diff --git a/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json b/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json
index 8123c6c6e49..500b91300af 100644
--- a/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json
+++ b/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-9840",
"sourceIdentifier": "security@opentext.com",
"published": "2017-05-23T04:29:01.667",
- "lastModified": "2024-11-21T03:01:50.920",
- "vulnStatus": "Modified",
+ "lastModified": "2025-03-28T15:17:06.330",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -77,6 +77,22 @@
}
],
"configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:boost:boost:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.78.0",
+ "matchCriteriaId": "BA820824-3002-49BD-9093-3848F0B74E28"
+ }
+ ]
+ }
+ ]
+ },
{
"nodes": [
{
@@ -147,8 +163,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
}
]
}
@@ -366,243 +382,433 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2016/12/05/21",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/95131",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securitytracker.com/id/1039427",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1220",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1221",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1222",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2999",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3046",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3047",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3453",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402345",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/201701-56",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202007-54",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208112",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208113",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208115",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208144",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4246-1/",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4292-1/",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
- "source": "security@opentext.com"
+ "source": "security@opentext.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2016/12/05/21",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/95131",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securitytracker.com/id/1039427",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1220",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1221",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:1222",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2999",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3046",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3047",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:3453",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402345",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/201701-56",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202007-54",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208112",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208113",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208115",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT208144",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4246-1/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4292-1/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2020.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json
index 358b8c38c7d..eda3dec82fc 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25032",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-25T09:15:08.187",
- "lastModified": "2024-11-21T04:03:24.080",
- "vulnStatus": "Modified",
+ "lastModified": "2025-03-28T15:16:29.617",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -77,6 +77,22 @@
}
],
"configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:ruby:*:*",
+ "versionEndExcluding": "1.13.4",
+ "matchCriteriaId": "57E74758-D6C1-4C5F-B471-D4028BAEF97C"
+ }
+ ]
+ }
+ ]
+ },
{
"nodes": [
{
@@ -848,27 +864,45 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202210-42",
@@ -1052,27 +1086,45 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202210-42",
diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json
index 77620194b45..cee81e083a7 100644
--- a/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json
+++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-19751",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.323",
- "lastModified": "2024-11-21T04:35:19.033",
+ "lastModified": "2025-03-28T16:15:18.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -15,7 +15,30 @@
"value": "easyMINE antes del 5 de diciembre de 2019 se env\u00eda con claves de host SSH integradas en la imagen de instalaci\u00f3n, lo que permite ataques de intermediario y hace que la identificaci\u00f3n de todos los nodos IPv4 p\u00fablicos sea trivial con Shodan.io."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "baseScore": 5.6,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.4
+ }
+ ]
+ },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
diff --git a/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json b/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json
index 63fa3dde584..eb83c2262e9 100644
--- a/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json
+++ b/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-8745",
"sourceIdentifier": "secure@intel.com",
"published": "2020-11-12T18:15:17.300",
- "lastModified": "2024-11-21T05:39:22.207",
- "vulnStatus": "Modified",
+ "lastModified": "2025-03-28T15:19:45.743",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -328,8 +328,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
- "versionEndExcluding": "27.01.05",
- "matchCriteriaId": "D3CD5B0A-D4B1-41D2-8709-D49D927982FA"
+ "versionEndExcluding": "21.01.15",
+ "matchCriteriaId": "5AECF7C4-3FF7-4663-A49C-9DB91BA5C28E"
}
]
},
diff --git a/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json b/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json
index e66d093dabc..770b65f92af 100644
--- a/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json
+++ b/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21973",
"sourceIdentifier": "security@vmware.com",
"published": "2021-02-24T17:15:15.923",
- "lastModified": "2025-02-04T20:15:39.867",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:31:11.093",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json b/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json
index f4a32ec2dcc..0999e17dfb9 100644
--- a/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json
+++ b/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-3773",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-02-16T19:15:08.763",
- "lastModified": "2024-11-21T06:22:23.553",
+ "lastModified": "2025-03-28T15:15:41.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -209,6 +209,10 @@
"url": "https://citizenlab.ca/2024/07/vulnerabilities-in-vpns-paper-presented-at-the-privacy-enhancing-technologies-symposium-2024/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0004/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
+ },
{
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json
index d3590a73e3a..18ebebb3aef 100644
--- a/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json
+++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-46873",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-29T23:15:08.703",
- "lastModified": "2024-11-21T06:34:49.717",
+ "lastModified": "2025-03-28T16:15:20.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json b/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json
index 5fbe173bbfc..5067fdfb89f 100644
--- a/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json
+++ b/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-23334",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T16:15:08.797",
- "lastModified": "2024-11-21T06:48:25.500",
+ "lastModified": "2025-03-28T16:15:20.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-347"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-347"
+ }
+ ]
}
],
"configurations": [
@@ -111,6 +141,13 @@
"tags": [
"Broken Link"
]
+ },
+ {
+ "url": "https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json
index 8bb3ba080d1..8b65b2ae0d8 100644
--- a/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json
+++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json
@@ -2,13 +2,13 @@
"id": "CVE-2022-38329",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-13T21:15:09.537",
- "lastModified": "2025-03-21T15:15:37.740",
+ "lastModified": "2025-03-28T15:15:42.063",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
- "value": "A CSRF vulnerability in Shopxian CMS 3.0.0 could allow an unauthenticated, remote attacker to craft a malicious link, potentially causing the administrator to perform unintended actions on an affected system. The vulnerability could allow attackers to delete the specified column via index.php/contents-admin_cat-finderdel-model-ContentsCat.html?id=17."
+ "value": "A CSRF vulnerability in Shopxian CMS 3.0.0 could allow an unauthenticated, remote attacker to craft a malicious link, potentially causing the administrator to perform unintended actions on an affected system. The vulnerability could allow attackers to modify or delete specific content through crafted requests, potentially leading to data loss and system integrity issues."
},
{
"lang": "es",
diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json
index 6e5d05d3638..b2d0a9266bb 100644
--- a/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json
+++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-3990",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-02-01T07:15:10.737",
- "lastModified": "2024-11-21T07:20:41.250",
+ "lastModified": "2025-03-28T15:15:42.193",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
]
},
@@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json
index c57cf3df066..9a5bbf426d0 100644
--- a/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json
+++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4139",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-27T18:15:15.740",
- "lastModified": "2024-11-21T07:34:39.103",
+ "lastModified": "2025-03-28T16:15:25.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
]
},
diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json
index 1c1d0213685..9b2e8e64e3f 100644
--- a/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json
+++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4285",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-27T18:15:15.977",
- "lastModified": "2024-11-21T07:34:56.517",
+ "lastModified": "2025-03-28T16:15:25.633",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,13 +36,33 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json
index 4daa8852bf5..f8a1754b820 100644
--- a/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json
+++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4335",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-01-27T18:15:16.183",
- "lastModified": "2024-11-21T07:35:04.653",
+ "lastModified": "2025-03-28T15:15:42.973",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -69,6 +69,16 @@
"value": "CWE-918"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json
index 8d4873eeafa..8259e49005c 100644
--- a/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json
+++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-44298",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T14:15:11.153",
- "lastModified": "2024-11-21T07:27:51.463",
+ "lastModified": "2025-03-28T15:15:42.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json
index 246791a9726..cfd52efa876 100644
--- a/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json
+++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-44717",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T14:15:11.293",
- "lastModified": "2024-11-21T07:28:21.630",
+ "lastModified": "2025-03-28T16:15:21.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 2.5
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
+ "baseScore": 3.1,
+ "baseSeverity": "LOW",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 2.5
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-601"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json
index 37112e664de..437758d0a33 100644
--- a/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json
+++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-44718",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T14:15:11.347",
- "lastModified": "2024-11-21T07:28:21.773",
+ "lastModified": "2025-03-28T16:15:21.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 2.5
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-601"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json
index 1fbcd5d3f14..9d12452703c 100644
--- a/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json
+++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-45179",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T16:15:49.173",
- "lastModified": "2024-11-21T07:28:54.830",
+ "lastModified": "2025-03-28T16:15:21.360",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json
index d1b51668568..9cbb91006bd 100644
--- a/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json
+++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-45897",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-31T00:15:09.963",
- "lastModified": "2024-11-21T07:29:55.280",
+ "lastModified": "2025-03-28T16:15:21.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-312"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json
index 6163d30738c..f237ffdd75f 100644
--- a/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json
+++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46087",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T15:15:09.750",
- "lastModified": "2024-11-21T07:30:06.580",
+ "lastModified": "2025-03-28T16:15:21.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json
index dd908de9ebb..b16004fe363 100644
--- a/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json
+++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46356",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-01-30T08:15:07.957",
- "lastModified": "2024-11-21T07:30:27.190",
+ "lastModified": "2025-03-28T16:15:21.900",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json
index 4028d5132b2..277761ac800 100644
--- a/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json
+++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46357",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-01-30T08:15:08.087",
- "lastModified": "2024-11-21T07:30:27.317",
+ "lastModified": "2025-03-28T16:15:22.077",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json
index 78a13c6ca2f..d18e1e20466 100644
--- a/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json
+++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46358",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-01-30T08:15:08.143",
- "lastModified": "2024-11-21T07:30:27.440",
+ "lastModified": "2025-03-28T16:15:22.247",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json
index 37113ae6f95..331362f7a60 100644
--- a/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json
+++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46359",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-01-30T08:15:08.200",
- "lastModified": "2024-11-21T07:30:27.543",
+ "lastModified": "2025-03-28T16:15:22.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json
index da5a30e3fc5..c2bee63256a 100644
--- a/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json
