CVE-2019-7287.json @@ -2,8 +2,8 @@ "id": "CVE-2019-7287", "sourceIdentifier": "product-security@apple.com", "published": "2019-12-18T18:15:22.130", - "lastModified": "2025-01-29T18:15:32.647", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -133,14 +133,16 @@ "url": "https://support.apple.com/HT209520", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209520", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2019/CVE-2019-85xx/CVE-2019-8506.json b/CVE-2019/CVE-2019-85xx/CVE-2019-8506.json index dc884693efa..35f0a175ab3 100644 --- a/CVE-2019/CVE-2019-85xx/CVE-2019-8506.json +++ b/CVE-2019/CVE-2019-85xx/CVE-2019-8506.json @@ -2,8 +2,8 @@ "id": "CVE-2019-8506", "sourceIdentifier": "product-security@apple.com", "published": "2019-12-18T18:15:22.880", - "lastModified": "2025-01-29T18:15:32.920", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -188,84 +188,96 @@ "url": "https://support.apple.com/HT209599", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209601", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209602", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209603", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209604", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209605", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209599", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209601", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209602", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209603", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209604", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209605", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2019/CVE-2019-85xx/CVE-2019-8526.json b/CVE-2019/CVE-2019-85xx/CVE-2019-8526.json index 69e9eb86a4d..50693f07b69 100644 --- a/CVE-2019/CVE-2019-85xx/CVE-2019-8526.json +++ b/CVE-2019/CVE-2019-85xx/CVE-2019-8526.json @@ -2,8 +2,8 @@ "id": "CVE-2019-8526", "sourceIdentifier": "product-security@apple.com", "published": "2019-12-18T18:15:24.223", - "lastModified": "2025-01-29T18:15:33.430", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -133,14 +133,16 @@ "url": "https://support.apple.com/HT209600", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT209600", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2019/CVE-2019-86xx/CVE-2019-8605.json b/CVE-2019/CVE-2019-86xx/CVE-2019-8605.json index 298a313af41..226e6bacb98 100644 --- a/CVE-2019/CVE-2019-86xx/CVE-2019-8605.json +++ b/CVE-2019/CVE-2019-86xx/CVE-2019-8605.json @@ -2,8 +2,8 @@ "id": "CVE-2019-8605", "sourceIdentifier": "product-security@apple.com", "published": "2019-12-18T18:15:28.833", - "lastModified": "2025-01-29T18:15:34.143", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -151,62 +151,64 @@ "url": "https://support.apple.com/HT210118", "source": "product-security@apple.com", "tags": [ - "Not Applicable", - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210119", "source": "product-security@apple.com", "tags": [ - "Not Applicable", - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210120", "source": "product-security@apple.com", "tags": [ - "Not Applicable", - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210122", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210118", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Not Applicable", - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210119", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Not Applicable", - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210120", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Not Applicable", - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT210122", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json b/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json index 32934e18e54..56cc4f6dce4 100644 --- a/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json +++ b/CVE-2020/CVE-2020-279xx/CVE-2020-27950.json @@ -2,8 +2,8 @@ "id": "CVE-2020-27950", "sourceIdentifier": "product-security@apple.com", "published": "2020-12-08T21:15:13.967", - "lastModified": "2025-01-29T18:15:34.950", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-38xx/CVE-2020-3837.json b/CVE-2020/CVE-2020-38xx/CVE-2020-3837.json index af7ebe3872c..36433ed240f 100644 --- a/CVE-2020/CVE-2020-38xx/CVE-2020-3837.json +++ b/CVE-2020/CVE-2020-38xx/CVE-2020-3837.json @@ -2,8 +2,8 @@ "id": "CVE-2020-3837", "sourceIdentifier": "product-security@apple.com", "published": "2020-02-27T21:15:16.630", - "lastModified": "2025-01-29T18:15:35.193", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-98xx/CVE-2020-9818.json b/CVE-2020/CVE-2020-98xx/CVE-2020-9818.json index 9e203b4cd19..9b141353529 100644 --- a/CVE-2020/CVE-2020-98xx/CVE-2020-9818.json +++ b/CVE-2020/CVE-2020-98xx/CVE-2020-9818.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9818", "sourceIdentifier": "product-security@apple.com", "published": "2020-06-09T17:15:13.317", - "lastModified": "2025-01-29T18:15:36.303", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-98xx/CVE-2020-9819.json b/CVE-2020/CVE-2020-98xx/CVE-2020-9819.json index eebdee05936..4e9e8850a6a 100644 --- a/CVE-2020/CVE-2020-98xx/CVE-2020-9819.json +++ b/CVE-2020/CVE-2020-98xx/CVE-2020-9819.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9819", "sourceIdentifier": "product-security@apple.com", "published": "2020-06-09T17:15:13.377", - "lastModified": "2025-01-29T18:15:36.543", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-98xx/CVE-2020-9859.json b/CVE-2020/CVE-2020-98xx/CVE-2020-9859.json index 8ac7a1697ef..e83c4cd107b 100644 --- a/CVE-2020/CVE-2020-98xx/CVE-2020-9859.json +++ b/CVE-2020/CVE-2020-98xx/CVE-2020-9859.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9859", "sourceIdentifier": "product-security@apple.com", "published": "2020-06-05T15:15:11.097", - "lastModified": "2025-01-29T18:15:36.767", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -157,14 +157,16 @@ "url": "https://support.apple.com/HT211214", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT211214", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2020/CVE-2020-99xx/CVE-2020-9907.json b/CVE-2020/CVE-2020-99xx/CVE-2020-9907.json index cc98fc0cf69..1df203df636 100644 --- a/CVE-2020/CVE-2020-99xx/CVE-2020-9907.json +++ b/CVE-2020/CVE-2020-99xx/CVE-2020-9907.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9907", "sourceIdentifier": "product-security@apple.com", "published": "2020-10-16T17:15:16.590", - "lastModified": "2025-01-29T18:15:36.987", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -145,28 +145,32 @@ "url": "https://support.apple.com/HT211288", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT211290", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT211288", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/HT211290", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2020/CVE-2020-99xx/CVE-2020-9934.json b/CVE-2020/CVE-2020-99xx/CVE-2020-9934.json index 6db719db0f9..be56090eb3a 100644 --- a/CVE-2020/CVE-2020-99xx/CVE-2020-9934.json +++ b/CVE-2020/CVE-2020-99xx/CVE-2020-9934.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9934", "sourceIdentifier": "product-security@apple.com", "published": "2020-10-16T17:15:17.637", - "lastModified": "2025-01-29T18:15:37.463", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json index 77bf6ec295d..9e720f64c81 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1782", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T18:15:21.373", - "lastModified": "2025-02-03T14:15:30.590", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1789.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1789.json index d087757fc69..d8c372c38c8 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1789.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1789.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1789", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T18:15:21.747", - "lastModified": "2025-01-29T18:15:37.707", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json b/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json index 79cb931c19b..0c16d559ac4 100644 --- a/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json +++ b/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1870", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T19:15:20.567", - "lastModified": "2025-01-29T18:15:38.170", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -109,9 +109,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.4", - "matchCriteriaId": "527CAF62-2FF0-4BC9-A537-EE52825C7504" + "matchCriteriaId": "17AAEA98-4C05-496E-81A7-AC031FCDDDA5" }, { "vulnerable": true, @@ -194,14 +194,14 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Mailing List" ] }, { @@ -215,28 +215,30 @@ "url": "https://support.apple.com/en-us/HT212146", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212147", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Mailing List" ] }, { @@ -250,14 +252,16 @@ "url": "https://support.apple.com/en-us/HT212146", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212147", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json b/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json index cdd3ef15f66..db23e7e042e 100644 --- a/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json +++ b/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1871", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T19:15:20.663", - "lastModified": "2025-01-29T18:15:38.527", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -109,9 +109,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.4", - "matchCriteriaId": "527CAF62-2FF0-4BC9-A537-EE52825C7504" + "matchCriteriaId": "17AAEA98-4C05-496E-81A7-AC031FCDDDA5" }, { "vulnerable": true, @@ -188,21 +188,23 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Mailing List" ] }, { "url": "https://support.apple.com/en-us/HT212146", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212147", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { @@ -217,21 +219,23 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Mailing List" ] }, { "url": "https://support.apple.com/en-us/HT212146", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212147", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { diff --git a/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json b/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json index f17a4113771..9a9438f6280 100644 --- a/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json +++ b/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1879", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T19:15:20.770", - "lastModified": "2025-01-29T18:15:38.763", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -152,42 +152,48 @@ "url": "https://support.apple.com/en-us/HT212256", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212257", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212258", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212256", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212257", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212258", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30657.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30657.json index 638919bb9ac..ec6aaac0967 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30657.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30657.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30657", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.127", - "lastModified": "2025-01-29T18:15:40.147", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -181,28 +181,32 @@ "url": "https://support.apple.com/en-us/HT212325", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212326", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212325", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT212326", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json index 8a7d693a051..ca185d84a1a 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30661", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.320", - "lastModified": "2025-01-29T18:15:40.407", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json index cb040981e83..817b7a7acc5 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30665", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.507", - "lastModified": "2025-01-29T18:15:40.653", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-307xx/CVE-2021-30713.json b/CVE-2021/CVE-2021-307xx/CVE-2021-30713.json index f69ece77207..e591f1e9bf1 100644 --- a/CVE-2021/CVE-2021-307xx/CVE-2021-30713.json +++ b/CVE-2021/CVE-2021-307xx/CVE-2021-30713.