+++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46968",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T22:15:08.853",
- "lastModified": "2024-11-21T07:31:21.537",
+ "lastModified": "2025-03-28T16:15:22.580",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json
index 0670a6da4d8..49c271566cf 100644
--- a/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json
+++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-47632",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:09.303",
- "lastModified": "2024-11-21T07:32:17.317",
+ "lastModified": "2025-03-28T16:15:22.753",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-427"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-427"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json
index 586ea30d0c5..88d273b8a28 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4794",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-30T21:15:12.553",
- "lastModified": "2024-11-21T07:35:57.293",
+ "lastModified": "2025-03-28T15:15:43.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json
index b9a7edf478b..5af71b52dbe 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48006",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T22:15:12.463",
- "lastModified": "2024-11-21T07:32:41.027",
+ "lastModified": "2025-03-28T16:15:22.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-434"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json
index bb649c39807..43a42ef8c65 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48067",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:09.763",
- "lastModified": "2024-11-21T07:32:46.853",
+ "lastModified": "2025-03-28T16:15:23.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-798"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json
index 6ac83db75e2..fa35e0c1d21 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48069",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:09.977",
- "lastModified": "2024-11-21T07:32:47.057",
+ "lastModified": "2025-03-28T16:15:23.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json
index 14a43b738e9..a9f827120de 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48070",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:10.147",
- "lastModified": "2024-11-21T07:32:47.277",
+ "lastModified": "2025-03-28T16:15:23.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json
index 4beb48b590c..57a6c72dab9 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48071",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:10.343",
- "lastModified": "2024-11-21T07:32:47.483",
+ "lastModified": "2025-03-28T16:15:23.667",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-312"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json
index 319902a7412..22944ec1f13 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48072",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:10.537",
- "lastModified": "2024-11-21T07:32:47.680",
+ "lastModified": "2025-03-28T16:15:23.823",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json
index e4f2ba1b5e2..bd18e8e27af 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48073",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T15:15:10.673",
- "lastModified": "2024-11-21T07:32:47.900",
+ "lastModified": "2025-03-28T16:15:24.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-312"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json
index 471cba5a10f..e9c5acad1c4 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48107",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T21:15:10.813",
- "lastModified": "2024-11-21T07:32:50.230",
+ "lastModified": "2025-03-28T16:15:24.193",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json
index 8ca62d5283d..0fd146f69b9 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48108",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T21:15:10.953",
- "lastModified": "2024-11-21T07:32:50.467",
+ "lastModified": "2025-03-28T16:15:24.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json
index 4fc695983dd..be5009d2896 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48116",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T20:15:14.753",
- "lastModified": "2024-11-21T07:32:52.407",
+ "lastModified": "2025-03-28T16:15:24.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json
index fc8191e61b8..e2a083bf973 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48118",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T20:15:14.867",
- "lastModified": "2024-11-21T07:32:52.550",
+ "lastModified": "2025-03-28T16:15:24.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json
index 5a0c060502f..8618eb5d5c4 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48175",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T23:15:11.393",
- "lastModified": "2024-11-21T07:32:55.190",
+ "lastModified": "2025-03-28T15:15:42.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-94"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json
index 101807ea4da..e54647bec7e 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48176",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-31T00:15:10.327",
- "lastModified": "2024-11-21T07:32:55.340",
+ "lastModified": "2025-03-28T15:15:42.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json
index 51c727a92b8..481538e81fe 100644
--- a/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json
+++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-49753",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:40.227",
- "lastModified": "2025-03-27T17:15:40.227",
+ "lastModified": "2025-03-28T16:15:24.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: Fix double increment of client_count in dma_chan_get()\n\nThe first time dma_chan_get() is called for a channel the channel\nclient_count is incorrectly incremented twice for public channels,\nfirst in balance_ref_count(), and again prior to returning. This\nresults in an incorrect client count which will lead to the\nchannel resources not being freed when they should be. A simple\n test of repeated module load and unload of async_tx on a Dell\n Power Edge R7425 also shows this resulting in a kref underflow\n warning.\n\n[ 124.329662] async_tx: api initialized (async)\n[ 129.000627] async_tx: api initialized (async)\n[ 130.047839] ------------[ cut here ]------------\n[ 130.052472] refcount_t: underflow; use-after-free.\n[ 130.057279] WARNING: CPU: 3 PID: 19364 at lib/refcount.c:28\nrefcount_warn_saturate+0xba/0x110\n[ 130.065811] Modules linked in: async_tx(-) rfkill intel_rapl_msr\nintel_rapl_common amd64_edac edac_mce_amd ipmi_ssif kvm_amd dcdbas kvm\nmgag200 drm_shmem_helper acpi_ipmi irqbypass drm_kms_helper ipmi_si\nsyscopyarea sysfillrect rapl pcspkr ipmi_devintf sysimgblt fb_sys_fops\nk10temp i2c_piix4 ipmi_msghandler acpi_power_meter acpi_cpufreq vfat\nfat drm fuse xfs libcrc32c sd_mod t10_pi sg ahci crct10dif_pclmul\nlibahci crc32_pclmul crc32c_intel ghash_clmulni_intel igb megaraid_sas\ni40e libata i2c_algo_bit ccp sp5100_tco dca dm_mirror dm_region_hash\ndm_log dm_mod [last unloaded: async_tx]\n[ 130.117361] CPU: 3 PID: 19364 Comm: modprobe Kdump: loaded Not\ntainted 5.14.0-185.el9.x86_64 #1\n[ 130.126091] Hardware name: Dell Inc. PowerEdge R7425/02MJ3T, BIOS\n1.18.0 01/17/2022\n[ 130.133806] RIP: 0010:refcount_warn_saturate+0xba/0x110\n[ 130.139041] Code: 01 01 e8 6d bd 55 00 0f 0b e9 72 9d 8a 00 80 3d\n26 18 9c 01 00 75 85 48 c7 c7 f8 a3 03 9d c6 05 16 18 9c 01 01 e8 4a\nbd 55 00 <0f> 0b e9 4f 9d 8a 00 80 3d 01 18 9c 01 00 0f 85 5e ff ff ff\n48 c7\n[ 130.157807] RSP: 0018:ffffbf98898afe68 EFLAGS: 00010286\n[ 130.163036] RAX: 0000000000000000 RBX: ffff9da06028e598 RCX: 0000000000000000\n[ 130.170172] RDX: ffff9daf9de26480 RSI: ffff9daf9de198a0 RDI: ffff9daf9de198a0\n[ 130.177316] RBP: ffff9da7cddf3970 R08: 0000000000000000 R09: 00000000ffff7fff\n[ 130.184459] R10: ffffbf98898afd00 R11: ffffffff9d9e8c28 R12: ffff9da7cddf1970\n[ 130.191596] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 130.198739] FS: 00007f646435c740(0000) GS:ffff9daf9de00000(0000)\nknlGS:0000000000000000\n[ 130.206832] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 130.212586] CR2: 00007f6463b214f0 CR3: 00000008ab98c000 CR4: 00000000003506e0\n[ 130.219729] Call Trace:\n[ 130.222192] \n[ 130.224305] dma_chan_put+0x10d/0x110\n[ 130.227988] dmaengine_put+0x7a/0xa0\n[ 130.231575] __do_sys_delete_module.constprop.0+0x178/0x280\n[ 130.237157] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[ 130.242652] do_syscall_64+0x5c/0x90\n[ 130.246240] ? exc_page_fault+0x62/0x150\n[ 130.250178] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 130.255243] RIP: 0033:0x7f6463a3f5ab\n[ 130.258830] Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48\n83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00\n00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89\n01 48\n[ 130.277591] RSP: 002b:00007fff22f972c8 EFLAGS: 00000206 ORIG_RAX:\n00000000000000b0\n[ 130.285164] RAX: ffffffffffffffda RBX: 000055b6786edd40 RCX: 00007f6463a3f5ab\n[ 130.292303] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 000055b6786edda8\n[ 130.299443] RBP: 000055b6786edd40 R08: 0000000000000000 R09: 0000000000000000\n[ 130.306584] R10: 00007f6463b9eac0 R11: 0000000000000206 R12: 000055b6786edda8\n[ 130.313731] R13: 0000000000000000 R14: 000055b6786edda8 R15: 00007fff22f995f8\n[ 130.320875] \n[ 130.323081] ---[ end trace eff7156d56b5cf25 ]---\n\ncat /sys/class/dma/dma0chan*/in_use would get the wrong result.\n2\n2\n2\n\nTest-by: Jie Hai "
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/142d644fd2cc059ffa042fbfb68e766433ef3afd",
diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json
index 750b8b0339a..becce0d41bf 100644
--- a/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json
+++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-49755",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:40.640",
- "lastModified": "2025-03-27T17:15:40.640",
+ "lastModified": "2025-03-28T16:15:25.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait\n\nWhile performing fast composition switch, there is a possibility that the\nprocess of ffs_ep0_write/ffs_ep0_read get into a race condition\ndue to ep0req being freed up from functionfs_unbind.\n\nConsider the scenario that the ffs_ep0_write calls the ffs_ep0_queue_wait\nby taking a lock &ffs->ev.waitq.lock. However, the functionfs_unbind isn't\nbounded so it can go ahead and mark the ep0req to NULL, and since there\nis no NULL check in ffs_ep0_queue_wait we will end up in use-after-free.\n\nFix this by making a serialized execution between the two functions using\na mutex_lock(ffs->mutex)."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/6a19da111057f69214b97c62fb0ac59023970850",
diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json
index f2093f5111b..2bbe31cfab1 100644
--- a/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json
+++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-49761",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:41.407",
- "lastModified": "2025-03-27T17:15:41.407",
+ "lastModified": "2025-03-28T16:15:25.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: always report error in run_one_delayed_ref()\n\nCurrently we have a btrfs_debug() for run_one_delayed_ref() failure, but\nif end users hit such problem, there will be no chance that\nbtrfs_debug() is enabled. This can lead to very little useful info for\ndebugging.\n\nThis patch will:\n\n- Add extra info for error reporting\n Including:\n * logical bytenr\n * num_bytes\n * type\n * action\n * ref_mod\n\n- Replace the btrfs_debug() with btrfs_err()\n\n- Move the error reporting into run_one_delayed_ref()\n This is to avoid use-after-free, the @node can be freed in the caller.\n\nThis error should only be triggered at most once.\n\nAs if run_one_delayed_ref() failed, we trigger the error message, then\ncausing the call chain to error out:\n\nbtrfs_run_delayed_refs()\n`- btrfs_run_delayed_refs()\n `- btrfs_run_delayed_refs_for_head()\n `- run_one_delayed_ref()\n\nAnd we will abort the current transaction in btrfs_run_delayed_refs().\nIf we have to run delayed refs for the abort transaction,\nrun_one_delayed_ref() will just cleanup the refs and do nothing, thus no\nnew error messages would be output."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/18bd1c9c02e64a3567f90c83c2c8b855531c8098",
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json
index eff0a043548..b32a8e2b0f5 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0569",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-01-29T17:15:08.633",
- "lastModified": "2024-11-21T07:37:25.190",
+ "lastModified": "2025-03-28T16:15:26.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -64,7 +64,7 @@
"weaknesses": [
{
"source": "security@huntr.dev",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -123,6 +123,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://huntr.com/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json
index 1581b33ca99..a7b2069c424 100644
--- a/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json
+++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-22324",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-01-30T07:15:09.767",
- "lastModified": "2024-11-21T07:44:31.870",
+ "lastModified": "2025-03-28T15:15:43.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json
index 043107b67d4..63e0105ba3a 100644
--- a/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json
+++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-22333",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-01-30T07:15:10.227",
- "lastModified": "2024-11-21T07:44:34.950",
+ "lastModified": "2025-03-28T16:15:26.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json b/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json
index dbe2f95f5fb..f720b3ca3d3 100644
--- a/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json
+++ b/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-23151",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-26T21:18:13.607",
- "lastModified": "2024-11-21T07:45:54.170",
+ "lastModified": "2025-03-28T15:15:43.443",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.2
}
]
},
@@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-404"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json
index bc29acb5f90..26c1fdbfd30 100644
--- a/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json
+++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24065",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-29T22:15:09.047",
- "lastModified": "2024-11-21T07:47:21.830",
+ "lastModified": "2025-03-28T16:15:26.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json
index 46b47dd3c33..aeb9cf39e0a 100644
--- a/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json
+++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24531",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T20:15:05.270",
- "lastModified": "2024-11-21T07:48:04.190",
+ "lastModified": "2025-03-28T15:15:43.630",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -79,6 +79,10 @@
{
"url": "https://pkg.go.dev/vuln/GO-2024-2962",
"source": "af854a3a-2127-422b-91ae-364da2661108"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0005/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json
index 95b31d7e5db..4f3f713ec29 100644
--- a/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json
+++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24612",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T03:15:09.557",
- "lastModified": "2024-11-21T07:48:14.320",
+ "lastModified": "2025-03-28T16:15:26.820",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json
index 4ae1f3773d9..3ee3eef039c 100644
--- a/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json
+++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24622",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T05:15:10.307",
- "lastModified": "2024-11-21T07:48:15.090",
+ "lastModified": "2025-03-28T15:15:43.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-918"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json
index 9eed004b64c..3efb383b6ad 100644
--- a/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json
+++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24623",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-30T05:15:10.373",
- "lastModified": "2024-11-21T07:48:15.237",
+ "lastModified": "2025-03-28T15:15:43.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-918"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json
index 54a8856b9de..994b60bc28f 100644
--- a/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json
+++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24830",
"sourceIdentifier": "security@apache.org",
"published": "2023-01-30T17:15:09.987",
- "lastModified": "2024-11-21T07:48:28.877",
+ "lastModified": "2025-03-28T15:15:44.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -36,13 +36,33 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json
index b39c6a58b4d..dbeabcec963 100644
--- a/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json
+++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-52931",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:42.800",
- "lastModified": "2025-03-27T17:15:42.800",
+ "lastModified": "2025-03-28T16:15:27.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Avoid potential vm use-after-free\n\nAdding the vm to the vm_xa table makes it visible to userspace, which\ncould try to race with us to close the vm. So we need to take our extra\nreference before putting it in the table.\n\n(cherry picked from commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4)"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d",
diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json
index 80bd7ecab51..e40d455e63d 100644
--- a/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json
+++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-52935",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:43.330",
- "lastModified": "2025-03-27T17:15:43.330",
+ "lastModified": "2025-03-28T16:15:27.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/khugepaged: fix ->anon_vma race\n\nIf an ->anon_vma is attached to the VMA, collapse_and_free_pmd() requires\nit to be locked.\n\nPage table traversal is allowed under any one of the mmap lock, the\nanon_vma lock (if the VMA is associated with an anon_vma), and the\nmapping lock (if the VMA is associated with a mapping); and so to be\nable to remove page tables, we must hold all three of them. \nretract_page_tables() bails out if an ->anon_vma is attached, but does\nthis check before holding the mmap lock (as the comment above the check\nexplains).\n\nIf we racily merged an existing ->anon_vma (shared with a child\nprocess) from a neighboring VMA, subsequent rmap traversals on pages\nbelonging to the child will be able to see the page tables that we are\nconcurrently removing while assuming that nothing else can access them.\n\nRepeat the ->anon_vma check once we hold the mmap lock to ensure that\nthere really is no concurrent page table access.\n\nHitting this bug causes a lockdep warning in collapse_and_free_pmd(),\nin the line \"lockdep_assert_held_write(&vma->anon_vma->root->rwsem)\". \nIt can also lead to use-after-free access."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/023f47a8250c6bdb4aebe744db4bf7f73414028b",
diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json
index a1ffb1e1e51..39e830f91dc 100644
--- a/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json
+++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-53003",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:49.170",
- "lastModified": "2025-03-27T17:15:49.170",
+ "lastModified": "2025-03-28T16:15:27.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info\n\nThe memory for llcc_driv_data is allocated by the LLCC driver. But when\nit is passed as the private driver info to the EDAC core, it will get freed\nduring the qcom_edac driver release. So when the qcom_edac driver gets probed\nagain, it will try to use the freed data leading to the use-after-free bug.\n\nHence, do not pass llcc_driv_data as pvt_info but rather reference it\nusing the platform_data pointer in the qcom_edac driver."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/66e10d5f399629ef7877304d9ba2b35d0474e7eb",
diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json
index 789e21bdc89..55e52420c62 100644
--- a/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json
+++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-0041",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:51.253",
- "lastModified": "2024-12-16T14:47:50.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-03-28T16:15:27.517",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@@ -69,6 +69,16 @@
"value": "CWE-362"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json
index 5d71287ca96..0dfb64a2b50 100644
--- a/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json
+++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-0904",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-06T06:15:06.937",
- "lastModified": "2024-11-21T08:47:40.290",
+ "lastModified": "2025-03-28T16:15:27.737",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -15,7 +15,30 @@
"value": "El complemento Fancy Product Designer de WordPress anterior a 6.1.81 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en la configuraci\u00f3n de multisitio)."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 5.2
+ }
+ ]
+ },
"references": [
{
"url": "https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/",
diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json
index 49855ed1c4a..8db7a4354c5 100644
--- a/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json
+++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-1067",
"sourceIdentifier": "arm-security@arm.com",
"published": "2024-05-03T14:15:10.813",
- "lastModified": "2025-03-27T15:15:48.533",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:24:03.043",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,16 +49,65 @@
"value": "CWE-416"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "r41p0",
+ "versionEndExcluding": "r48p0",
+ "matchCriteriaId": "1671B7FC-A8FB-491B-A7E2-822DD2C1C442"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "r41p0",
+ "versionEndExcluding": "r48p0",
+ "matchCriteriaId": "0B344028-CCEB-4934-8651-383C681AA347"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "r41p0",
+ "versionEndExcluding": "r48p0",
+ "matchCriteriaId": "AA1C069D-1CFA-443E-A0C7-EBF97223F770"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
- "source": "arm-security@arm.com"
+ "source": "arm-security@arm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json
index e3c66b73414..a0538f4d508 100644
--- a/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json
+++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-11621",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-02-10T14:15:29.490",
- "lastModified": "2025-02-10T16:15:36.937",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:20:47.230",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,67 @@
"value": "CWE-295"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2024.3.2.9",
+ "matchCriteriaId": "CDD63147-B8F0-4E3A-B918-4E48099C59C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:iphone_os:*:*",
+ "versionEndExcluding": "2024.3.4.0",
+ "matchCriteriaId": "28CF225A-4283-4E40-8C8E-A96F876FBC0F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:android:*:*",
+ "versionEndExcluding": "2024.3.4.2",
+ "matchCriteriaId": "BFF11BD1-8E0E-4C36-BE92-1021A528A52E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:macos:*:*",
+ "versionEndExcluding": "2024.3.10.3",
+ "matchCriteriaId": "3CCF282D-0E3B-4AD1-8327-550CA6E3F3A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager_powershell:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.7",
+ "matchCriteriaId": "7A58AC78-3998-411F-8935-EE6AE0C13E55"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0001/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json
index ef03b08bceb..778a688d29d 100644
--- a/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json
+++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-11670",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-11-25T15:15:05.557",
- "lastModified": "2024-11-25T16:15:12.173",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:03.903",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,50 @@
"value": "CWE-863"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndIncluding": "2024.3.10.0",
+ "matchCriteriaId": "58D38621-06C0-4360-BE8C-87B538EACFE6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndIncluding": "2024.3.10.0",
+ "matchCriteriaId": "D92F47DE-04CB-4CA8-83AC-1B84661419BB"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0015",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory",
+ "Not Applicable"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json
index bfb380c5d39..819ec1ccc6c 100644
--- a/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json
+++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-11671",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-11-25T15:15:07.040",
- "lastModified": "2024-11-25T17:15:11.930",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:57.537",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,49 @@
"value": "CWE-287"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.3.18.0",
+ "matchCriteriaId": "1AA7A62B-3DCF-432D-8ED8-9B52DE2E68B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.3.18.0",
+ "matchCriteriaId": "6C258D8A-A9D0-4A10-80B3-79CE491B8344"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0016",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json
index 102f49bced2..2f6dda4e63b 100644
--- a/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json
+++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-11672",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-11-25T15:15:07.180",
- "lastModified": "2024-11-25T17:15:12.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:52.263",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,49 @@
"value": "CWE-863"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.3.10.0",
+ "matchCriteriaId": "53809D50-22E9-48E9-99A7-11B4E8FAC8AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.3.10.0",
+ "matchCriteriaId": "34028922-82CE-4A14-9492-DBB4FC8D49EF"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0016",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json
index 8f5d5810809..6e6d0d5c0b8 100644
--- a/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json
+++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12148",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-12-04T18:15:12.003",
- "lastModified": "2024-12-05T19:15:07.473",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:20.900",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-863"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.7.0",
+ "matchCriteriaId": "4C28C033-192A-442A-858D-FCB64949E8F2"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0017",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json
index 2ea941c61f7..108547971d9 100644
--- a/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json
+++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12149",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-12-04T18:15:12.350",
- "lastModified": "2024-12-05T19:15:07.627",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:47.753",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,49 @@
"value": "CWE-732"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.3.20.0",
+ "matchCriteriaId": "1BD9E9B5-563A-42D6-9EE1-69EF8C8E92C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.3.20.0",
+ "matchCriteriaId": "23586AA8-B192-420B-91EE-DBC5792A1A70"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0017",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json
index a5cbbe2dfb2..029af4d64c5 100644
--- a/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json
+++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12151",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-12-04T18:15:12.850",
- "lastModified": "2024-12-05T19:15:07.773",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:18.057",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-732"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.9.0",
+ "matchCriteriaId": "DA97BDA3-41D4-4AE1-854B-BFF4D5FADF27"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0017",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json
index 31a6dfa8024..802d264044a 100644
--- a/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json
+++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12196",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-12-04T18:15:13.173",
- "lastModified": "2024-12-04T21:15:21.090",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:14.803",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-863"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.8.0",
+ "matchCriteriaId": "B7EA3081-29D8-42F0-9C0D-5936F60E3108"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0017",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json
index 2bf5e6d96b1..fc8c35c55ce 100644
--- a/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json
+++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12969",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-26T23:15:05.600",
- "lastModified": "2024-12-27T17:15:07.993",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:59:21.010",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -124,30 +144,70 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://code-projects.org/",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_SQLi.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.289334",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.289334",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.469031",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_SQLi.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json
index c085524ede2..0bc735fdb7a 100644
--- a/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json
+++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12976",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-27T02:15:06.063",
- "lastModified": "2024-12-27T19:15:08.000",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:46:04.210",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D7CB92F-609E-4807-A613-7AA413460314"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/nexus-wkx/CVE/blob/main/SQL_Injection_in_Hospital_Management_System.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.289352",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.289352",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.469072",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/nexus-wkx/CVE/blob/main/SQL_Injection_in_Hospital_Management_System.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json
index f33c5d61693..67fefe60b85 100644
--- a/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json
+++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-12983",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-27T07:15:11.180",
- "lastModified": "2024-12-27T16:15:23.683",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:44:14.160",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -80,6 +80,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