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30713", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:15.893", - "lastModified": "2025-01-29T18:15:41.113", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -201,7 +201,8 @@ "url": "https://support.apple.com/kb/HT212805", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { @@ -224,7 +225,8 @@ "url": "https://support.apple.com/kb/HT212805", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2021/CVE-2021-308xx/CVE-2021-30807.json b/CVE-2021/CVE-2021-308xx/CVE-2021-30807.json index 1a3890ca47a..6349ac0ad2d 100644 --- a/CVE-2021/CVE-2021-308xx/CVE-2021-30807.json +++ b/CVE-2021/CVE-2021-308xx/CVE-2021-30807.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30807", "sourceIdentifier": "product-security@apple.com", "published": "2021-10-19T14:15:08.313", - "lastModified": "2025-01-29T18:15:41.790", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,9 +119,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "14.7.1", - "matchCriteriaId": "ED6899A5-1350-48D2-8B19-72C8EEF8760E" + "matchCriteriaId": "3256DA57-B5F3-4F0A-A2E3-9B6841F500B2" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-35xx/CVE-2021-3549.json b/CVE-2021/CVE-2021-35xx/CVE-2021-3549.json index f3c83042b14..9ee1911fac4 100644 --- a/CVE-2021/CVE-2021-35xx/CVE-2021-3549.json +++ b/CVE-2021/CVE-2021-35xx/CVE-2021-3549.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3549", "sourceIdentifier": "secalert@redhat.com", "published": "2021-05-26T21:15:08.347", - "lastModified": "2024-11-21T06:21:49.000", + "lastModified": "2025-02-28T13:15:24.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,6 +135,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-37xx/CVE-2021-3735.json b/CVE-2021/CVE-2021-37xx/CVE-2021-3735.json index 4d37b7fa52e..6bc47ddb329 100644 --- a/CVE-2021/CVE-2021-37xx/CVE-2021-3735.json +++ b/CVE-2021/CVE-2021-37xx/CVE-2021-3735.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3735", "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-26T16:15:09.467", - "lastModified": "2024-11-21T06:22:17.110", + "lastModified": "2025-02-28T13:15:25.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -146,6 +146,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0009/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3929.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3929.json index 5a072801fcc..d3c91848046 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3929.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3929.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3929", "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-25T20:15:09.417", - "lastModified": "2024-11-21T06:22:47.740", + "lastModified": "2025-02-28T13:15:25.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -191,6 +191,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHNN7QJCEQH7AQG5AQP2GEFAQE6K635I/", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0010/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-225xx/CVE-2022-22587.json b/CVE-2022/CVE-2022-225xx/CVE-2022-22587.json index 80f9babe9aa..af9f66b8359 100644 --- a/CVE-2022/CVE-2022-225xx/CVE-2022-22587.json +++ b/CVE-2022/CVE-2022-225xx/CVE-2022-22587.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22587", "sourceIdentifier": "product-security@apple.com", "published": "2022-03-18T18:15:12.480", - "lastModified": "2025-01-29T17:15:16.100", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -152,42 +152,48 @@ "url": "https://support.apple.com/en-us/HT213053", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213054", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213055", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213053", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213054", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213055", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json b/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json index e4d5414df84..85b5281941c 100644 --- a/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json +++ b/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22620", "sourceIdentifier": "product-security@apple.com", "published": "2022-03-18T18:15:13.787", - "lastModified": "2025-01-29T17:15:16.457", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-226xx/CVE-2022-22674.json b/CVE-2022/CVE-2022-226xx/CVE-2022-22674.json index 50c6c9f6501..f36d679a8f9 100644 --- a/CVE-2022/CVE-2022-226xx/CVE-2022-22674.json +++ b/CVE-2022/CVE-2022-226xx/CVE-2022-22674.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22674", "sourceIdentifier": "product-security@apple.com", "published": "2022-05-26T18:15:09.107", - "lastModified": "2025-01-29T17:15:16.737", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json index 058f0c02275..b900d376af1 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32893.json @@ -2,8 +2,8 @@ "id": "CVE-2022-32893", "sourceIdentifier": "product-security@apple.com", "published": "2022-08-24T20:15:09.147", - "lastModified": "2025-01-29T17:15:20.573", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32894.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32894.json index f12c6bb2db2..30abc9eb39f 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32894.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32894.json @@ -2,8 +2,8 @@ "id": "CVE-2022-32894", "sourceIdentifier": "product-security@apple.com", "published": "2022-08-24T20:15:09.193", - "lastModified": "2025-01-29T17:15:20.847", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json index e11a1629ef6..ff1a2494b51 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json @@ -2,8 +2,8 @@ "id": "CVE-2022-32917", "sourceIdentifier": "product-security@apple.com", "published": "2022-09-20T21:15:11.200", - "lastModified": "2025-01-29T16:15:30.057", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json index a86aae4b743..7cf2d54b934 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42856", "sourceIdentifier": "product-security@apple.com", "published": "2022-12-15T19:15:25.123", - "lastModified": "2025-01-28T22:15:11.590", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json index 3c46a4eaac7..29a2b313950 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23529", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.710", - "lastModified": "2025-01-28T22:15:14.157", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -137,56 +137,64 @@ "url": "https://support.apple.com/en-us/HT213633", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213635", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213638", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213673", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213633", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213635", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213638", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] }, { "url": "https://support.apple.com/en-us/HT213673", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "Release Notes" ] } ] diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28206.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28206.json index 0cea601c839..1b8d65a1355 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28206.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28206", "sourceIdentifier": "product-security@apple.com", "published": "2023-04-10T19:15:07.273", - "lastModified": "2025-01-28T17:15:12.633", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -144,70 +144,80 @@ "url": "https://support.apple.com/en-us/HT213720", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213721", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213723", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213724", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213725", "source": "product-security@apple.com", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213720", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213721", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213723", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213724", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213725", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes" + "Release Notes", + "Vendor Advisory" ] } ] diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json index d3406cb6b70..ce1db8ec0cd 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32373", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:12.007", - "lastModified": "2025-02-03T14:15:34.500", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json index 39644da2656..0439580f3a5 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34188", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T20:15:09.053", - "lastModified": "2024-12-02T15:15:08.200", + "lastModified": "2025-02-28T13:15:26.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -125,6 +125,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json index 36201dd4f36..05c8a8601f5 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23222", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.500", - "lastModified": "2025-02-03T14:15:38.223", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:53:55.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26306.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26306.json index 145a065d103..4119f842209 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26306.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26306.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26306", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:08:51.197", - "lastModified": "2025-02-10T23:15:13.160", + "lastModified": "2025-02-28T13:15:26.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -71,6 +71,10 @@ { "url": "https://github.com/esnet/iperf/releases/tag/3.17", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0007/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json index b63ea5b6187..1ad4042a6ca 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36259.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36259", "sourceIdentifier": "security@odoo.com", "published": "2025-02-25T19:15:14.343", - "lastModified": "2025-02-25T19:15:14.343", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:35:22.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise 17.0 allows remote authenticated attackers to extract sensitive information via an oracle-based (yes/no response) crafted attack." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el m\u00f3dulo de correo de Odoo Community 17.0 y Odoo Enterprise 17.0 permite a atacantes autenticados remotos extraer informaci\u00f3n confidencial a trav\u00e9s de un ataque manipulado basado en or\u00e1culo (respuesta s\u00ed/no)." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,12 +69,49 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:community:*:*:*", + "matchCriteriaId": "1FF25CC4-AE0E-4F96-8708-83512BD0E249" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "1BD12AD5-9461-4AEC-A06D-0300CE27A0C1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/odoo/odoo/issues/199330", - "source": "security@odoo.com" + "source": "security@odoo.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40896.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40896.json index 69171a4a278..aca2d73af9b 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40896.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40896.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40896", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-23T17:15:08.400", - "lastModified": "2024-12-24T03:15:06.727", + "lastModified": "2025-02-28T13:15:26.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761", "source": "cve@mitre.org" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0004/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json index 26cfca731e0..9d86feb404d 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0395.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0395", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2025-01-22T13:15:20.933", - "lastModified": "2025-02-04T20:15:49.587", + "lastModified": "2025-02-28T13:15:26.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -75,6 +75,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/01/23/2", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0006/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json new file mode 100644 index 00000000000..83407bc5c3d --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1300.