+ "baseScore": 5.2,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 4.2
}
],
"cvssMetricV2": [
@@ -122,32 +142,82 @@
"value": "CWE-94"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D7CB92F-609E-4807-A613-7AA413460314"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://code-projects.org/",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_XSS.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.289359",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.289359",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?submit.469215",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_XSS.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json
index f6b09fa5581..d550d5c8644 100644
--- a/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json
+++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-13497",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-15T05:15:45.713",
- "lastModified": "2025-03-15T05:15:45.713",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T15:22:59.280",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
}
]
},
@@ -49,20 +69,57 @@
"value": "CWE-80"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tripetto:tripetto:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "8.0.10",
+ "matchCriteriaId": "881B126F-8C5E-4D36-A358-9957A90BC27D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/tripetto/trunk/lib/attachments.php#L46",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3251202%40tripetto%2Ftrunk&old=3231968%40tripetto%2Ftrunk&sfp_email=&sfph_mail=",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbbe006c-1afc-4c8b-a9f3-ffb21cdabb54?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json
index e0edb2e8483..08684190b8f 100644
--- a/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json
+++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-13771",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T12:15:13.693",
- "lastModified": "2025-03-27T01:27:47.273",
+ "lastModified": "2025-03-28T16:18:52.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@@ -90,9 +90,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*",
+ "criteria": "cpe:2.3:a:uxper:civi:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
- "matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2"
+ "matchCriteriaId": "FF63574D-F8E6-4F90-8397-9E27E3E7239A"
}
]
}
diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json
index 5cb5ec7c82a..5e16bf56333 100644
--- a/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json
+++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-13772",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T12:15:13.907",
- "lastModified": "2025-03-27T01:22:24.920",
+ "lastModified": "2025-03-28T16:19:00.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@@ -90,9 +90,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*",
+ "criteria": "cpe:2.3:a:uxper:civi:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
- "matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2"
+ "matchCriteriaId": "FF63574D-F8E6-4F90-8397-9E27E3E7239A"
}
]
}
diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json
index d7ed56f45ab..faff28bcd43 100644
--- a/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json
+++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-13939",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-03-28T03:15:15.720",
- "lastModified": "2025-03-28T03:15:15.720",
+ "lastModified": "2025-03-28T15:15:44.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,30 @@
"value": "String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.\n\nAs stated in the documentation: \"If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents).\"\n\nThis is similar to\u00a0CVE-2020-36829"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json
index 10ed1e9e8ed..82b3293a9ea 100644
--- a/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json
+++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-1588",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-08T05:15:07.710",
- "lastModified": "2025-03-27T16:15:21.190",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:18:52.937",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -39,14 +39,52 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pressified:sendpress:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.23.11.6",
+ "matchCriteriaId": "067F2805-85F7-4309-A837-9BA03C1BDE8E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json
index f3df14b37a0..1968a861259 100644
--- a/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json
+++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-1764",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-05T22:15:46.947",
- "lastModified": "2024-12-04T16:15:24.527",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:19.423",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,16 +49,50 @@
"value": "CWE-269"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.3.16.0",
+ "matchCriteriaId": "A94A8DBC-41A8-42B9-8DC9-7FA298A076DF"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json
index fbf271124e3..fa07ad70031 100644
--- a/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json
+++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-1900",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-05T22:15:47.060",
- "lastModified": "2024-11-21T08:51:33.443",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:15.220",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -39,14 +39,50 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-613"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.3.16.0",
+ "matchCriteriaId": "960AC5BA-C623-415A-967E-E6E8E5F3A17C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json
index 414979e451c..b318d49dc5a 100644
--- a/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json
+++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-1901",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-05T22:15:47.103",
- "lastModified": "2024-11-21T08:51:33.640",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:10.993",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -39,14 +39,50 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.3.16.0",
+ "matchCriteriaId": "960AC5BA-C623-415A-967E-E6E8E5F3A17C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0002",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json
index bda97d6fde0..63c4628f988 100644
--- a/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json
+++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-20672",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-01-09T18:15:50.243",
- "lastModified": "2024-11-21T08:52:53.400",
+ "lastModified": "2025-03-28T15:15:44.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
@@ -103,6 +103,10 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0006/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json
index db1955ac27a..23781da4b3d 100644
--- a/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json
+++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-26574",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T12:15:08.167",
- "lastModified": "2024-11-21T09:02:34.080",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:01:24.697",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,22 +51,51 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wondershare:filmora:13.0.51:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC306161-FB6B-4B00-9F8B-19EA3E1131FF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://filmora.wondershare.com/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Alaatk/CVE-2024-26574/tree/main",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://filmora.wondershare.com/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Alaatk/CVE-2024-26574/tree/main",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json
index d715aeb9c65..65a9ca14254 100644
--- a/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json
+++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-26641",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:11.193",
- "lastModified": "2025-03-10T16:59:54.610",
+ "lastModified": "2025-03-28T16:17:08.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@@ -232,8 +232,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "DEAA16D1-1E27-4128-BA14-5A0C59340EAA"
+ "criteria": "cpe:2.3:o:netapp:fas9500_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C087FDD-57EF-48A4-BE07-DE04FFEDDAAD"
}
]
},
@@ -243,8 +243,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:netapp:a9500:*:*:*:*:*:*:*:*",
- "matchCriteriaId": "002F31D0-96E3-495F-8F86-7C9190F20248"
+ "criteria": "cpe:2.3:h:netapp:fas9500:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F966AE6C-149E-4690-9CE0-60D2FB47A096"
}
]
}
diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json
index 7d71aa2b363..a5a9daa2429 100644
--- a/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json
+++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-27622",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T14:15:49.030",
- "lastModified": "2024-11-21T09:04:48.827",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:05:54.780",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -55,26 +55,68 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB09A515-0F41-407D-AD7B-908F4341358A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55BFD129-4009-4D56-B161-EA6135366AC0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/capture0x/CMSMadeSimple/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/capture0x/CMSMadeSimple/",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "VDB Entry"
+ ]
},
{
"url": "https://www.vicarius.io/vsociety/posts/pwning-cmsms-via-user-defined-tags-for-fun-and-learning-cve-2024-27622-27623",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json
index 0de0d8764bf..fdc6266f8c7 100644
--- a/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json
+++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-27623",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T14:15:49.117",
- "lastModified": "2024-11-21T09:04:49.047",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:07:47.727",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB09A515-0F41-407D-AD7B-908F4341358A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/capture0x/CMSMadeSimple2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/capture0x/CMSMadeSimple2",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.vicarius.io/vsociety/posts/pwning-cmsms-via-user-defined-tags-for-fun-and-learning-cve-2024-27622-27623",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json
index e00b13e337a..8e3a0e29dde 100644
--- a/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json
+++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-27625",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T14:15:49.160",
- "lastModified": "2024-11-21T09:04:49.267",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:07:53.420",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB09A515-0F41-407D-AD7B-908F4341358A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "VDB Entry"
+ ]
},
{
"url": "https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json
index 67bd5680e37..a8728cbe496 100644
--- a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json
+++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-29275",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T05:15:47.583",
- "lastModified": "2024-11-21T09:07:54.473",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:51:45.747",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/seacms-net/CMS/issues/15",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/seacms-net/CMS/issues/15",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json
index 0a3d1e735d8..e5ae0935252 100644
--- a/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json
+++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-29469",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T21:15:32.267",
- "lastModified": "2024-11-21T09:08:03.500",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:45:49.587",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zhyd:oneblog:2.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1921A08D-927A-4839-8A7D-0DFE32560056"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json
index 8c2479940ba..f3353da9507 100644
--- a/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json
+++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-29470",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T21:15:32.323",
- "lastModified": "2024-11-21T09:08:03.713",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:48:37.833",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zhyd:oneblog:2.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1921A08D-927A-4839-8A7D-0DFE32560056"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json
index b2a9216161c..2426f3d9d7a 100644
--- a/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json
+++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-29474",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T21:15:32.523",
- "lastModified": "2024-11-21T09:08:04.493",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:48:47.957",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zhyd:oneblog:2.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1921A08D-927A-4839-8A7D-0DFE32560056"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json
index 56359732f6b..16310538307 100644
--- a/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json
+++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-2918",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-04-09T19:15:38.370",
- "lastModified": "2024-11-21T09:10:50.213",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:20:56.060",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -39,14 +39,50 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.1.11.0",
+ "matchCriteriaId": "D3589B6C-8479-4575-BB85-12A7F35AFDCC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0006",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0006",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json
index ffeaf3709f0..3eae808822b 100644
--- a/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json
+++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-2921",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-03-26T16:15:14.173",
- "lastModified": "2024-11-21T09:10:50.660",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:04.050",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.1.8.0",
+ "matchCriteriaId": "0E78FB63-33B2-499B-9BB1-DE3EE1767E01"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0005",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0005",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json
index e68b7544ce3..b537925667d 100644
--- a/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json
+++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-30565",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-04T08:15:07.153",
- "lastModified": "2024-11-21T09:12:11.230",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:52:54.670",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/SeaCMS_v.12.9.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/SeaCMS_v.12.9.md",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json
index 59985495705..b9f53e35618 100644
--- a/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json
+++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-31666",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T18:15:07.887",
- "lastModified": "2025-03-26T21:15:22.100",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:00:36.103",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:flusity:flusity:2.33:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B6B6ED7-B93A-4853-9D83-40BCD781342C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/hapa3/cms/blob/main/1.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/hapa3/cms/blob/main/1.md",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json
index 9cc9ee2d67e..caaf55e3bc7 100644
--- a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json
+++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-3545",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-04-09T19:15:41.380",
- "lastModified": "2024-11-21T09:29:50.790",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:20:52.220",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,50 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.1.9.0",
+ "matchCriteriaId": "2C6B1BE5-9C13-4FB3-9FD9-5C07895EB64A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.1.21.0",
+ "matchCriteriaId": "A0A4A4C4-D82F-482A-BD3B-C81751B7B7AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.1.21.0",
+ "matchCriteriaId": "7B36BC3F-784D-4AC7-9224-6CD59EC6AC6F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0006",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0006",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json
new file mode 100644
index 00000000000..64b57ccad61
--- /dev/null
+++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2024-39311",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2025-03-28T15:15:44.647",
+ "lastModified": "2025-03-28T16:15:27.900",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 1.8,
+ "baseSeverity": "LOW",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "ACTIVE",
+ "vulnConfidentialityImpact": "NONE",
+ "vulnIntegrityImpact": "NONE",
+ "vulnAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "LOW",
+ "subIntegrityImpact": "LOW",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "PROOF_OF_CONCEPT",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json
index 3e1de28169f..0b298159df4 100644
--- a/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json
+++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-42598",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-20T16:15:11.727",
- "lastModified": "2024-08-22T18:15:10.187",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:53:29.593",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E86E61D7-442D-43D0-845F-B7858A4F2B4E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gitee.com/fushuling/cve/blob/master/CVE-2024-42598.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_editplayer.php%20code%20injection.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json
index d25f208dff1..55a33ebbb4c 100644
--- a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json
+++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43484",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:10.633",
- "lastModified": "2024-10-21T17:35:44.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-03-28T15:15:44.823",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
- "type": "Primary",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
@@ -631,6 +631,10 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0007/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json
index 60120ea4387..8c6bc05e03b 100644
--- a/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json
+++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-4317",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-05-14T15:43:16.473",
- "lastModified": "2025-02-12T16:17:31.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-03-28T15:15:45.250",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@@ -123,6 +123,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0001/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
+ },
{
"url": "https://www.postgresql.org/support/security/CVE-2024-4317/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json
index 0fa62d03023..d6fe5af5a3a 100644
--- a/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json
+++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-4577",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T20:15:09.550",
- "lastModified": "2025-03-21T20:18:54.330",
+ "lastModified": "2025-03-28T15:12:44.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@@ -87,6 +87,7 @@
],
"configurations": [
{
+ "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -114,6 +115,17 @@
"matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
}
]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
}
]
},
diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json
new file mode 100644
index 00000000000..26b27ca1952
--- /dev/null
+++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json
@@ -0,0 +1,25 @@
+{
+ "id": "CVE-2024-48615",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2025-03-28T15:15:45.023",
+ "lastModified": "2025-03-28T15:15:45.023",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Null Pointer Dereference vulnerability in libarchive 3.7.6 and earlier when running program bsdtar in function header_pax_extension at rchive_read_support_format_tar.c:1844:8."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/88Sanghy88/crash-test",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/libarchive/libarchive/releases/download/v3.7.6/libarchive-3.7.6.tar.gz",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json
index d5d0e409a4c..2d61106d5e8 100644
--- a/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json
+++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-4846",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-06-25T13:15:50.120",
- "lastModified": "2024-11-21T09:43:43.533",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:26.443",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.1.15.0",
+ "matchCriteriaId": "F5ED1D6E-CB0B-42BD-8580-A3C7F55F5499"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0009",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0009",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json
index 5319dfd3e6c..71f62f117ef 100644
--- a/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json
+++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-5072",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-05-17T16:15:08.300",
- "lastModified": "2024-11-21T09:46:54.310",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:30.187",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -39,14 +39,50 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.1.12.0",
+ "matchCriteriaId": "E2815D8D-64A2-4765-B1D8-FD2B85F1388A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0007",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0007",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json
new file mode 100644
index 00000000000..85c75cf7db1
--- /dev/null
+++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2024-51624",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:45.393",
+ "lastModified": "2025-03-28T15:15:45.393",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos J\u00e1-J\u00e1 Pagamentos for WooCommerce allows Reflected XSS. This issue affects J\u00e1-J\u00e1 Pagamentos for WooCommerce: from n/a through 1.3.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/wc-ja-ja-pagamentos-multicaixa-express/vulnerability/wordpress-ja-ja-pagamentos-for-woocommerce-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json
index 25797dbf119..9ece459c891 100644
--- a/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json
+++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-53438",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T17:15:10.857",
- "lastModified": "2025-02-03T19:15:12.633",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:39:27.213",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@@ -40,6 +60,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@@ -51,14 +81,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:churchcrm:churchcrm:5.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9531F85-4051-48B3-B092-C2E13496FEDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/6988",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/advisories/GHSA-gr5x-8j97-qq23",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json
index 3fcb01dfaaf..189e3f5c45b 100644
--- a/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json
+++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-54085",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2025-03-11T14:15:22.893",
- "lastModified": "2025-03-11T14:15:22.893",
+ "lastModified": "2025-03-28T15:15:45.540",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -77,6 +77,10 @@
{
"url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "biossecurity@ami.com"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0003/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json
index 1e73c001f1b..0cf5fc19cfe 100644
--- a/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json
+++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-54181",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-30T14:15:05.867",
- "lastModified": "2024-12-30T14:15:05.867",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:32:40.990",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,42 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:websphere_automation:1.7.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "698AA3DD-7377-4B1F-B5C2-93D1A6328A2E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179994",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json
new file mode 100644
index 00000000000..69a2681a503
--- /dev/null
+++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2024-54291",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:45.663",
+ "lastModified": "2025-03-28T15:15:45.663",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound PluginPass allows Manipulating Web Input to File System Calls. This issue affects PluginPass: from n/a through 0.9.10."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/pluginpass-pro-plugintheme-licensing/vulnerability/wordpress-pluginpass-plugin-0-9-10-arbitrary-file-download-delete-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json b/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json
new file mode 100644
index 00000000000..bd661bfcc99
--- /dev/null
+++ b/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2024-54362",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:45.827",
+ "lastModified": "2025-03-28T15:15:45.827",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Path Traversal vulnerability in NotFound GetShop ecommerce allows Path Traversal. This issue affects GetShop ecommerce: from n/a through 1.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-35"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/getshop-ecommerce/vulnerability/wordpress-getshop-ecommerce-plugin-1-3-path-traversal-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json
index 81c6eb4d0dc..811606e155d 100644
--- a/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json
+++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-54954",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-10T18:15:29.663",
- "lastModified": "2025-02-26T19:15:22.440",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:49:01.760",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zhyd:oneblog:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.3.6",
+ "matchCriteriaId": "3351098F-DF38-4603-B963-CAD3076357E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gist.github.com/kaoniniang2/03658cc78e789b992b378f4951bedfb7",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://gitee.com/yadong.zhang/DBlog/issues/IB6552",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory",
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json
index daddc77b18c..0571ea04cba 100644
--- a/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json
+++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55100",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-16T21:15:08.427",
- "lastModified": "2024-12-17T17:15:09.497",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:25:16.377",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55100-Online-Nurse-Hiring-System-v1.0-Stored-Cross-Site-Scripting-Vulnerability.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55100-Online-Nurse-Hiring-System-v1.0-Stored-Cross-Site-Scripting-Vulnerability.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json
index e847da6a8bb..45a95ee0a4e 100644
--- a/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json
+++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55103",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-16T21:15:08.553",
- "lastModified": "2024-12-17T18:15:25.260",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:26:07.910",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55103-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55103-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json
index 1818d18de73..495e0d699bf 100644
--- a/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json
+++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55104",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-16T21:15:08.670",
- "lastModified": "2024-12-17T18:15:25.460",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:31:25.177",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55104-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55104-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json
index e8a278876e0..fcf3f44363f 100644
--- a/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json
+++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55232",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-18T22:15:07.297",
- "lastModified": "2024-12-26T20:15:22.673",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:21:59.560",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,10 +51,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpgurukul:online_notes_sharing_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "088DBBD2-4F1A-4AB7-A05C-B29801C7210F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55232.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
index 94fa5b89a01..3d353b75013 100644
--- a/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
+++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-55461",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-18T23:15:17.350",
- "lastModified": "2024-12-31T20:16:07.727",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:55:56.543",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,42 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "13.0",
+ "matchCriteriaId": "DDA09845-84CA-4C7D-82C9-FA3C113FBD15"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gitee.com/FengFu01/sea/issues/IB8S1N",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "Issue Tracking"
+ ]
},
{
"url": "https://gitee.com/FengFu01/sea/issues/IB8S1N",
- "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json
index f18c3918074..4b5ae3f2ed9 100644
--- a/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json
+++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-56171",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T22:15:12.797",
- "lastModified": "2025-02-18T23:15:09.413",
+ "lastModified": "2025-03-28T15:15:46.003",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -55,6 +55,10 @@
{
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828",
"source": "cve@mitre.org"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0010/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json
index 9a1cb69742e..d841c2e5475 100644
--- a/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json