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1300", + "sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", + "published": "2025-02-28T13:15:27.043", + "lastModified": "2025-02-28T13:15:27.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \n\nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.\n\nThis issue affects CodeChecker: through 6.24.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-g839-x3p3-g5fm", + "source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json new file mode 100644 index 00000000000..c49143236bf --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1319", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T13:15:27.267", + "lastModified": "2025-02-28T13:15:27.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Site Mailer \u2013 SMTP Replacement, Email API Deliverability & Email Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3247059/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/site-mailer/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9fe3574-f338-474c-af78-f843501d422c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json new file mode 100644 index 00000000000..1a22260b6b6 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1746.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1746", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-02-28T14:15:34.943", + "lastModified": "2025-02-28T14:15:34.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the search in the /product/search endpoint. This vulnerability could be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json new file mode 100644 index 00000000000..0dfe71d436d --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1747.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1747", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-02-28T14:15:35.480", + "lastModified": "2025-02-28T14:15:35.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/login." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json new file mode 100644 index 00000000000..6bf91b78793 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1748.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1748", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-02-28T14:15:35.617", + "lastModified": "2025-02-28T14:15:35.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/register." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json new file mode 100644 index 00000000000..08909ad0e0c --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1749.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1749", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-02-28T14:15:35.760", + "lastModified": "2025-02-28T14:15:35.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/voucher." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json new file mode 100644 index 00000000000..f4094986f2f --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1776.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1776", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-02-28T14:15:35.943", + "lastModified": "2025-02-28T14:15:35.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Scripting (XSS) vulnerability in Soteshop, versions prior to 8.3.4, which could allow remote attackers to execute arbitrary code via the \u2018query\u2019 parameter in /app-google-custom-search/searchResults. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-soteshop", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json new file mode 100644 index 00000000000..0ece6b9121d --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22270.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22270", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-02-28T13:15:27.447", + "lastModified": "2025-02-28T13:15:27.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker with access to the Administration panel, specifically the \"Role Management\"\ntab, can\ninject code by adding a new role in the \"name\" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the\nrequired additional error that allows bypassing the Content-Security-Policy policy, which\nmitigates JS code execution while still allowing HTML injection.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json new file mode 100644 index 00000000000..5ad4f49346d --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22271.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22271", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-02-28T13:15:27.630", + "lastModified": "2025-02-28T13:15:27.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The application or its infrastructure allows for IP address spoofing by providing its own value in the \"X-Forwarded-For\" header. Thus, the action logging mechanism in the application loses\u00a0accountability\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json new file mode 100644 index 00000000000..23816dde8f8 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22272.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22272", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-02-28T13:15:27.770", + "lastModified": "2025-02-28T13:15:27.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the \"/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg\" endpoint, it is possible to inject code in the \"modalDlgMsgInternal\" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the required additional bypassing the Content-Security-Policy policy\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json new file mode 100644 index 00000000000..4f185f13342 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22273.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22273", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-02-28T13:15:27.927", + "lastModified": "2025-02-28T13:15:27.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the \"/EPMUI/VfManager.asmx/ChangePassword\" endpoint it is possible to perform a brute force attack on the current password in use.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json new file mode 100644 index 00000000000..230fdccdd92 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22274.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22274", + "sourceIdentifier": "cvd@cert.pl", + "published": "2025-02-28T13:15:28.067", + "lastModified": "2025-02-28T13:15:28.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "It is possible to inject HTML code into the page content using the \"content\" field in the \"Application definition\" page.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2025/02/CVE-2025-22270/", + "source": "cvd@cert.pl" + }, + { + "url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23046.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23046.json index 5a5cbe11e84..140fe51bac7 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23046.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23046.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23046", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T18:15:27.383", - "lastModified": "2025-02-25T18:15:27.383", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:35:22.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a \"Mail servers\" authentication provider is configured to use an Oauth connection provided by the OauthIMAP plugin, anyone can connect to GLPI using a user name on which an Oauth authorization has already been established. Version 10.0.18 contains a patch. As a workaround, one may disable any \"Mail servers\" authentication provider configured to use an Oauth connection provided by the OauthIMAP plugin." + }, + { + "lang": "es", + "value": "GLPI es un paquete de software gratuito de gesti\u00f3n de activos y TI. A partir de la versi\u00f3n 9.5.0 y antes de la versi\u00f3n 10.0.18, si un proveedor de autenticaci\u00f3n de \"servidores de correo\" est\u00e1 configurado para utilizar una conexi\u00f3n Oauth proporcionada por el complemento OauthIMAP, cualquiera puede conectarse a GLPI utilizando un nombre de usuario en el que ya se haya establecido una autorizaci\u00f3n Oauth. La versi\u00f3n 10.0.18 contiene un parche. Como workaround, se puede deshabilitar cualquier proveedor de autenticaci\u00f3n de \"servidores de correo\" configurado para utilizar una conexi\u00f3n Oauth proporcionada por el complemento OauthIMAP." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "LOW", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -67,16 +93,51 @@ "value": "CWE-303" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "10.0.18", + "matchCriteriaId": "ECD4F6B5-010D-44DB-8913-DCE4AC21D3A8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vfxc-qg3v-j2r5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json index 2576f159832..d8d2c820c18 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23083.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23083", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-22T02:15:33.930", - "lastModified": "2025-02-06T15:15:17.597", + "lastModified": "2025-02-28T13:15:28.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "source": "support@hackerone.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0008/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json index 219ad64405b..b7f4e8da971 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24085", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.990", - "lastModified": "2025-02-18T20:15:28.897", - "vulnStatus": "Modified", + "lastModified": "2025-02-28T14:44:48.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json index 9ee170f673b..09fbf3449b3 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25192.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25192", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T18:15:27.583", - "lastModified": "2025-02-25T18:15:27.583", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:35:22.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file." + }, + { + "lang": "es", + "value": "GLPI es un paquete de software gratuito de gesti\u00f3n de activos y TI. Antes de la versi\u00f3n 10.0.18, un usuario con pocos privilegios pod\u00eda habilitar el modo de depuraci\u00f3n y acceder a informaci\u00f3n confidencial. La versi\u00f3n 10.0.18 contiene un parche. Como workaround, se puede eliminar el archivo `install/update.php`." } ], "metrics": { @@ -45,16 +49,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.18", + "matchCriteriaId": "233C795E-1AEA-4457-8A7A-22C9C152DCF2" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-86cx-hcfc-8mm8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json index 675f1fa6aa7..716de0b8888 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26465.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26465", "sourceIdentifier": "secalert@redhat.com", "published": "2025-02-18T19:15:29.230", - "lastModified": "2025-02-19T15:15:18.090", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:15:28.343", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -84,6 +84,10 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2025-26465", "source": "af854a3a-2127-422b-91ae-364da2661108" }, + { + "url": "https://security.netapp.com/advisory/ntap-20250228-0003/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://ubuntu.com/security/CVE-2025-26465", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27110.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27110.json index 0b40997e49e..9ea0f226897 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27110.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27110.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27110", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T20:15:37.517", - "lastModified": "2025-02-25T20:15:37.517", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:35:22.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 version 3.0.13 means that, in 3.0.13, Libmodsecurity3 can't decode encoded HTML entities if they contains leading zeroes. Version 3.0.14 contains a fix. No known workarounds are available." + }, + { + "lang": "es", + "value": "Libmodsecurity es un componente del proyecto ModSecurity v3. El c\u00f3digo base de la librer\u00eda sirve como interfaz para los conectores ModSecurity que reciben tr\u00e1fico web y aplican el procesamiento tradicional de ModSecurity. Un error que existe solo en la versi\u00f3n 3.0.13 de Libmodsecurity3 significa que, en 3.0.13, Libmodsecurity3 no puede decodificar entidades HTML codificadas si contienen ceros a la izquierda. La versi\u00f3n 3.0.14 contiene una soluci\u00f3n. No se conocen workarounds disponibles." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "HIGH", - "subsequentSystemAvailability": "HIGH", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -67,16 +93,50 @@ "value": "CWE-172" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "B30344C2-C12E-466B-BD92-A6B0A17EDC8E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/owasp-modsecurity/ModSecurity/issues/3340", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-42w7-rmv5-4x2j", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27139.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27139.json index e129a7e41c0..9fdf9286f0f 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27139.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27139.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27139", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T20:15:37.693", - "lastModified": "2025-02-25T20:15:37.693", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:35:22.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Combodo iTop is a web based IT service management tool. Versions prior to 2.7.12, 3.1.2, and 3.2.0 are vulnerable to cross-site scripting when the preferences page is opened. Versions 2.7.12, 3.1.2, and 3.2.0 fix the issue." + }, + { + "lang": "es", + "value": "Combodo iTop es una herramienta de gesti\u00f3n de servicios de TI basada en la web. Las versiones anteriores a 2.7.12, 3.1.2 y 3.2.0 son vulnerables a ataques de cross site scripting cuando se abre la p\u00e1gina de preferencias. Las versiones 2.7.12, 3.1.2 y 3.2.0 solucionan el problema." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,10 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.12", + "matchCriteriaId": "FC277226-1ABB-4593-B14C-4910541DA298" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.2", + "matchCriteriaId": "91456038-80B6-479B-BBDF-9376B9D2F100" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:3.2.0:alpha1:*:*:*:*:*:*", + "matchCriteriaId": "C62AC350-F938-43A2-B066-3CEF23B03C0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:3.2.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "B2E2A04B-A0E6-4906-BD91-91DAC92CC067" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "24D309D2-E86C-4222-B258-C09BEEF42CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "6613DB9B-E3F9-44CC-B46A-77739060B641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "5C86A4B5-375A-4761-A853-AB0EED54A540" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-c6mg-9537-c8cf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27142.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27142.json index 1e7d469aaf6..91e85109ed0 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27142.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27142.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27142", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-25T20:15:37.847", - "lastModified": "2025-02-25T20:15:37.847", - "vulnStatus": "Received", + "lastModified": "2025-02-28T13:35:22.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LocalSend is a free, open-source app that allows users to securely share files and messages with nearby devices over their local network without needing an internet connection. Prior to version 1.17.0, due to the missing sanitization of the path in the `POST /api/localsend/v2/prepare-upload` and the `POST /api/localsend/v2/upload` endpoint, a malicious file transfer request can write files to the arbitrary location on the system, resulting in the remote command execution. A malicious file transfer request sent by nearby devices can write files into an arbitrary directory. This usually allows command execution via the startup folder on Windows or Bash-related files on Linux. If the user enables the `Quick Save` feature, it will silently write files without explicit user interaction. Version 1.17.0 fixes this issue." + }, + { + "lang": "es", + "value": "LocalSend es una aplicaci\u00f3n gratuita de c\u00f3digo abierto que permite a los usuarios compartir archivos y mensajes de forma segura con dispositivos cercanos a trav\u00e9s de su red local sin necesidad de una conexi\u00f3n a Internet. Antes de la versi\u00f3n 1.17.0, debido a la falta de depuraci\u00f3n de la ruta en el endpoint `POST /api/localsend/v2/prepare-upload` y `POST /api/localsend/v2/upload`, una solicitud de transferencia de archivos maliciosa puede escribir archivos en una ubicaci\u00f3n arbitraria en el sistema, lo que da como resultado la ejecuci\u00f3n remota del comando. Una solicitud de transferencia de archivos maliciosa enviada por dispositivos cercanos puede escribir archivos en un directorio arbitrario. Esto generalmente permite la ejecuci\u00f3n de comandos a trav\u00e9s de la carpeta de inicio en Windows o archivos relacionados con Bash en Linux. Si el usuario habilita la funci\u00f3n `Guardado r\u00e1pido`, escribir\u00e1 archivos de forma silenciosa sin interacci\u00f3n expl\u00edcita del usuario. La versi\u00f3n 1.17.0 corrige este problema." } ], "metrics": { @@ -26,35 +30,57 @@ "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", - "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "HIGH", - "vulnerableSystemAvailability": "HIGH", - "subsequentSystemConfidentiality": "NONE", - "subsequentSystemIntegrity": "NONE", - "subsequentSystemAvailability": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", "exploitMaturity": "UNREPORTED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -69,14 +95,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:localsend:localsend:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.17.0", + "matchCriteriaId": "99B665EA-3DCE-4331-ACFE-C4A38FCF8D1B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/localsend/localsend/commit/e8635204ec782ded45bc7d698deb60f3c4105687", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index cbcd570c677..c8617a065f6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-28T11:00:19.209665+00:00 +2025-02-28T15:00:20.043026+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-28T10:15:09.963000+00:00 +2025-02-28T14:53:55.297000+00:00 ``` ### Last Data Feed Release @@ -33,37 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283502 +283514 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `12` -- [CVE-2024-10860](CVE-2024/CVE-2024-108xx/CVE-2024-10860.json) (`2025-02-28T10:15:09.963`) -- [CVE-2024-13469](CVE-2024/CVE-2024-134xx/CVE-2024-13469.json) (`2025-02-28T09:15:09.823`) -- [CVE-2024-13638](CVE-2024/CVE-2024-136xx/CVE-2024-13638.json) (`2025-02-28T09:15:10.043`) -- [CVE-2024-13716](CVE-2024/CVE-2024-137xx/CVE-2024-13716.json) (`2025-02-28T09:15:10.223`) -- [CVE-2024-13831](CVE-2024/CVE-2024-138xx/CVE-2024-13831.json) (`2025-02-28T09:15:10.400`) -- [CVE-2024-13832](CVE-2024/CVE-2024-138xx/CVE-2024-13832.json) (`2025-02-28T09:15:10.570`) -- [CVE-2024-13851](CVE-2024/CVE-2024-138xx/CVE-2024-13851.json) (`2025-02-28T09:15:10.733`) -- [CVE-2024-8420](CVE-2024/CVE-2024-84xx/CVE-2024-8420.json) (`2025-02-28T09:15:10.910`) -- [CVE-2024-8425](CVE-2024/CVE-2024-84xx/CVE-2024-8425.json) (`2025-02-28T09:15:11.083`) -- [CVE-2024-9019](CVE-2024/CVE-2024-90xx/CVE-2024-9019.json) (`2025-02-28T09:15:11.270`) -- [CVE-2024-9193](CVE-2024/CVE-2024-91xx/CVE-2024-9193.json) (`2025-02-28T09:15:11.437`) -- [CVE-2024-9195](CVE-2024/CVE-2024-91xx/CVE-2024-9195.json) (`2025-02-28T09:15:11.633`) -- [CVE-2025-1413](CVE-2025/CVE-2025-14xx/CVE-2025-1413.json) (`2025-02-28T09:15:11.850`) -- [CVE-2025-1560](CVE-2025/CVE-2025-15xx/CVE-2025-1560.json) (`2025-02-28T09:15:12.040`) -- [CVE-2025-1570](CVE-2025/CVE-2025-15xx/CVE-2025-1570.json) (`2025-02-28T09:15:12.203`) -- [CVE-2025-1662](CVE-2025/CVE-2025-16xx/CVE-2025-1662.json) (`2025-02-28T09:15:12.373`) -- [CVE-2025-22491](CVE-2025/CVE-2025-224xx/CVE-2025-22491.json) (`2025-02-28T09:15:12.540`) -- [CVE-2025-22492](CVE-2025/CVE-2025-224xx/CVE-2025-22492.json) (`2025-02-28T09:15:12.680`) +- [CVE-2025-1300](CVE-2025/CVE-2025-13xx/CVE-2025-1300.json) (`2025-02-28T13:15:27.043`) +- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-02-28T13:15:27.267`) +- [CVE-2025-1746](CVE-2025/CVE-2025-17xx/CVE-2025-1746.json) (`2025-02-28T14:15:34.943`) +- [CVE-2025-1747](CVE-2025/CVE-2025-17xx/CVE-2025-1747.json) (`2025-02-28T14:15:35.480`) +- [CVE-2025-1748](CVE-2025/CVE-2025-17xx/CVE-2025-1748.json) (`2025-02-28T14:15:35.617`) +- [CVE-2025-1749](CVE-2025/CVE-2025-17xx/CVE-2025-1749.json) (`2025-02-28T14:15:35.760`) +- [CVE-2025-1776](CVE-2025/CVE-2025-17xx/CVE-2025-1776.json) (`2025-02-28T14:15:35.943`) +- [CVE-2025-22270](CVE-2025/CVE-2025-222xx/CVE-2025-22270.json) (`2025-02-28T13:15:27.447`) +- [CVE-2025-22271](CVE-2025/CVE-2025-222xx/CVE-2025-22271.json) (`2025-02-28T13:15:27.630`) +- [CVE-2025-22272](CVE-2025/CVE-2025-222xx/CVE-2025-22272.json) (`2025-02-28T13:15:27.770`) +- [CVE-2025-22273](CVE-2025/CVE-2025-222xx/CVE-2025-22273.json) (`2025-02-28T13:15:27.927`) +- [CVE-2025-22274](CVE-2025/CVE-2025-222xx/CVE-2025-22274.json) (`2025-02-28T13:15:28.067`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `52` +- [CVE-2021-3929](CVE-2021/CVE-2021-39xx/CVE-2021-3929.json) (`2025-02-28T13:15:25.913`) +- [CVE-2022-22587](CVE-2022/CVE-2022-225xx/CVE-2022-22587.json) (`2025-02-28T14:53:55.297`) +- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2025-02-28T14:44:48.713`) +- [CVE-2022-22674](CVE-2022/CVE-2022-226xx/CVE-2022-22674.json) (`2025-02-28T14:53:55.297`) +- [CVE-2022-32893](CVE-2022/CVE-2022-328xx/CVE-2022-32893.json) (`2025-02-28T14:53:55.297`) +- [CVE-2022-32894](CVE-2022/CVE-2022-328xx/CVE-2022-32894.json) (`2025-02-28T14:53:55.297`) +- [CVE-2022-32917](CVE-2022/CVE-2022-329xx/CVE-2022-32917.json) (`2025-02-28T14:53:55.297`) +- [CVE-2022-42856](CVE-2022/CVE-2022-428xx/CVE-2022-42856.json) (`2025-02-28T14:44:48.713`) +- [CVE-2023-23529](CVE-2023/CVE-2023-235xx/CVE-2023-23529.json) (`2025-02-28T14:53:55.297`) +- [CVE-2023-28206](CVE-2023/CVE-2023-282xx/CVE-2023-28206.json) (`2025-02-28T14:53:55.297`) +- [CVE-2023-32373](CVE-2023/CVE-2023-323xx/CVE-2023-32373.json) (`2025-02-28T14:53:55.297`) +- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2025-02-28T13:15:26.103`) +- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2025-02-28T14:53:55.297`) +- [CVE-2024-26306](CVE-2024/CVE-2024-263xx/CVE-2024-26306.json) (`2025-02-28T13:15:26.423`) +- [CVE-2024-36259](CVE-2024/CVE-2024-362xx/CVE-2024-36259.json) (`2025-02-28T13:35:22.340`) +- [CVE-2024-40896](CVE-2024/CVE-2024-408xx/CVE-2024-40896.json) (`2025-02-28T13:15:26.640`) +- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-02-28T13:15:26.860`) +- [CVE-2025-23046](CVE-2025/CVE-2025-230xx/CVE-2025-23046.json) (`2025-02-28T13:35:22.340`) +- [CVE-2025-23083](CVE-2025/CVE-2025-230xx/CVE-2025-23083.json) (`2025-02-28T13:15:28.213`) +- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-02-28T14:44:48.713`) +- [CVE-2025-25192](CVE-2025/CVE-2025-251xx/CVE-2025-25192.json) (`2025-02-28T13:35:22.340`) +- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-28T13:15:28.343`) +- [CVE-2025-27110](CVE-2025/CVE-2025-271xx/CVE-2025-27110.json) (`2025-02-28T13:35:22.340`) +- [CVE-2025-27139](CVE-2025/CVE-2025-271xx/CVE-2025-27139.json) (`2025-02-28T13:35:22.340`) +- [CVE-2025-27142](CVE-2025/CVE-2025-271xx/CVE-2025-27142.json) (`2025-02-28T13:35:22.340`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bb23c02f041..7870324f208 100644 --- a/_state.csv +++ b/_state.csv @@ -87889,8 +87889,8 @@ CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e9989 CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000 CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000 CVE-2016-4655,0,0,f3b2e2852359ec879f695defe2b724c840abee2b548d4c99ea49aea75b4f9d75,2025-02-04T21:03:31.853000 -CVE-2016-4656,0,0,6b8e93efa2f3b341f868374fef4c7665f6085e6b4e46caa142197dd48725eb61,2025-01-29T18:15:27.380000 -CVE-2016-4657,0,0,1f5e6d7026c58963dfa2ee71582fca099d1f6565144273674f6abc62b8d57654,2025-01-29T18:15:27.607000 +CVE-2016-4656,0,1,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000 +CVE-2016-4657,0,1,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000 CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000 CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000 CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000 @@ -122903,7 +122903,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074 CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000 CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000 CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000 -CVE-2018-4344,0,0,0ebf7fdb284e8fcca9487503c18023eb6b04770a9916e35aff39f451f4f4a4fe,2025-01-29T18:15:30.723000 +CVE-2018-4344,0,1,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000 CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000 CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000 CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000 @@ -141290,7 +141290,7 @@ CVE-2019-6219,0,0,51fb8aba06c50f5beb34035c1b242a41d19be52942c31c18d7c2bc7a8531d9 CVE-2019-6220,0,0,cbf2407952b07ecf4492f093b5fc103d1b2a227a81b385b9faca3d2d185c14eb,2024-11-21T04:46:15.033000 CVE-2019-6221,0,0,f50ee778054e49605f683211032acfa21388b43f0c6177a6b438d11f78a69b76,2024-11-21T04:46:15.137000 CVE-2019-6222,0,0,b2e119bf8c2ad53cb80edcff569884b3877b26f333c41130791c9bc95e585fe3,2024-11-21T04:46:15.247000 -CVE-2019-6223,0,0,9d883246b1ec0be5d49c24ab92d25139a32b2a819593f01103f58f708707863d,2025-01-29T18:15:32.017000 +CVE-2019-6223,0,1,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000 CVE-2019-6224,0,0,ecfbf121a69bfc82d1550f3281adf5d3bf177bace8e5f517f9f0d32509cf5d40,2024-11-21T04:46:15.460000 CVE-2019-6225,0,0,ce41491fd66792659c0d145bd85753c0d55c4ec7b1ab133ce86b89f9ab9f2ca5,2024-11-21T04:46:15.573000 CVE-2019-6226,0,0,2aa666681d279cd3af63767890ce00e7894e99d62118a90ff3d1b5e4f08ebd09,2024-11-21T04:46:15.687000 @@ -142061,7 +142061,7 @@ CVE-2019-7283,0,0,feffafb71756ca36d7ebb5e5732cf21c65af1eef8b0b4a000a01722bcbf9d7 CVE-2019-7284,0,0,4f4944ffaef6b9ae94cd5db36f56541cb3730404bdacdc17a02e650c89f80cde,2024-11-21T04:47:55.540000 CVE-2019-7285,0,0,313d5b7c9ac5d469845e6bfae8fac9cde4a21e9607c8aa24344fef7be804554b,2024-11-21T04:47:55.650000 CVE-2019-7286,0,0,02a5092dc2c9edee56617f9cb1cc06cefc2fe17bcd4f6e2cc3426d833d26be53,2025-01-29T18:15:32.340000 -CVE-2019-7287,0,0,bc38e2972d1248e1a2cccc2b2086ae65a7b793070aa65ce830377e1a1af6e5d9,2025-01-29T18:15:32.647000 +CVE-2019-7287,0,1,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000 CVE-2019-7288,0,0,37259472abe9a71efd7ecb7947dce39a94a93ee4f5a3fc21f4b31239799bffb6,2024-11-21T04:47:56.020000 CVE-2019-7289,0,0,490b84305deba02cd9c12685d90ff374698a1976137c62fa8dacb278f2a4b4ee,2024-11-21T04:47:56.150000 CVE-2019-7290,0,0,364d38b1b25fabde5737927c410b77a3a82901e5520f715924a529b21f8dd778,2024-11-21T04:47:56.273000 @@ -142971,7 +142971,7 @@ CVE-2019-8502,0,0,c434befa76a4d4ec9f96079a6522d800615fb7b5a48ac54913486401cebb09 CVE-2019-8503,0,0,0fa026e8d1f022ec049b1ca9e49137afb60072dff1e8e2dd72b28d15c80c7f81,2024-11-21T04:49:57.480000 CVE-2019-8504,0,0,dbc06dfdb448c3a4a5038f7f7fffd2ddbd9e83bd6911705199749c704ab21b6d,2024-11-21T04:49:57.607000 CVE-2019-8505,0,0,e1a01ac4804c5cc3e2fc73634b47f99331a6a4ce7a7c3c2bbfed7c9969ad3586,2024-11-21T04:49:57.723000 -CVE-2019-8506,0,0,2d186e5c5b41823a2f5e28dec7b50cb5796214e779a514c012f86a7bb9b7c36b,2025-01-29T18:15:32.920000 +CVE-2019-8506,0,1,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000 CVE-2019-8507,0,0,b01ebef1a03939c2e3ada65de3c55f419e29cf0247c08ea4d212b6b10f7b019d,2024-11-21T04:49:57.980000 CVE-2019-8508,0,0,cef14e0810b1e31a960bc6e50e6e7aba1a448ffacb5ba344f9c35735a88a9bf6,2024-11-21T04:49:58.090000 CVE-2019-8509,0,0,ec37506e1999ed61157738d5e3cb9f41d210f01cd362d5aea688c39cd5258611,2024-11-21T04:49:58.203000 @@ -142991,7 +142991,7 @@ CVE-2019-8522,0,0,0eae3335c616182d312f36c43cae51aa49706785a5e522721af70477311a7b CVE-2019-8523,0,0,58aaa978a7e9de77277ba3f7bc706507334d4693bd0c5521150bdec55490072c,2024-11-21T04:49:59.800000 CVE-2019-8524,0,0,32c4b83ccc7f0a278121313d1e2f9075e195d072f0b93eabeb1707ea8b920726,2024-11-21T04:49:59.923000 CVE-2019-8525,0,0,6ecd93b661cfa469f49d67d3496d956460a9b9f18cdb8779c33e292274db4eb8,2024-11-21T04:50:00.047000 -CVE-2019-8526,0,0,509693adc838651d0d042870c94bf184cab080bab93309355db0348fa208ec57,2025-01-29T18:15:33.430000 +CVE-2019-8526,0,1,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000 CVE-2019-8527,0,0,7f47548387851680e5a961a6246e9e3c27175977bb648565dd45c6a5b3234b0e,2024-11-21T04:50:00.290000 CVE-2019-8528,0,0,1639b73f58d13f7ed0ff712ed4ffad30e15b2bab49d4978d2759cd12fc2ee8e7,2024-11-21T04:50:00.423000 CVE-2019-8529,0,0,cf361ae2751882bf4341036b0cfea24f00b715e4dc1d6ea3088e8dd4127f4153,2024-11-21T04:50:00.540000 @@ -143068,7 +143068,7 @@ CVE-2019-8601,0,0,5e1b649cd76c28875d6e8e75de505e8524898c98238cb4a152590695820ca2 CVE-2019-8602,0,0,dfd4f0ad81cd404bc76b02e5763cbcb73de09c2d34cedf9136b1b93dd3c3c1d3,2024-11-21T04:50:09.217000 CVE-2019-8603,0,0,397ffd36d4e84c621cf449a9fe68c20353e9e5a5e6eeb155fe03bdbf21382c50,2024-11-21T04:50:09.353000 CVE-2019-8604,0,0,a865afc630f7beaf44df56caaf7efbc7bcf793b8a0a6e8a16c85b32c7369a571,2024-11-21T04:50:09.463000 -CVE-2019-8605,0,0,975802f92e9240931c408c5a9bf6cbb512952feda27cc0dd63ee06019f24fd53,2025-01-29T18:15:34.143000 +CVE-2019-8605,0,1,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000 CVE-2019-8606,0,0,9d793373058d23a812a6cec3d9e2bdd104d6ee9c23a4401600c30545293a6e9d,2024-11-21T04:50:09.690000 CVE-2019-8607,0,0,7ac0d064c6b42563e8682aff1dcfab6f7183e1d42a575096d72bb934c174f4b5,2024-11-21T04:50:09.797000 CVE-2019-8608,0,0,db9ceb00c77dadef8090d297e1f1d19a2d5eb960a616fdf84109118f8a2fb620,2024-11-21T04:50:09.923000 @@ -156758,7 +156758,7 @@ CVE-2020-27947,0,0,bdab85e9f6517d7edd3e13b7350718f9ad953c6de0da6392435fb79ad4365 CVE-2020-27948,0,0,74ff44fbc11d14ffb0e2560785e15d6d6ddb2c5037b226bcfd9403a14505cacc,2024-11-21T05:22:06.417000 CVE-2020-27949,0,0,1e77071bd6ed69c94468c0ca30b29016b44256bbb0737e7795d5c1adfd21e5b9,2024-11-21T05:22:06.537000 CVE-2020-2795,0,0,ea6d9119a7d08536109093ac2e9c142a3d976d091ca02de0b12940cd00b054e7,2024-11-21T05:26:17.380000 -CVE-2020-27950,0,0,556c7abc643a7c2ecd5395a7b6350ac53020516c58d1bca8846382164ba26531,2025-01-29T18:15:34.950000 +CVE-2020-27950,0,1,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000 CVE-2020-27951,0,0,4394fd9fd0d270e5685d681c055c43d114e98685e00457e179c818543125646b,2024-11-21T05:22:06.777000 CVE-2020-27952,0,0,f8663fddee1a7d1e8de2028f541b90d05e9b18fe2b6c949432d04623122b475d,2024-11-21T05:22:06.910000 CVE-2020-27955,0,0,84ffb7d25d038cf287196c1671c1e7197adbde6851d5e0fc38b11a1788de87ba,2024-11-21T05:22:07.027000 @@ -159728,7 +159728,7 @@ CVE-2020-3833,0,0,e764dc5cfbb8f637552b2441e9ddb593562a3918809b4c677bb07276f1f37b CVE-2020-3834,0,0,3e772505e33e0e780d0ee45c96850de3b9441fb84529cb87198cfe1cd9457c55,2024-11-21T05:31:48.527000 CVE-2020-3835,0,0,cdcfa07a09a472bd33c6fad2c5ebc47f55b7047cf8a668f3558757ee2f0554ef,2024-11-21T05:31:48.627000 CVE-2020-3836,0,0,26198ab0a7a09181b9daabad3d9d21eadd74796c73b69cca8eeebfe42cc70abc,2024-11-21T05:31:48.737000 -CVE-2020-3837,0,0,fca801b68f3c5db6c7dbaa03bcf0c1f5b386db698cb29a672fddb4a339c03092,2025-01-29T18:15:35.193000 +CVE-2020-3837,0,1,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000 CVE-2020-3838,0,0,8d1784baae371177f9d969f0cf7d2c32eccd6737302888ee0e7d97c3ed35fe4e,2024-11-21T05:31:48.980000 CVE-2020-3839,0,0,cce4070eb0b58eef19224cd877e2e6dd6b8f5e237e9f84b7c9bae85d5ed0c879,2024-11-21T05:31:49.107000 CVE-2020-3840,0,0,514e04d2cf82acf4eded7fae4a5294fb412c6b1287f03b9bf0112344f66a3086,2024-11-21T05:31:49.210000 @@ -164696,8 +164696,8 @@ CVE-2020-9814,0,0,39d23ae595854756548268c04031dd78beb4f4daf7ec7db61e365f2b36b9a1 CVE-2020-9815,0,0,a003a768ee0eea54e269add860f10e3abee748e6ca2781978085f4f2ae41bb71,2024-11-21T05:41:20.167000 CVE-2020-9816,0,0,ead57dd330ea3372df51f17718a1057a151f35f4442acd93f18839173d58f970,2024-11-21T05:41:20.270000 CVE-2020-9817,0,0,6451091f69be5568064f6c8a083aedc1278642490c4a281b5e17f6d40ca1424c,2024-11-21T05:41:20.380000 -CVE-2020-9818,0,0,0a6b4fd4c9817281cd239ede844044abc4a89e50bf7f626e25184814fc660e1f,2025-01-29T18:15:36.303000 -CVE-2020-9819,0,0,7f9be409e946b80d7f4a3bf93ed6180ab9f91957b4354ed16ab6baa7137f96ba,2025-01-29T18:15:36.543000 +CVE-2020-9818,0,1,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000 +CVE-2020-9819,0,1,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000 CVE-2020-9820,0,0,4fdad7d17b8d9bbdef875e36d0061295507fa69ba2f8dbd3a4a1d39c55b0a586,2024-11-21T05:41:20.713000 CVE-2020-9821,0,0,07529420971d10ff2bbfd70ddd9990d24f55005291e73adea0637f70f81b6285,2024-11-21T05:41:20.820000 CVE-2020-9822,0,0,dd0bacca6d947be1747310d2122b048f784f56925b7be141e555edeaa848edf0,2024-11-21T05:41:20.927000 @@ -164735,7 +164735,7 @@ CVE-2020-9855,0,0,f62de7238477aea93f3abf3ab8ea2dfc400975c6489e15199db3b3de03a472 CVE-2020-9856,0,0,e48989f32d60137c0edc8a02e834ea84cd4505ab62440e90630bb6ca0255475d,2024-11-21T05:41:25.117000 CVE-2020-9857,0,0,4564f37640cf033d502580176544c1ca67b90e10b289096385a5ce052561a423,2024-11-21T05:41:25.217000 CVE-2020-9858,0,0,365f269021dc2690a80c7be2353be85740b98a3c242d31c022e2f1ae9fd07a21,2024-11-21T05:41:25.317000 -CVE-2020-9859,0,0,7e28dad45e9033af1f8077992e0bbb55c2e7be78d4dca218832de395074bffcb,2025-01-29T18:15:36.767000 +CVE-2020-9859,0,1,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000 CVE-2020-9860,0,0,6d689ddd768a7729996307cbe7c2aa5b1d09bcc559832a4fec10fff8c58a23c6,2024-11-21T05:41:25.513000 CVE-2020-9861,0,0,5c800faea68343bf58424d7e251e1c13d6dc6d14a61816a5cf1f99cb4d5b1992,2024-11-21T05:41:25.610000 CVE-2020-9862,0,0,b6f03288f468f0d4024a3988e42405a25e797fb0852093161144538c7e8105b3,2024-11-21T05:41:25.710000 @@ -164780,7 +164780,7 @@ CVE-2020-9903,0,0,fd8ba9246c03cf84ed34090daa738b1e21ec1682f0f8cda6dedaa4761c5864 CVE-2020-9904,0,0,5fdc6e10d2f1f01c714b258e99f79acbd6194e185af91fb066f25cb2d75768c4,2024-11-21T05:41:30.013000 CVE-2020-9905,0,0,b68cf578fe49078f790bcf44e5ff24959136d2e396535b0c2537b5b0ffecaa75,2024-11-21T05:41:30.123000 CVE-2020-9906,0,0,166cedb6a95dee0a53a40439951152b4c6ffba0b89929eb32a8c66f410558976,2024-11-21T05:41:30.230000 -CVE-2020-9907,0,0,f6170df5d41ab61e761e6ef9b9f9e4638f017e5a0e53e54c567afe5566a4a6c0,2025-01-29T18:15:36.987000 +CVE-2020-9907,0,1,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000 CVE-2020-9908,0,0,06606ab1c2077a54e1320041f575a636b9cd10146870b40c63b7a42243148093,2024-11-21T05:41:30.437000 CVE-2020-9909,0,0,db45329d72cab554faea03693de3ea5691e4845af8f9053ecf8a8d9d2e894736,2024-11-21T05:41:30.537000 CVE-2020-9910,0,0,eacc185ba0c7ff3cc1d990c8fea0abc7edb47327ee8ca9ee20d8023e0c9a1f62,2024-11-21T05:41:30.647000 @@ -164807,7 +164807,7 @@ CVE-2020-9930,0,0,6e27c898f04c57974ee33a6efc19d92b2d388cd1a02ee2fa6c053c46a67dc9 CVE-2020-9931,0,0,f8db6056ab6e7b000a860597155fbc28fbf14076d94aef57849ea84edb033dec,2024-11-21T05:41:32.923000 CVE-2020-9932,0,0,d4ac093d8a0c5c44ead5f82d1790e5da018a7c279ee0812a2e45de174844d665,2024-11-21T05:41:33.040000 CVE-2020-9933,0,0,b1ac39dc4c32bae5f3c1adcbaa421d06f55965e5d7f7c3871b963dbc0c4a1561,2024-11-21T05:41:33.153000 -CVE-2020-9934,0,0,efbba8dc113158e9ca16065a30f87570f84b9caac86f51e41268eadba30b0c1b,2025-01-29T18:15:37.463000 +CVE-2020-9934,0,1,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000 CVE-2020-9935,0,0,8c8962420a06ea8b9704251fdd323828ea6570405c8d4526638213ce066ddf64,2024-11-21T05:41:33.400000 CVE-2020-9936,0,0,3f0520c5f2eface2c145c0dc6c279d5078dc8e79c797e1a3ffd2befbb5d1d782,2024-11-21T05:41:33.513000 CVE-2020-9937,0,0,d572deb06e95e84154ea8a51424aa07761fb2c381fd1bef9008c747db6755e1f,2024-11-21T05:41:33.633000 @@ -166431,14 +166431,14 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943 CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000 CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000 CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000 -CVE-2021-1782,0,0,9640394dec9240447d322c0fcc8c8fa12032706c604a8d898340500829c44c28,2025-02-03T14:15:30.590000 +CVE-2021-1782,0,1,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000 CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000 CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000 CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000 CVE-2021-1786,0,0,844528cd02ae52e41c72912ba3abea868e3a31a8ead52c9afc5203d16bdb7bdd,2024-11-21T05:45:06.603000 CVE-2021-1787,0,0,2fed3cae125c2895dac1e44fd837f817f5b5e70f63daf568baaa5ea04f53dd36,2024-11-21T05:45:06.733000 CVE-2021-1788,0,0,7cd9b9e8fd97ec6f34bcc85b8d8ae756cef050deec7f91d8bdd5e69f3ff22f38,2024-11-21T05:45:06.860000 -CVE-2021-1789,0,0,c004dfc7eeff6175896981e01a28c69633721046232580ca43348bf2f1072efb,2025-01-29T18:15:37.707000 +CVE-2021-1789,0,1,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000 CVE-2021-1790,0,0,453727956bec9f85809fc98d61ce3827a48322b65c0a1308fdd19254e25b7d46,2024-11-21T05:45:07.223000 CVE-2021-1791,0,0,0858d7a66d6852664ff89bbf6b3f6519588dcf813a61680a95653c00c4525806,2024-11-21T05:45:07.340000 CVE-2021-1792,0,0,5ffc2bf1833bc5c8fb2e4843cb4db95b9711424cf4aab2d2cc4aaf61cb70cd0c,2024-11-21T05:45:07.477000 @@ -166509,8 +166509,8 @@ CVE-2021-1864,0,0,e61bb78daa00b5dca2e6f100a892bda75d87a592b9962975d78c060881b491 CVE-2021-1865,0,0,d4d8e0986b62bedaab54dbcf207c7ced93d3d91287ee0883bce3ef5ceb5d3d36,2024-11-21T05:45:15.390000 CVE-2021-1867,0,0,88725f08a5e44d02242ea72ac07f37bb9e06618f3cd63825dbd1ad8b63b8cb04,2024-11-21T05:45:15.513000 CVE-2021-1868,0,0,432a8d063e46b26199a2f940e4c6839746a15a330270af8952a5e97a5f7524ac,2024-11-21T05:45:15.640000 -CVE-2021-1870,0,0,d434766c45b29fda9e41cc583afd3868829a56fd8ab0c14185ce14d845c02e13,2025-01-29T18:15:38.170000 -CVE-2021-1871,0,0,84eee7c16e8cacc0aabd1c3c654a774c68a8e0d47e9bd1699ed5d36b79d1ad2c,2025-01-29T18:15:38.527000 +CVE-2021-1870,0,1,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000 +CVE-2021-1871,0,1,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000 CVE-2021-1872,0,0,4aad0f7c4f760558662da2aa02617c0ae0669394f36c9abb206cff7b5c7e6f77,2024-11-21T05:45:16.040000 CVE-2021-1873,0,0,f647da70e48b4a0e757dc32d4da6a78ccdcb576a528532094359d47a435eae89,2024-11-21T05:45:16.153000 CVE-2021-1874,0,0,11acb083af68bc66cbb55a31d610911ff9e1492756cdefbcf79bd2d863878bb4,2024-11-21T05:45:16.287000 @@ -166518,7 +166518,7 @@ CVE-2021-1875,0,0,a763019d62a197757c122cba7e6ec2caf0210e0fc06c38570a6774aace7636 CVE-2021-1876,0,0,50e3e6073a13251685729089e5f9b48623129fa60396e005f85f8948fe4b1930,2024-11-21T05:45:16.527000 CVE-2021-1877,0,0,78167aec1738ed934a9db101730f2475d220aa596ff08cccd6d82eadaaf3136f,2024-11-21T05:45:16.647000 CVE-2021-1878,0,0,bbc94e824fa34a03db5d35e1bbb0245d5ebeb5ba4878c0691539ed3e105efdd0,2024-11-21T05:45:16.777000 -CVE-2021-1879,0,0,616b8acee0c4a4089cfb86767368ae744bfd144228a7d22a9f357dc714753af7,2025-01-29T18:15:38.763000 +CVE-2021-1879,0,1,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000 CVE-2021-1880,0,0,f21767cc17b0b400ea36769c68e9dc0fc94bd57122b1b556aeb6342108dfd313,2024-11-21T05:45:17.023000 CVE-2021-1881,0,0,71d96589a667db4e83dea8a9b9340b5dda8ce4877b845ef6e86d23e76d807867,2024-11-21T05:45:17.143000 CVE-2021-1882,0,0,0de80653eb0cc938d031bd299bc26b6178d33ea21b4b167b4804efdfdc78bad9,2024-11-21T05:45:17.280000 @@ -175042,15 +175042,15 @@ CVE-2021-30653,0,0,af6209998169bf0b59156640376c5ebe8e7a91975ee599eee6d8c80cb5bdb CVE-2021-30654,0,0,d454b5e9d0444f22c1324170868a7170e32ba4142b3b3d1feb9e8f43129b786d,2024-11-21T06:04:22.110000 CVE-2021-30655,0,0,c5bd87f283bc66de8cf6a1dccdc1113eb65e46ccaaed5eff9fd5299b957c5164,2024-11-21T06:04:22.250000 CVE-2021-30656,0,0,4f25be990cd3e56338347956b5cd16bd2d8602e91cf11f5de83660e31c7f84bc,2024-11-21T06:04:22.390000 -CVE-2021-30657,0,0,fb44ce6127b84e2972754757c9cafae4407a783322080764095a401bbf138df6,2025-01-29T18:15:40.147000 +CVE-2021-30657,0,1,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000 CVE-2021-30658,0,0,a7e6ce534983d6265ea77dbc37d43cd7f21d26f66f7c40d693487b5c676730f2,2024-11-21T06:04:22.637000 CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257775,2024-11-21T06:04:22.750000 CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000 -CVE-2021-30661,0,0,0441a5ee2f1c64ac124688d9a4989971589017aaa8f192870617e176c24a7fb5,2025-01-29T18:15:40.407000 +CVE-2021-30661,0,1,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000 CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000 CVE-2021-30663,0,0,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000 CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000 -CVE-2021-30665,0,0,7177f5183cb3e845bc6e7e0274f2c6ba2b866d04a6e42a99d1995a601ede60f3,2025-01-29T18:15:40.653000 +CVE-2021-30665,0,1,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000 CVE-2021-30666,0,0,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000 CVE-2021-30667,0,0,ee0c4829017313d8362cc93881a4782426de3146989d6fbd51513180306068f5,2024-11-21T06:04:23.897000 CVE-2021-30668,0,0,ef8eec8272941e6ecce5f78376baeda179f835bab56dbd9979f2308401ea7e74,2024-11-21T06:04:24.030000 @@ -175096,7 +175096,7 @@ CVE-2021-30708,0,0,0d4ef740951de9fa3c7d46cd5d922d5031082b03c36b68901042a25459d7b CVE-2021-30709,0,0,ac4f597f103d40c646c9a37992122e647523ecf1a80c9ea7d0cad044139adf79,2024-11-21T06:04:29.733000 CVE-2021-30710,0,0,6f9138aff87c816b5801441de245256cd714004b0c7fe4d082b9380d78dbecf5,2024-11-21T06:04:29.883000 CVE-2021-30712,0,0,fd76d4bdea30f6917b1b4272719a88821011e5d27fc4ee0c3f5302060e454266,2024-11-21T06:04:30.037000 -CVE-2021-30713,0,0,8e63e2cc66911ac2ec90c97ba675bccac6c03fa0b5016f8a0c0391722caafbde,2025-01-29T18:15:41.113000 +CVE-2021-30713,0,1,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000 CVE-2021-30714,0,0,1ac3cdebf872ac967c92c82c1f293c834ed9a9b2a9af3cbda73ed47dcff3c59f,2024-11-21T06:04:30.317000 CVE-2021-30715,0,0,8526fff9426684bf5994f2385d0e54f12e8042c43b974b959d854ca5cfd03af8,2024-11-21T06:04:30.440000 CVE-2021-30716,0,0,1351521f863a9be568843ed0717057da020860858dd82d7d962e25e477f48e69,2024-11-21T06:04:30.573000 @@ -175183,7 +175183,7 @@ CVE-2021-30802,0,0,d3af46ce2f497920c6024a63ea8ea8888c260d90da7eb1da62c0463dfa869 CVE-2021-30803,0,0,da6c846ff7628e171742041c5c4f2a9ae56f35437b19a5957ae69acd101f42a1,2024-11-21T06:04:45.030000 CVE-2021-30804,0,0,a8448168f3c60c9210c3b99df09e33ba1abc83f92b034856b3391f42be985878,2024-11-21T06:04:45.140000 CVE-2021-30805,0,0,a45ac4492d17d042337985687b2b1544cdce5f65bc715a78eaef4fca60b02db2,2024-11-21T06:04:45.257000 -CVE-2021-30807,0,0,0e7093db2c5e86c9f0cb74e511d98fae397ddfa9a2fe25b13d4152ca3573f4b0,2025-01-29T18:15:41.790000 +CVE-2021-30807,0,1,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000 CVE-2021-30808,0,0,7332f9b25719fd725098c6e1a14e50d288895c73b1d9691fc7752d3662d18d33,2024-11-21T06:04:45.500000 CVE-2021-30809,0,0,9faa62183c613ce8119ed921c618805568e2bfada6377a76f91a8e0d329247cf,2024-11-21T06:04:45.630000 CVE-2021-30810,0,0,0e59876a610502b4445f0847e17025234c0f485bc63ceb2d065709a0d4be2e41,2024-11-21T06:04:45.760000 @@ -178812,7 +178812,7 @@ CVE-2021-35482,0,0,5b472310c7c4047d6c33038218d864d04f51f66e4d51e1cb7991026a14c61 CVE-2021-35487,0,0,331ce5b429413f54a5bdb9718850b6786d3b058d3cbb6312518d5ffedf213af6,2024-11-21T06:12:21.600000 CVE-2021-35488,0,0,e65262e0a1c1d0504b83abe345c410bff84cdfb7fa7e3e92be53ed427da99d9b,2024-11-21T06:12:21.740000 CVE-2021-35489,0,0,53bce953b714dca045a33c64982814f760f224a2cdd4b57395f881b88326173d,2024-11-21T06:12:21.887000 -CVE-2021-3549,0,0,511a2b4d93db9cefb38aa79d5d4224d8dc433d1a5d39d3ed3f732f52c19f733c,2024-11-21T06:21:49 +CVE-2021-3549,0,1,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000 CVE-2021-35490,0,0,8518f891efcd6e2c5ff624523dd1d73b81408947a5d2a6dceb5053db70504775,2024-11-21T06:12:22.030000 CVE-2021-35491,0,0,f4dc4e73cd732408245742225cf63817e06513f351fcb7db023db8d554876caa,2024-11-21T06:12:22.200000 CVE-2021-35492,0,0,c1d7bd87fad0c3e28378adc00aafab61674ebaa8678be1c7775d09b09a4bb35b,2024-11-21T06:12:22.410000 @@ -180102,7 +180102,7 @@ CVE-2021-37346,0,0,946b92ddc4fbe8315c7d41ff29ec3fe6897aba5d320afff2a62bc560a60f7 CVE-2021-37347,0,0,3b9e777c10e939bdebc4042602b6811e52742ff1bb9cf92b7d4c7384ff6b0b30,2024-11-21T06:14:59.177000 CVE-2021-37348,0,0,ca272066b16ec187cad70b4e87c46a9e6652a909d15aa5859776a09d1693fbd9,2024-11-21T06:14:59.330000 CVE-2021-37349,0,0,08392ea9c36b212d62ac5ffcca309c8a34443a89420b70fa89a06ba97b793121,2024-11-21T06:14:59.490000 -CVE-2021-3735,0,0,d11deed3412556bac03f1c6e16e8c2a8c0c5c98d275ddee09f48ef93942a5491,2024-11-21T06:22:17.110000 +CVE-2021-3735,0,1,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000 CVE-2021-37350,0,0,cf25b34ef1bbfd95231919aef949f1c5ef44e04e05be9690834576ef277c1b91,2024-11-21T06:14:59.677000 CVE-2021-37351,0,0,d11c79c834d15cc2144d8711dffb0ddf0689cebc7c8d0fa23ad5d1503584c13d,2024-11-21T06:14:59.823000 CVE-2021-37352,0,0,1d39000a015942794d66401eebb5b89f81736f941a96aecacf01420137c33cd4,2024-11-21T06:14:59.973000 @@ -181647,7 +181647,7 @@ CVE-2021-39283,0,0,eda15ad1b3bcdcea2bbabe3c3a719378090dd1f6b09ac9e32c24dec27d162 CVE-2021-39285,0,0,a30e82f0b54273bf7230675bfc50d449c5b054125f271ae318a58b9f82ff968d,2024-11-21T06:19:07.193000 CVE-2021-39286,0,0,ef6a7f535e70ea4c70e16914bb393fc1fe7ddce52d7869aa8e27ed3514a1c0a5,2024-11-21T06:19:07.390000 CVE-2021-39289,0,0,065932f15029abf31cec0e9a8c93f437f6a2e6f1d70a6cf84aed55a74ab5c3a9,2024-11-21T06:19:07.593000 -CVE-2021-3929,0,0,386aee1fa2c13bafa06a50919c8811ee196fa3eb57a7f758af68733a2d80bd6e,2024-11-21T06:22:47.740000 +CVE-2021-3929,0,1,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000 CVE-2021-39290,0,0,4faf5271e88619fa8d7ac328a2e3cb3d6fd0f70f73052bb9ecd9122500b24399,2024-11-21T06:19:07.793000 CVE-2021-39291,0,0,cdeac33e28dbcd5736066d6640e454e84e5a3f646d2543c33f601534582dc436,2024-11-21T06:19:07.980000 CVE-2021-39293,0,0,7f06b7eb1a854fa9547bea97c0e43e43aaed1d5a57ac0f47b2f178f3861e1679,2024-11-21T06:19:08.180000 @@ -192299,7 +192299,7 @@ CVE-2022-22583,0,0,cef0a1b3c51e05882dd405aa523ef9e9bbbacbdae2cf3cbfa227960daba5e CVE-2022-22584,0,0,5248aa63983720014377ab3a932e7e26d00aa01f6109bfe9bbfe564e719ab265,2024-11-21T06:47:04.220000 CVE-2022-22585,0,0,49d858c7854d86c30431073a89e3a77a374d0583f41fe955f4122b98bff7b1d8,2024-11-21T06:47:04.370000 CVE-2022-22586,0,0,7a8c327b1fdb0dc879577cb6623c3b5a67edc10748196e7bf3d4d9a371e2a4bb,2024-11-21T06:47:04.493000 -CVE-2022-22587,0,0,298287df6b9107232183b1c1f2a082eefda3e57d8532fbbfd506d0c135fc13c0,2025-01-29T17:15:16.100000 +CVE-2022-22587,0,1,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000 CVE-2022-22588,0,0,6c57d89d82e014a04c1d1a269239114176bf790579db18cc8a4e0bb9b98618f5,2024-11-21T06:47:04.710000 CVE-2022-22589,0,0,ad265160333aeff24b5a24815da36d925fd4417ebc2ddd4162500edd6aad12ec,2024-11-21T06:47:04.823000 CVE-2022-2259,0,0,150b52071c57e9da09e4562b9e329d9ebb764927f18ed734d3725de25cc194b6,2024-11-21T07:00:38.140000 @@ -192334,7 +192334,7 @@ CVE-2022-22616,0,0,fd6c62268b016f15b1bb153516514624f101ccecfdc0b548b6bd7175935d8 CVE-2022-22617,0,0,b9a76fb778badaf7135b648c1b9e7a3b21aea99bf752c663599f8da2405573b1,2024-11-21T06:47:07.893000 CVE-2022-22618,0,0,53a6466f73e6695117bc56fb459dfa0bde3aacbb8110ea335a0c42333cb99e27,2024-11-21T06:47:08.017000 CVE-2022-2262,0,0,48f9f12588c4cb17d7b597dce3fc433cbe7d88db72523f825ed2022a32d1a7a8,2024-11-21T07:00:38.480000 -CVE-2022-22620,0,0,708e42b970b338cd9b18c6d6a1a5a07c513d1cc6db4ebe7b51605c00613bfa29,2025-01-29T17:15:16.457000 +CVE-2022-22620,0,1,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000 CVE-2022-22621,0,0,f64d274fe62db017d3a340f8a8d18fc17ad01dea66a7a94ad96229b65fa87834,2024-11-21T06:47:08.227000 CVE-2022-22622,0,0,096e2e61980549c51cd46b9fbef7cf08515942db2ff08880a7a4a737ef13b81f,2024-11-21T06:47:08.337000 CVE-2022-22623,0,0,7ed1ca6096215ea8485a50fc8cae6d57524f6a37b6c47c50add71b768de4e4c8,2023-11-07T03:43:56.890000 @@ -192393,7 +192393,7 @@ CVE-2022-22670,0,0,c0441f67d04e29f04a1c244c888e912d7e003563c05a6c1660033505dca78 CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9d06,2024-11-21T06:47:14.617000 CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000 CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000 -CVE-2022-22674,0,0,2adab5b1b423052bbeca74c613db0c7648ffe6c484635ebce9da5a50cd09c001,2025-01-29T17:15:16.737000 +CVE-2022-22674,0,1,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000 CVE-2022-22675,0,0,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000 CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000 CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000 @@ -201007,8 +201007,8 @@ CVE-2022-32889,0,0,e2460844c4ef16c6e6f8104f084d35290ec40172f3f975d6affa0424c61df CVE-2022-32890,0,0,785b75357f0818483d1cacb0d31d220a8c2994f7a37cf1dc95c6e55ec8b0f95f,2024-11-21T07:07:10.317000 CVE-2022-32891,0,0,64dde404899da7b8a38662bf5bf5c5c622231e25930ce78f0e30e189e29b18b4,2024-11-21T07:07:10.457000 CVE-2022-32892,0,0,445bb66d3cb66bfa52cb3b8f236b40adfc7de6fe48f16d3abd8207d65c213073,2024-11-21T07:07:10.590000 -CVE-2022-32893,0,0,92c0cf1c3ecb5156712e99b7517d058470066dc390e098c05623990df1020c73,2025-01-29T17:15:20.573000 -CVE-2022-32894,0,0,843c93094be1a733bb6f6edf1cd918f216c5aaceacd3ab7c0e5e5ed1225536a3,2025-01-29T17:15:20.847000 +CVE-2022-32893,0,1,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000 +CVE-2022-32894,0,1,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000 CVE-2022-32895,0,0,43d08342ad442aaa6b2f9df4c24c35921ef46cb9a7757a6ff79496a2351a09c3,2024-11-21T07:07:11.033000 CVE-2022-32896,0,0,c0ac2853331d6a1c5683c215abdb98389fc122489eb770c05070e76281984e79,2024-11-21T07:07:11.157000 CVE-2022-32897,0,0,65b569b40094135fab0a0df9bc0002c37e324af1cb43918ea27c06ef6acc99c6,2024-11-21T07:07:11.290000 @@ -201033,7 +201033,7 @@ CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fc CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000 CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000 CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000 -CVE-2022-32917,0,0,f72d000a2f6bf81e09d47c8d717bcb9d0a0b93608ef26baeee74a08a22f5bc2d,2025-01-29T16:15:30.057000 +CVE-2022-32917,0,1,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000 CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000 CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000 CVE-2022-3292,0,0,65c83db42f543a9e9f1e31aa23648b5d7ede84a2f95a828ce9f929872ace9884,2024-11-21T07:19:13.933000 @@ -208701,7 +208701,7 @@ CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b4746165316 CVE-2022-42853,0,0,be314ca2e246b5cbd5d648caafe0058f4047aada97f0268096bc52c067d9151f,2024-11-21T07:25:28.887000 CVE-2022-42854,0,0,69b8e36a93fdf0ee869d865dc40773b09a080590f8a161d00ba036b8c8c87754,2024-11-21T07:25:29.040000 CVE-2022-42855,0,0,2438782da0ac107f7acfb77343c237e44eda85c7d815276b63602765d59cef45,2024-11-21T07:25:29.167000 -CVE-2022-42856,0,0,dbe07b0474f502806cc25f2ff55ad774d36a421a12e119a94b8816b87e70e3a7,2025-01-28T22:15:11.590000 +CVE-2022-42856,0,1,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000 CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000 CVE-2022-42858,0,0,c3aa949c738e65fc13679e368931fdfbe17d5f10b70e77201c050fac523b7dba,2025-02-11T18:15:20.220000 CVE-2022-42859,0,0,b7c3c34368d49525f8b5113c35fe596dc55c4694a7957ea7631d371197964aec,2024-11-21T07:25:29.623000 @@ -218800,7 +218800,7 @@ CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa4471 CVE-2023-23526,0,0,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000 CVE-2023-23527,0,0,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000 CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000 -CVE-2023-23529,0,0,06ea1c64d6e35ee6ba270e0752e3d0a3ff377c3acba0734c0c89a688e22ee1e5,2025-01-28T22:15:14.157000 +CVE-2023-23529,0,1,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000 CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000 CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000 CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000 @@ -222654,7 +222654,7 @@ CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000 CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000 -CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000 +CVE-2023-28206,0,1,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000 @@ -225918,7 +225918,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000 CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000 CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000 -CVE-2023-32373,0,0,384a9ff85ccf8a10d48c0d117a13f5b941b239e5c1f11c3f168fdd548dc2bbed,2025-02-03T14:15:34.500000 +CVE-2023-32373,0,1,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000 CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000 CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000 CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000 @@ -227453,7 +227453,7 @@ CVE-2023-34184,0,0,2442eadc7f7ae90259cef50a8536ce9bd375108fe6cfeb3ded94765555a83 CVE-2023-34185,0,0,4c5f4bf40def13d12fc3b4e803a32228e00caefcd5ded5fd0047f122b45f0170,2024-11-21T08:06:43.960000 CVE-2023-34186,0,0,4a58da1254a6f379a26c0f12ec76897c53ffd6ab2c992e984b8875d4d20e7c36,2024-11-21T08:06:44.087000 CVE-2023-34187,0,0,e39c35f0acec0e3289c801cedde27704e32b7fc40943aee9626533ee9c30b2f0,2024-11-21T08:06:44.200000 -CVE-2023-34188,0,0,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000 +CVE-2023-34188,0,1,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000 CVE-2023-34189,0,0,d6ad5f296df91f0114d60cd15059ae984d1803b57558b7a9cf6db063968348f1,2025-02-13T17:16:34.990000 CVE-2023-3419,0,0,df7622509fc0fb525cb2b82180f57ee07af06f367b6c89769e8b9596f2dc8ee2,2024-08-19T12:59:59.177000 CVE-2023-34192,0,0,8e068b263c612b1cfb21e8e741bf1c7c4a21d6b7a2cbdefe2e15a248cfc85c32,2025-02-27T02:00:01.920000 @@ -245022,7 +245022,7 @@ CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6 CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000 CVE-2024-10858,0,0,42b123ba3b0529f7fcd2fe96eb2bcf8b1478b777f663ea90f1bede156318a16a,2024-12-26T20:15:20.080000 CVE-2024-1086,0,0,ed3b4cc9e937086bf7bd2a6eab945784d7bd20c1d6f9c68b6b3e2f0cc3cb68b3,2025-02-13T18:16:21.507000 -CVE-2024-10860,1,1,7c3c00f3072a2c47fdca547d3cc1a0275081d893f39926917a8c68219e57d0f9,2025-02-28T10:15:09.963000 +CVE-2024-10860,0,0,7c3c00f3072a2c47fdca547d3cc1a0275081d893f39926917a8c68219e57d0f9,2025-02-28T10:15:09.963000 CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f88110b,2024-11-18T17:11:17.393000 CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000 CVE-2024-10863,0,0,b5b227485fbe2ef5029ee042bb93b4e86d4e47bdafc29c909ac7a75d6e0d47a4,2024-11-22T16:15:21.257000 @@ -247395,7 +247395,7 @@ CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb52205382957231114 CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000 CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000 CVE-2024-13468,0,0,3b114e7865942bd4a908c446f11cc9e4d2c0bb866058c63bfd1c63d95d58f732,2025-02-19T08:15:16.027000 -CVE-2024-13469,1,1,59dce6c462c5a88a80921bfc05a3a5bb68a1971f53d52b089cd62613870d0a02,2025-02-28T09:15:09.823000 +CVE-2024-13469,0,0,59dce6c462c5a88a80921bfc05a3a5bb68a1971f53d52b089cd62613870d0a02,2025-02-28T09:15:09.823000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 @@ -247546,7 +247546,7 @@ CVE-2024-13632,0,0,ab87904e3237e1ff207bd083064fa234eb8396de2c71155409ff7865e4a4b CVE-2024-13633,0,0,5ee7398c6e0e74dbda092bd1434016432f8cbad05a1f93851c7c1e6797876da1,2025-02-26T15:15:22.940000 CVE-2024-13634,0,0,0925e4eb0a5b6a25a950b2bbdaa9ac2e640f74d1a050a484380e5d735ef0dc4f,2025-02-26T15:15:23.103000 CVE-2024-13636,0,0,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000 -CVE-2024-13638,1,1,4fbd33032dbdde9da6016e5df748c24187ab44e7250c73361acba382280f65a3,2025-02-28T09:15:10.043000 +CVE-2024-13638,0,0,4fbd33032dbdde9da6016e5df748c24187ab44e7250c73361acba382280f65a3,2025-02-28T09:15:10.043000 CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 CVE-2024-13641,0,0,f5ae933978b19eaa8786ac84fc5f20a253f923886108cb6b544c748640981d51,2025-02-25T19:39:47.477000 @@ -247613,7 +247613,7 @@ CVE-2024-13712,0,0,dc7644dc4e1dbc747bbf2221b44bd3e1c5714d00548aa1a048cc6c77b3cd4 CVE-2024-13713,0,0,90954b7583c56b27a881e3e89dac99a8fe4d669edd575847540b2c9eda75eaf1,2025-02-25T03:28:44.207000 CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000 CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000 -CVE-2024-13716,1,1,a730dc60dc22c20ef2e1e6a37f90d5aa74273af9534de5004e3970125a69b204,2025-02-28T09:15:10.223000 +CVE-2024-13716,0,0,a730dc60dc22c20ef2e1e6a37f90d5aa74273af9534de5004e3970125a69b204,2025-02-28T09:15:10.223000 CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000 CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000 CVE-2024-13719,0,0,82e1c4af9f0b8d4908b4e334be7136368e8b0d540e14dda9dec9f059b1234cbf,2025-02-19T08:15:20.737000 @@ -247676,8 +247676,8 @@ CVE-2024-13822,0,0,b03830906a27cd03fc0531c5c6e7b60f126f1978ea681f2921431ba76aa58 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,aa117bb4caae4c90c9ef562f3b17aec83c186c85e2ed83fcc25ce7b11090cff4,2024-11-21T08:50:27.733000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 -CVE-2024-13831,1,1,dc606325056ecb3af1d0abdf4906087df581d7aaf8a47f4b06428d6e01b13004,2025-02-28T09:15:10.400000 -CVE-2024-13832,1,1,ec5b2acd93db5978e9a901bf338782a10b26bfa5fce10324f0a5b3fac0b88ab1,2025-02-28T09:15:10.570000 +CVE-2024-13831,0,0,dc606325056ecb3af1d0abdf4906087df581d7aaf8a47f4b06428d6e01b13004,2025-02-28T09:15:10.400000 +CVE-2024-13832,0,0,ec5b2acd93db5978e9a901bf338782a10b26bfa5fce10324f0a5b3fac0b88ab1,2025-02-28T09:15:10.570000 CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 @@ -247689,7 +247689,7 @@ CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78cead CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 -CVE-2024-13851,1,1,b398a5e42cb9d7be9c1f996abecf4cac62eb034d55b15397f51759f424614a8a,2025-02-28T09:15:10.733000 +CVE-2024-13851,0,0,b398a5e42cb9d7be9c1f996abecf4cac62eb034d55b15397f51759f424614a8a,2025-02-28T09:15:10.733000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 CVE-2024-13854,0,0,b293d3f2f05083e98beb719565723791c5cf1a85fbf867f7cfec3a20f9286342,2025-02-19T08:15:21.440000 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 @@ -250879,7 +250879,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2 CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000 CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000 CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000 -CVE-2024-23222,0,0,8a89efbca457c119f6fa737db7f2bcbd7d7ae874e824e9cafa7671f30cd61ab8,2025-02-03T14:15:38.223000 +CVE-2024-23222,0,1,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000 CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000 CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000 CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000 @@ -253251,7 +253251,7 @@ CVE-2024-26302,0,0,fc5638e5f76b6239bb433ea39fb38c5e3b9f0a6c8cdf6356f010d0b303320 CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840eb2,2024-11-21T09:02:19.880000 CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000 CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000 -CVE-2024-26306,0,0,83e4e1e640fae144af2c450cc96840908601de0cd7676d33812806828ec30a15,2025-02-10T23:15:13.160000 +CVE-2024-26306,0,1,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000 CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000 CVE-2024-26308,0,0,16c5a822939dda338e35525cb9f0065373dcf06f18a2e2eeb8c290b5eb87a157,2025-02-13T18:17:19.247000 CVE-2024-26309,0,0,29b65aa638465aa8c64d469c75ef0651a7e59224972ac32d6818f20d170c6343,2024-11-21T09:02:20.667000 @@ -260922,7 +260922,7 @@ CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3 CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000 CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000 CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000 -CVE-2024-36259,0,0,a96688d95337052480524ceabbfba44b69d201b96805bc4d3d6e48fa3e5798fd,2025-02-25T19:15:14.343000 +CVE-2024-36259,0,1,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000 CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000 CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 @@ -264427,7 +264427,7 @@ CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56 CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000 CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000 -CVE-2024-40896,0,0,65e44200c8e1d56574af55a20b760c89331601d37478c8e3eb6ebbcae8e4a210,2024-12-24T03:15:06.727000 +CVE-2024-40896,0,1,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000 CVE-2024-40897,0,0,5de984c0ce0b5f00f148c2d87f9ba7398ed21388187cb055a9d01cc9ee9adfcc,2024-11-21T09:31:48.450000 CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff81c,2024-11-21T09:31:48.670000 CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000 @@ -278522,11 +278522,11 @@ CVE-2024-8415,0,0,e8d703c5be439a7b12f448c59ea16ff0dc181840132c9ef3746fdeb083d8c4 CVE-2024-8416,0,0,064686b03f2591358d01e2435bf6d0c05dabb68525db32e9554b611a0eda381c,2024-09-06T16:38:44.053000 CVE-2024-8417,0,0,ae5c46124418f1e175898401d4cd10e4ac5ab2a5760b3ada369013efaf5f9e0e,2024-11-21T09:53:11.207000 CVE-2024-8418,0,0,13014cb10bf2076fdd98d7e7307a7de55e2e6a5c70285579360946d216816d18,2024-09-17T20:15:06.710000 -CVE-2024-8420,1,1,ea5022a359dce7e54c310a8e4a463f6170d2c6e2d53163c491680ffcf3cf05d2,2025-02-28T09:15:10.910000 +CVE-2024-8420,0,0,ea5022a359dce7e54c310a8e4a463f6170d2c6e2d53163c491680ffcf3cf05d2,2025-02-28T09:15:10.910000 CVE-2024-8421,0,0,6800675b8d580f62fefe249f14070dd1be7b0d76f26f1a650e36706f5d41a8e4,2024-10-30T22:15:03.503000 CVE-2024-8422,0,0,595c3a4c4569e5d22b76db5956453d2a1a1a701b00065efde8acf9a79c387cf0,2024-10-16T18:00:10.507000 CVE-2024-8424,0,0,70e0efba1b7474fd71ae798ee933fd249d2e6d2cb69d7469e257caaac30ab429,2024-11-08T19:01:03.880000 -CVE-2024-8425,1,1,fc73b4c2c260fe21b5bc2fab7f3679ac5cb884a24671e36c961f5bb842707523,2025-02-28T09:15:11.083000 +CVE-2024-8425,0,0,fc73b4c2c260fe21b5bc2fab7f3679ac5cb884a24671e36c961f5bb842707523,2025-02-28T09:15:11.083000 CVE-2024-8427,0,0,b84207915031e0f3fd8ae31fc1649578b63ca815fcdfb9b3c22054b4863be5e4,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,16614a0b61f86dd0b83d47d6c77d8385fb4c68c4d0f570f88f7c5094d2f7b53a,2024-09-26T21:58:45.393000 CVE-2024-8429,0,0,7d7adc19f31eabcda933830e1386025bcbab9119931c58d61657c8ea833e8e43,2024-12-17T12:15:20.853000 @@ -279034,7 +279034,7 @@ CVE-2024-9011,0,0,5f917ba5d6e9e414a668fa259efdc89c2355605a5666ae5f81812d44488e6a CVE-2024-9014,0,0,220003038e0ed1cc49a0befe3090135c41cd16a5f829c2d65bd6cc8f984c0497,2024-09-26T13:32:55.343000 CVE-2024-9015,0,0,70610f66e2554a4ae6806b1835adece9ecbb77c46846bbc910eff47baf4dabd3,2025-02-11T02:15:36.640000 CVE-2024-9018,0,0,9d5f9a71065cb5737c3eb97e3b8fce2545d7a7505edc442df3224ec9cdcd8b15,2024-10-07T19:20:48.293000 -CVE-2024-9019,1,1,b0e5ef09bc954fd45f762ba11289b323f0e5567e0b4c42b4e45e1e94cd6e6eeb,2025-02-28T09:15:11.270000 +CVE-2024-9019,0,0,b0e5ef09bc954fd45f762ba11289b323f0e5567e0b4c42b4e45e1e94cd6e6eeb,2025-02-28T09:15:11.270000 CVE-2024-9020,0,0,13f7d55260c3dda01ac88411af938bbf50d791e8c741bac69665223f77a450e5,2025-01-22T15:15:14.407000 CVE-2024-9021,0,0,38ce15408413883ac2962e131e46ff98aae3d8ba8d1d410ba95b4f315f4dd5ce,2024-10-10T12:57:21.987000 CVE-2024-9022,0,0,b97de3f37f13459888a48b84864cef3e3e6492a34af924d2e6bb02f8326a41fe,2024-10-15T14:34:12.063000 @@ -279176,9 +279176,9 @@ CVE-2024-9188,0,0,5dd6784f0ddf222dfed6f3f6f8ef1425cb794ae63276e1d1603c62bc0b0fa2 CVE-2024-9189,0,0,4e8c036fffae828e6f3882cbb1531defe39b113820187b885e346d496fe1295e,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a44,2024-11-05T17:06:41.363000 CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000 -CVE-2024-9193,1,1,7aa1dbde18a2cefd1d5c7994b259059c12b9ea975239024491588fedc661ea63,2025-02-28T09:15:11.437000 +CVE-2024-9193,0,0,7aa1dbde18a2cefd1d5c7994b259059c12b9ea975239024491588fedc661ea63,2025-02-28T09:15:11.437000 CVE-2024-9194,0,0,04a4ea65d38da4fcbaabc5e2d1e4083861c0f3dd2bc313d0389a7e90a03127c9,2024-11-21T17:15:27.480000 -CVE-2024-9195,1,1,78b1fc40d9caf9991dd97fbb23b8dd02b45f5722200cffc9c47e60fc4d41061a,2025-02-28T09:15:11.633000 +CVE-2024-9195,0,0,78b1fc40d9caf9991dd97fbb23b8dd02b45f5722200cffc9c47e60fc4d41061a,2025-02-28T09:15:11.633000 CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000 CVE-2024-9197,0,0,33c1567de1a18762ef3858935357bc00f6cde05df47d6c1305df2581bf9eb8d5,2025-01-21T21:18:24.393000 CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000 @@ -280037,7 +280037,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559 CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000 CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000 CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 -CVE-2025-0395,0,0,6df13e005058690cb18139f812014ac3a4ece01730acca499bca8c01bb400d2e,2025-02-04T20:15:49.587000 +CVE-2025-0395,0,1,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000 CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000 CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000 CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000 @@ -280585,7 +280585,9 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813 CVE-2025-1293,0,0,dbd776d425a4170ebc67e8f467d76fdb1a678c6cc6717d2977a3876685bd7d30,2025-02-20T01:15:09.950000 CVE-2025-1295,0,0,675204ae0772f088026fc7f2412f8ab28c43fc8efc072775299de73d53b5b7cf,2025-02-27T06:15:21.990000 CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000 +CVE-2025-1300,1,1,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000 CVE-2025-1302,0,0,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7bf8,2025-02-15T05:15:11.683000 +CVE-2025-1319,1,1,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 CVE-2025-1332,0,0,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000 CVE-2025-1335,0,0,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000 @@ -280635,7 +280637,7 @@ CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408 CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000 CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000 CVE-2025-1412,0,0,af6752d241a9229d1b7ffcf487afc415a29cfa03072b0a3797beadd6e57308ed,2025-02-24T08:15:09.890000 -CVE-2025-1413,1,1,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000 +CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000 CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000 CVE-2025-1426,0,0,4a8cd471295100a135e3f1ec50bc3f2c2b0c11be304dbe11e606b36ac015f623,2025-02-19T20:15:36.467000 CVE-2025-1441,0,0,1a8d7925760ab15d6de1f722cbb1abd9befdb71560d55b0f11dd7282b2ec419a,2025-02-19T05:15:12.050000 @@ -280672,8 +280674,8 @@ CVE-2025-1553,0,0,3c10d6a755dcef4709f1d7b4a32da74f40ecec9ec11c525c5e38cbe72383a6 CVE-2025-1555,0,0,b87953fc659c2e74abd428dd8b83c4d989fea69643d0c4eecfbab0e6ac242e9a,2025-02-24T15:15:12.810000 CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000 CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000 -CVE-2025-1560,1,1,94ea0392f231db4bf68a65aff70aa4324f399504541076f334dc955e4571374b,2025-02-28T09:15:12.040000 -CVE-2025-1570,1,1,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e923b,2025-02-28T09:15:12.203000 +CVE-2025-1560,0,0,94ea0392f231db4bf68a65aff70aa4324f399504541076f334dc955e4571374b,2025-02-28T09:15:12.040000 +CVE-2025-1570,0,0,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e923b,2025-02-28T09:15:12.203000 CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000 CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e21124,2025-02-28T08:15:35.810000 CVE-2025-1575,0,0,4f36554ed6482f45b74d35521d78ee1f8257f79829174fda75a5bd3bf6296f94,2025-02-23T04:15:24.980000 @@ -280725,7 +280727,7 @@ CVE-2025-1644,0,0,c089c614bad147aba27db7e276630bda628e1050898eb7eafd3da256285acd CVE-2025-1645,0,0,f84c25d5345ae177afb924fbcfe7e77498beaa89bb1760e6fea90a27526a406a,2025-02-25T02:15:16.123000 CVE-2025-1646,0,0,5710e0e746a724f69e8cc150a43d0c87decff43af6a1a7566fd6006b723baac7,2025-02-25T14:15:31.320000 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 -CVE-2025-1662,1,1,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000 +CVE-2025-1662,0,0,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000 CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000 CVE-2025-1674,0,0,c9ab5cf0d854b00d30135f8d3aae01653c22e99139baff93dd6ad32b17a41d13,2025-02-28T01:30:32.830000 CVE-2025-1675,0,0,919ba4e5330550da1b3bdc08ee6fe479b5b6b92bc2456a105e1c616b57e9b557,2025-02-25T08:15:30.020000 @@ -280750,10 +280752,15 @@ CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53 CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000 CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000 CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000 +CVE-2025-1746,1,1,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000 +CVE-2025-1747,1,1,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000 +CVE-2025-1748,1,1,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000 +CVE-2025-1749,1,1,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000 CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000 CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000 CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000 CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000 +CVE-2025-1776,1,1,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -281469,6 +281476,11 @@ CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f85 CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000 CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b435e8,2025-01-31T09:15:07.167000 CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000 +CVE-2025-22270,1,1,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000 +CVE-2025-22271,1,1,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000 +CVE-2025-22272,1,1,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000 +CVE-2025-22273,1,1,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000 +CVE-2025-22274,1,1,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000 CVE-2025-22280,0,0,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000 @@ -281567,8 +281579,8 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 -CVE-2025-22491,1,1,e26a392df2afadce272fd73c1e836888f4b2c5b4ac6036088413dff6be206365,2025-02-28T09:15:12.540000 -CVE-2025-22492,1,1,e9bde4f21fb6310ad0cfe4e54a5331c3fe81f9a835d2382636a7b0f15d89bca3,2025-02-28T09:15:12.680000 +CVE-2025-22491,0,0,e26a392df2afadce272fd73c1e836888f4b2c5b4ac6036088413dff6be206365,2025-02-28T09:15:12.540000 +CVE-2025-22492,0,0,e9bde4f21fb6310ad0cfe4e54a5331c3fe81f9a835d2382636a7b0f15d89bca3,2025-02-28T09:15:12.680000 CVE-2025-22495,0,0,b69414b6cefd90565ddf9757afc00445135fb48616564da9514c4b5ad30aaa8c,2025-02-24T17:15:13.723000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 @@ -281917,7 +281929,7 @@ CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000 CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000 CVE-2025-23045,0,0,5cf9ac707be65a7cb86de834c6707744da7ff35db3dfb07c7b6442c00c475c3a,2025-01-28T16:15:40.690000 -CVE-2025-23046,0,0,ba6d497e313a00f206b016fcea77917c0b1afac20805fd9fd511025b43839b8b,2025-02-25T18:15:27.383000 +CVE-2025-23046,0,1,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000 CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000 CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16 CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000 @@ -281938,7 +281950,7 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881 CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000 CVE-2025-23081,0,0,88335d5d07bd744f2fedc19f5e2fa983c6c0a68ed633dfc146bea9e424067900,2025-02-18T22:15:18.257000 CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000 -CVE-2025-23083,0,0,6a501c0dcff9af34582fe35c519636d37da8f27378c2381b47781c6cb71c5067,2025-02-06T15:15:17.597000 +CVE-2025-23083,0,1,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000 CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000 @@ -282464,7 +282476,7 @@ CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c81 CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000 CVE-2025-24039,0,0,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000 CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000 -CVE-2025-24085,0,0,524bbded420d14c19cb8143bafa67ce3598ef2df011bf73432c1868f0e191530,2025-02-18T20:15:28.897000 +CVE-2025-24085,0,1,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 CVE-2025-24092,0,0,c2142774f8b6a5fb4fb8eae46efb7ed3d7fdb26d4474b884bc1d7f7bdbf6519a,2025-02-18T20:15:29.027000 @@ -283000,7 +283012,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef CVE-2025-25188,0,0,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000 CVE-2025-25189,0,0,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000 CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000 -CVE-2025-25192,0,0,108563f8ac44fc694a3b8629c17c93a7b18522396eddd76c881db6cda276776c,2025-02-25T18:15:27.583000 +CVE-2025-25192,0,1,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000 CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000 @@ -283239,7 +283251,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000 CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000 -CVE-2025-26465,0,0,90ca92ee391124597eed5a54a98891d38a806dd2b4300c52197477b3ccb16272,2025-02-19T15:15:18.090000 +CVE-2025-26465,0,1,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000 CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000 CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000 CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000 @@ -283431,16 +283443,16 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000 CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000 CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000 -CVE-2025-27110,0,0,7df50a11c50cb45bc21a78ad4204e1dc19268096b7d3b27e0bd7325516e8f0a2,2025-02-25T20:15:37.517000 +CVE-2025-27110,0,1,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000 CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000 CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000 CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000 CVE-2025-27135,0,0,2b4ca3a6c4bb963ede6b8510aa33d7ae3bb4bf8b75f298a6d5163ae954eac93d,2025-02-25T19:15:15.677000 CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000 -CVE-2025-27139,0,0,002a9941f02b71e35d5a1853192197580e578a7b63cc37e6d544d2ef7c2de5e8,2025-02-25T20:15:37.693000 +CVE-2025-27139,0,1,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000 CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000 CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000 -CVE-2025-27142,0,0,7c2b797a1aba57d2fb5e9b5842bb5566080c43d16d050c5870984d5322c00a79,2025-02-25T20:15:37.847000 +CVE-2025-27142,0,1,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000 CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000 CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000 CVE-2025-27145,0,0,38c5004ff48d2670f12fb99a3982f3e02a12208e5ab880775c9f41ae19934057,2025-02-25T14:15:31.567000