+++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6055",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-06-17T13:15:53.697",
- "lastModified": "2024-11-21T09:48:51.270",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:23:27.830",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.2.8.0",
+ "matchCriteriaId": "9247C19E-9E89-4461-9AE9-42B88673695A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.2.8.0",
+ "matchCriteriaId": "7C30D082-C93E-4F6D-85F2-A6384F879063"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0008",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0008",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json
index 249efb5eeaf..96be6badee1 100644
--- a/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json
+++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6057",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-06-17T13:15:53.800",
- "lastModified": "2024-11-21T09:48:51.630",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:23:36.887",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.1.32.0",
+ "matchCriteriaId": "21E7A6A4-F1FE-4909-97E0-06276301127E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.1.32.0",
+ "matchCriteriaId": "036BC9F3-DD31-4F1D-AED1-D50828FD0E56"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0008",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0008",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json
index 04a917c96bd..856273cba33 100644
--- a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json
+++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6354",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-06-26T17:15:27.497",
- "lastModified": "2025-03-13T19:15:49.370",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:19:33.260",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.2.12.0",
+ "matchCriteriaId": "FBA312E3-411A-439F-BD23-8C8B22A5BE0E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.2.12.0",
+ "matchCriteriaId": "2CD07B0A-8CB9-4FAF-A330-58533C04D56B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0010",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0010",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json
index 763c5a2caaa..1cea6fadc26 100644
--- a/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json
+++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6492",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-07-16T19:15:13.567",
- "lastModified": "2024-11-21T09:49:44.590",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:07.177",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,14 +51,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.2.15.0",
+ "matchCriteriaId": "5E75DB23-4F3C-4D19-AA97-9D6219095839"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.2.15.0",
+ "matchCriteriaId": "F124F443-8055-4A8F-9F48-DEB4772805D4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0012",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0012",
- "source": "af854a3a-2127-422b-91ae-364da2661108"
+ "source": "af854a3a-2127-422b-91ae-364da2661108",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json
index 245d246efad..d1a0bd6708e 100644
--- a/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json
+++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-8176",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-14T09:15:14.157",
- "lastModified": "2025-03-17T17:15:36.167",
+ "lastModified": "2025-03-28T15:15:46.157",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -88,6 +88,10 @@
"url": "https://security-tracker.debian.org/tracker/CVE-2024-8176",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0009/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
+ },
{
"url": "https://ubuntu.com/security/CVE-2024-8176",
"source": "af854a3a-2127-422b-91ae-364da2661108"
diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json
index 8abf53605a1..40322ebd43a 100644
--- a/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json
+++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1193",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-02-10T14:15:30.107",
- "lastModified": "2025-02-10T18:15:34.273",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:20:35.580",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,49 @@
"value": "CWE-295"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.3.20.0",
+ "matchCriteriaId": "1BD9E9B5-563A-42D6-9EE1-69EF8C8E92C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.3.20.0",
+ "matchCriteriaId": "23586AA8-B192-420B-91EE-DBC5792A1A70"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0001/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json
index 2cc00305221..fbf4cdaf60d 100644
--- a/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json
+++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1231",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-02-11T14:15:31.130",
- "lastModified": "2025-02-11T15:15:20.643",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:09.763",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-287"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-640"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.11.0",
+ "matchCriteriaId": "6113998D-2E6C-4B73-A7AD-713F546D495E"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0002/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json
index d9e51c33b28..ecb926dba09 100644
--- a/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json
+++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1635",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-13T13:15:46.820",
- "lastModified": "2025-03-18T17:15:45.017",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:20:27.283",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,49 @@
"value": "CWE-200"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.3.31.0",
+ "matchCriteriaId": "0C146019-3232-4413-BB31-AC876E37BFE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.3.31.0",
+ "matchCriteriaId": "183673B7-2357-4FA7-98E7-32F986B65BC3"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0004/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json
index b8f283da8be..afce7f99e2d 100644
--- a/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json
+++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1636",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-13T13:15:46.970",
- "lastModified": "2025-03-18T17:15:45.263",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:20:21.163",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,49 @@
"value": "CWE-200"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
+ "versionEndExcluding": "2024.3.31.0",
+ "matchCriteriaId": "0C146019-3232-4413-BB31-AC876E37BFE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
+ "versionEndExcluding": "2024.3.31.0",
+ "matchCriteriaId": "183673B7-2357-4FA7-98E7-32F986B65BC3"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0004/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json
index 2e25414af53..fade4e55624 100644
--- a/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json
+++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-1762",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-28T06:15:32.770",
- "lastModified": "2025-03-28T06:15:32.770",
+ "lastModified": "2025-03-28T15:15:46.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,11 +11,38 @@
"value": "The Event Tickets with Ticket Scanner WordPress plugin before 2.5.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
"references": [
{
"url": "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/",
"source": "contact@wpscan.com"
+ },
+ {
+ "url": "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json
index a43b76c32da..b63c711885e 100644
--- a/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json
+++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1771",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-15T05:15:47.253",
- "lastModified": "2025-03-15T05:15:47.253",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T15:05:47.470",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,16 +49,50 @@
"value": "CWE-98"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.1.9",
+ "matchCriteriaId": "7109F257-C617-40B4-8187-FF273299E9B8"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://travelerwp.com/traveler-changelog/",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/da3e3d6c-7643-4f22-aa88-2c4ce80aed1f?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json
index a146b1c983e..a5502985798 100644
--- a/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json
+++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-1773",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-15T05:15:47.403",
- "lastModified": "2025-03-15T05:15:47.403",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T15:02:33.313",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -49,16 +69,50 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.1.9",
+ "matchCriteriaId": "7109F257-C617-40B4-8187-FF273299E9B8"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://travelerwp.com/traveler-changelog/",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c9dae7-d811-4b59-94c1-71a83652a14d?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json
index c2f0e31228c..b4111f4dd97 100644
--- a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json
+++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2003",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-05T19:15:39.630",
- "lastModified": "2025-03-05T20:16:06.380",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:53.547",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-863"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.13.0",
+ "matchCriteriaId": "29BEC91D-145B-4A8E-8279-15BFFB76DC51"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0003/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json
index 92f09c470d4..0ff2327a3e1 100644
--- a/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json
+++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-21855",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-12T10:15:18.320",
- "lastModified": "2025-03-13T21:18:17.013",
- "vulnStatus": "Analyzed",
+ "lastModified": "2025-03-28T16:15:28.047",
+ "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
]
},
@@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
+ },
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json
index dc3948373bc..8786a4224d9 100644
--- a/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json
+++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-21879",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T15:15:55.790",
- "lastModified": "2025-03-27T16:45:12.210",
+ "lastModified": "2025-03-28T16:15:28.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free on inode when scanning root during em shrinking\n\nAt btrfs_scan_root() we are accessing the inode's root (and fs_info) in a\ncall to btrfs_fs_closing() after we have scheduled the inode for a delayed\niput, and that can result in a use-after-free on the inode in case the\ncleaner kthread does the iput before we dereference the inode in the call\nto btrfs_fs_closing().\n\nFix this by using the fs_info stored already in a local variable instead\nof doing inode->root->fs_info."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/59f37036bb7ab3d554c24abc856aabca01126414",
diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json
index b117d737744..a3332fff261 100644
--- a/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json
+++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2164",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-15T04:15:22.260",
- "lastModified": "2025-03-15T04:15:22.260",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T16:07:07.700",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -49,24 +69,64 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pixelstats:pixelstats:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.8.2",
+ "matchCriteriaId": "AAE6034C-F19F-4C1B-BC71-4B85E7148E72"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/pixelstats/tags/0.8.2/pixelstats.php#L331",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://plugins.trac.wordpress.org/browser/pixelstats/tags/0.8.2/pixelstats.php#L664",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://wordpress.org/plugins/pixelstats/",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8683bc00-1136-42c4-a256-84b2cac1d575?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json
new file mode 100644
index 00000000000..9eeaad863b2
--- /dev/null
+++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22356",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:46.490",
+ "lastModified": "2025-03-28T15:15:46.490",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stencies Stencies allows Reflected XSS. This issue affects Stencies: from n/a through 0.58."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/stencies/vulnerability/wordpress-stencies-plugin-0-58-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json
new file mode 100644
index 00000000000..94b8b780a82
--- /dev/null
+++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22360",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:46.653",
+ "lastModified": "2025-03-28T15:15:46.653",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Azure offload allows Reflected XSS. This issue affects WP Azure offload: from n/a through 2.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/wp-azure-offload/vulnerability/wordpress-wp-azure-offload-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json
new file mode 100644
index 00000000000..0080268dd61
--- /dev/null
+++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22501",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:46.790",
+ "lastModified": "2025-03-28T15:15:46.790",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Improve My City Improve My City allows Reflected XSS. This issue affects Improve My City: from n/a through 1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-80"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/improve-my-city/vulnerability/wordpress-improve-my-city-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json
new file mode 100644
index 00000000000..ab9ce3246c0
--- /dev/null
+++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22523",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:46.930",
+ "lastModified": "2025-03-28T15:15:46.930",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Schedule allows Blind SQL Injection. This issue affects Schedule: from n/a through 1.0.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
+ "baseScore": 9.3,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/schedule/vulnerability/wordpress-schedule-plugin-1-0-0-sql-injection-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json
new file mode 100644
index 00000000000..52ecf879ae8
--- /dev/null
+++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22526",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:47.067",
+ "lastModified": "2025-03-28T15:15:47.067",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Deserialization of Untrusted Data vulnerability in NotFound PHP/MySQL CPU performance statistics allows Object Injection. This issue affects PHP/MySQL CPU performance statistics: from n/a through 1.2.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/mywebtonet-performancestats/vulnerability/wordpress-php-mysql-cpu-performance-statistics-plugin-1-2-1-php-object-injection-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json
new file mode 100644
index 00000000000..6e8ce32cb1c
--- /dev/null
+++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22566",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:47.210",
+ "lastModified": "2025-03-28T15:15:47.210",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ULTIMATE VIDEO GALLERY allows Reflected XSS. This issue affects ULTIMATE VIDEO GALLERY: from n/a through 1.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/ultimate-gallery/vulnerability/wordpress-ultimate-video-gallery-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json
new file mode 100644
index 00000000000..895e6a8a0e0
--- /dev/null
+++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22575",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:47.350",
+ "lastModified": "2025-03-28T15:15:47.350",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in extendyourweb SUPER RESPONSIVE SLIDER allows Reflected XSS. This issue affects SUPER RESPONSIVE SLIDER: from n/a through 1.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/super-slider/vulnerability/wordpress-super-responsive-slider-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json
new file mode 100644
index 00000000000..20ec3d44533
--- /dev/null
+++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-22767",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:47.490",
+ "lastModified": "2025-03-28T15:15:47.490",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in globalpayments GlobalPayments WooCommerce allows Reflected XSS. This issue affects GlobalPayments WooCommerce: from n/a through 1.13.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/global-payments-woocommerce/vulnerability/wordpress-globalpayments-woocommerce-plugin-1-12-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json
index a67fb6a756e..0f0c4669914 100644
--- a/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json
+++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2267",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-15T04:15:22.443",
- "lastModified": "2025-03-15T04:15:22.443",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2025-03-28T15:41:57.253",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -49,20 +69,57 @@
"value": "CWE-862"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wp01ru:wp01:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.6.2",
+ "matchCriteriaId": "C550DB10-29F2-4FF6-9EB2-127B9A3CDBCD"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp01/trunk/inc/class-wp01.php#L109",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://wordpress.org/plugins/wp01/",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/900d09e8-ded5-49b9-81bf-ddfc85d3cf2b?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json
index 5e9e4c4c2bf..c44c697e34c 100644
--- a/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json
+++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2277",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-13T13:15:58.320",
- "lastModified": "2025-03-18T17:15:47.460",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:22:58.023",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-200"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2025.1.3.0",
+ "matchCriteriaId": "E072F027-1277-44E1-B0C1-FD45FADC4F41"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0004/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json
index b35bef4a1d8..90b3c8e91a2 100644
--- a/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json
+++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2278",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-13T13:15:58.430",
- "lastModified": "2025-03-18T17:15:47.670",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:23:02.837",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-284"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2025.1.3.0",
+ "matchCriteriaId": "E072F027-1277-44E1-B0C1-FD45FADC4F41"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0004/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json
index 19317430b6a..c8b5cf2c29f 100644
--- a/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json
+++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-2280",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-13T13:15:58.533",
- "lastModified": "2025-03-19T14:15:39.743",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:23:07.340",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -49,12 +49,43 @@
"value": "CWE-284"
}
]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2024.3.6.0",
+ "matchCriteriaId": "AD744D7E-26C3-41F0-9C75-439406648A6D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0004/",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json
index ffb4556162c..643bf481b28 100644
--- a/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json
+++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-25686",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T16:15:29.987",
- "lastModified": "2025-03-27T16:45:12.210",
+ "lastModified": "2025-03-28T16:15:28.993",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "semcms <=5.0 is vulnerable to SQL Injection in SEMCMS_Fuction.php."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/J1095/fkapfxx",
diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json
index e6a5cdf4907..0bab4473f0e 100644
--- a/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json
+++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-25799",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:27.870",
- "lastModified": "2025-03-06T18:15:42.587",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:59:59.810",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seacms.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.seacms.com/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json
index e8b0a7bb003..d6accce2c4c 100644
--- a/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json
+++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-25800",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:27.993",
- "lastModified": "2025-02-26T16:15:17.053",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:59:53.310",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seacms.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf-2.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.seacms.com/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json
index ccf280785f7..c0dd591ae3f 100644
--- a/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json
+++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-25802",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:28.127",
- "lastModified": "2025-03-06T18:15:42.800",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:59:38.873",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seacms.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-2.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.seacms.com/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json
index 4ec5715bcf5..2349409719b 100644
--- a/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json
+++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-25813",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:28.250",
- "lastModified": "2025-03-06T18:15:43.027",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T16:59:27.230",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -51,18 +51,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seacms.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-5.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.seacms.com/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json
index 02d1ce05878..3f5121ec495 100644
--- a/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json
+++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-26265",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T16:15:30.117",
- "lastModified": "2025-03-27T16:45:12.210",
+ "lastModified": "2025-03-28T15:15:47.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "A segmentation fault in openairinterface5g v2.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted UE Context Modification response."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://anonymous.4open.science/r/Mobicom-ARCANE-36B7/README.md",
diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json
new file mode 100644
index 00000000000..c762086d111
--- /dev/null
+++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json
@@ -0,0 +1,78 @@
+{
+ "id": "CVE-2025-2713",
+ "sourceIdentifier": "cve-coordination@google.com",
+ "published": "2025-03-28T16:15:30.043",
+ "lastModified": "2025-03-28T16:15:30.043",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cve-coordination@google.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "attackRequirements": "PRESENT",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "HIGH",
+ "vulnIntegrityImpact": "NONE",
+ "vulnAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "HIGH",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "NOT_DEFINED",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cve-coordination@google.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/google/gvisor/commit/586c38d70081b13b2ed494cef48e99b93956843e",
+ "source": "cve-coordination@google.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json
index d93a1adc79d..09c83a0a675 100644
--- a/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json
+++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-28253",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T23:15:34.867",
- "lastModified": "2025-03-27T23:15:34.867",
+ "lastModified": "2025-03-28T16:15:29.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "Cross-Site Scripting (XSS) vulnerability in MainWP MainWP Dashboard v5.3.4 exists in class/class-mainwp-post-handler.php, where unsanitized user input from $_POST['sites'], $_POST['clients'], and $_POST['search'] is passed into the MainWP_User::render_table function. Despite using sanitize_text_field and wp_unslash, the values are not adequately protected against HTML or script injection. This flaw could allow an attacker to inject malicious scripts."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/edwin-0990/CVE_ID/tree/main/CVE-2025-28253",
diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json
index 71317b2f9c3..64d6eefab9a 100644
--- a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json
+++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-2857",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-27T14:15:55.720",
- "lastModified": "2025-03-27T20:15:28.440",
+ "lastModified": "2025-03-28T16:15:30.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,30 @@
"value": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "baseScore": 10.0,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 6.0
+ }
+ ]
+ },
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398",
diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json
index c8d13b028f1..1829686f0bf 100644
--- a/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json
+++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-29072",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T16:15:30.903",
- "lastModified": "2025-03-27T16:45:12.210",
+ "lastModified": "2025-03-28T16:15:29.640",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the \"cairo-lang-starknet-classes\" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314",
diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json
index 27f8ea31527..6d5963e7916 100644
--- a/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json
+++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-29306",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T19:15:49.290",
- "lastModified": "2025-03-27T19:15:49.290",
+ "lastModified": "2025-03-28T16:15:29.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/somatrasss/CVE-2025-29306",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json
index 0a29c17ae3a..dee7db32ec6 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29485",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:15:59.867",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:48.190",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a segmentation fault via the decompileRETURN function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz4.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json
index 46b09acb89a..1a6b3ea8940 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29486",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:15:59.983",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:48.343",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_PLACEOBJECT3 function."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz3.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json
index e8849c8e15b..82c8078a670 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29487",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:16:00.093",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:48.517",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "An out-of-memory error in the parseABC_STRING_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz6.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json
index db1b6502dc4..0d95c7c4278 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29488",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:16:00.207",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:48.677",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_INITACTION function."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz5.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json
index 778b16cdc82..4abf94c87cd 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29489",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:16:00.313",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:48.843",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHLINESTYLES function."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz7.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json
index 9c3566c77fe..06cde57123c 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29490",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:16:00.437",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:49.003",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a segmentation fault via the decompileCALLMETHOD function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz8.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json
index 9fbfe5e4f71..7698779708b 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29492",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:16:00.653",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:49.160",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a segmentation fault via the decompileSETVARIABLE function."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz9.readme",
diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json
index c27d3730670..4df78b2ef0a 100644
--- a/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json
+++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json
@@ -2,8 +2,8 @@
"id": "CVE-2025-29497",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T15:16:01.103",
- "lastModified": "2025-03-27T16:45:12.210",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2025-03-28T15:15:49.313",
+ "vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@@ -11,7 +11,42 @@
"value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz15.readme",
diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json
index 204ef54d9ef..b44bd57b0c2 100644
--- a/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json
+++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json
@@ -2,13 +2,17 @@
"id": "CVE-2025-29927",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-21T15:15:42.660",
- "lastModified": "2025-03-23T22:15:13.217",
- "vulnStatus": "Received",
+ "lastModified": "2025-03-28T15:15:49.470",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 14.2.25 and 15.2.3."
+ },
+ {
+ "lang": "es",
+ "value": "Next.js es un framework de React para crear aplicaciones web full-stack. En versiones anteriores a la 14.2.25 y la 15.2.3, era posible omitir las comprobaciones de autorizaci\u00f3n dentro de una aplicaci\u00f3n Next.js si esta se realizaba en middleware. Si no es posible aplicar una versi\u00f3n segura, se recomienda evitar que las solicitudes de usuarios externos que contengan el encabezado \"x-middleware-subrequest\" lleguen a la aplicaci\u00f3n Next.js. Esta vulnerabilidad se corrigi\u00f3 en las versiones 14.2.25 y 15.2.3."
}
],
"metrics": {
@@ -59,6 +63,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/23/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20250328-0002/",
+ "source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json
new file mode 100644
index 00000000000..c1c0946a4eb
--- /dev/null
+++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json
@@ -0,0 +1,60 @@
+{
+ "id": "CVE-2025-29928",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2025-03-28T15:15:49.587",
+ "lastModified": "2025-03-28T15:15:49.587",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-384"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/goauthentik/authentik/commit/71294b7deb6eb5726a782de83b957eaf25fc4cf6",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/goauthentik/authentik/security/advisories/GHSA-p6p8-f853-9g2p",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json
new file mode 100644
index 00000000000..549a88fb544
--- /dev/null
+++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json
@@ -0,0 +1,141 @@
+{
+ "id": "CVE-2025-2912",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2025-03-28T16:15:30.540",
+ "lastModified": "2025-03-28T16:15:30.540",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in HDF5 up to 1.14.6. It has been declared as problematic. Affected by this vulnerability is the function H5O_msg_flush of the file src/H5Omessage.c. The manipulation of the argument oh leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "NONE",
+ "vulnIntegrityImpact": "NONE",
+ "vulnAvailabilityImpact": "LOW",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "NOT_DEFINED",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ],
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 1.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
+ "baseScore": 1.7,
+ "accessVector": "LOCAL",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "PARTIAL"
+ },
+ "baseSeverity": "LOW",
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.9,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/HDFGroup/hdf5/issues/5370",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.301885",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.301885",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?submit.519966",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json
index 3f0b00aa913..a610399985d 100644
--- a/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json
+++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json
@@ -2,7 +2,7 @@
"id": "CVE-2025-30093",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T19:15:49.677",
- "lastModified": "2025-03-27T19:15:49.677",
+ "lastModified": "2025-03-28T16:15:30.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@@ -11,7 +11,42 @@
"value": "HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html",
diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json
new file mode 100644
index 00000000000..004a0d4aa10
--- /dev/null
+++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-30211",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2025-03-28T15:15:50.863",
+ "lastModified": "2025-03-28T15:15:50.863",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient processing of the error data. As a result, large amount of memory will be allocated for processing malicious data. Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the issue. Some workarounds are available. One may set option `parallel_login` to `false` and/or reduce the `max_sessions` option."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-789"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/erlang/otp/security/advisories/GHSA-vvr3-fjhh-cfwc",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json
new file mode 100644
index 00000000000..1e21d401352
--- /dev/null
+++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json
@@ -0,0 +1,78 @@
+{
+ "id": "CVE-2025-30371",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2025-03-28T15:15:51.090",
+ "lastModified": "2025-03-28T15:15:51.090",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed in v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8. Migrating to Metabase Cloud or redeploying Metabase in a dedicated subnet with strict outbound port controls is an available workaround."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 2.1,
+ "baseSeverity": "LOW",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "attackRequirements": "PRESENT",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "NONE",
+ "vulnIntegrityImpact": "NONE",
+ "vulnAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "LOW",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "NOT_DEFINED",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/metabase/metabase/security/advisories/GHSA-8xf9-9jc8-qp98",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json
new file mode 100644
index 00000000000..3b439decf06
--- /dev/null
+++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2025-30372",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2025-03-28T15:15:51.227",
+ "lastModified": "2025-03-28T16:15:30.950",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
+ "baseScore": 7.7,
+ "baseSeverity": "HIGH",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "vulnConfidentialityImpact": "HIGH",
+ "vulnIntegrityImpact": "NONE",
+ "vulnAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "subAvailabilityImpact": "NONE",
+ "exploitMaturity": "PROOF_OF_CONCEPT",
+ "confidentialityRequirement": "NOT_DEFINED",
+ "integrityRequirement": "NOT_DEFINED",
+ "availabilityRequirement": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
+ "modifiedVulnIntegrityImpact": "NOT_DEFINED",
+ "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
+ "modifiedSubConfidentialityImpact": "NOT_DEFINED",
+ "modifiedSubIntegrityImpact": "NOT_DEFINED",
+ "modifiedSubAvailabilityImpact": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "valueDensity": "NOT_DEFINED",
+ "vulnerabilityResponseEffort": "NOT_DEFINED",
+ "providerUrgency": "NOT_DEFINED"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c",
+ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json
new file mode 100644
index 00000000000..6eb1541247e
--- /dev/null
+++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2025-31010",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2025-03-28T15:15:51.367",
+ "lastModified": "2025-03-28T15:15:51.367",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Cross Site Request Forgery. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/wordpress/plugin/simply-rets/vulnerability/wordpress-simplyrets-real-estate-idx-plugin-3-0-3-csrf-to-multiple-admin-actions-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/README.md b/README.md
index 9c979692665..5e6ebffd18d 100644
--- a/README.md
+++ b/README.md
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2025-03-28T15:00:20.535463+00:00
+2025-03-28T17:00:21.191410+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
-2025-03-28T14:52:00.437000+00:00
+2025-03-28T16:59:59.810000+00:00
```
### Last Data Feed Release
@@ -33,65 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
-287239
+287259
```
### CVEs added in the last Commit
-Recently added CVEs: `21`
+Recently added CVEs: `20`
-- [CVE-2024-11504](CVE-2024/CVE-2024-115xx/CVE-2024-11504.json) (`2025-03-28T13:15:39.663`)
-- [CVE-2024-7407](CVE-2024/CVE-2024-74xx/CVE-2024-7407.json) (`2025-03-28T13:15:40.760`)
-- [CVE-2025-0986](CVE-2025/CVE-2025-09xx/CVE-2025-0986.json) (`2025-03-28T14:15:19.357`)
-- [CVE-2025-1781](CVE-2025/CVE-2025-17xx/CVE-2025-1781.json) (`2025-03-28T14:15:19.687`)
-- [CVE-2025-28219](CVE-2025/CVE-2025-282xx/CVE-2025-28219.json) (`2025-03-28T14:15:20.253`)
-- [CVE-2025-28220](CVE-2025/CVE-2025-282xx/CVE-2025-28220.json) (`2025-03-28T14:15:20.377`)
-- [CVE-2025-28221](CVE-2025/CVE-2025-282xx/CVE-2025-28221.json) (`2025-03-28T14:15:20.483`)
-- [CVE-2025-2858](CVE-2025/CVE-2025-28xx/CVE-2025-2858.json) (`2025-03-28T14:15:20.650`)
-- [CVE-2025-2859](CVE-2025/CVE-2025-28xx/CVE-2025-2859.json) (`2025-03-28T14:15:20.810`)
-- [CVE-2025-2860](CVE-2025/CVE-2025-28xx/CVE-2025-2860.json) (`2025-03-28T14:15:20.967`)
-- [CVE-2025-2861](CVE-2025/CVE-2025-28xx/CVE-2025-2861.json) (`2025-03-28T14:15:21.113`)
-- [CVE-2025-2862](CVE-2025/CVE-2025-28xx/CVE-2025-2862.json) (`2025-03-28T14:15:21.257`)
-- [CVE-2025-2863](CVE-2025/CVE-2025-28xx/CVE-2025-2863.json) (`2025-03-28T14:15:21.410`)
-- [CVE-2025-2864](CVE-2025/CVE-2025-28xx/CVE-2025-2864.json) (`2025-03-28T14:15:21.570`)
-- [CVE-2025-2865](CVE-2025/CVE-2025-28xx/CVE-2025-2865.json) (`2025-03-28T14:15:21.727`)
-- [CVE-2025-2877](CVE-2025/CVE-2025-28xx/CVE-2025-2877.json) (`2025-03-28T14:15:21.877`)
-- [CVE-2025-2901](CVE-2025/CVE-2025-29xx/CVE-2025-2901.json) (`2025-03-28T14:15:22.020`)
-- [CVE-2025-2908](CVE-2025/CVE-2025-29xx/CVE-2025-2908.json) (`2025-03-28T13:15:41.217`)
-- [CVE-2025-2909](CVE-2025/CVE-2025-29xx/CVE-2025-2909.json) (`2025-03-28T13:15:41.387`)
-- [CVE-2025-2910](CVE-2025/CVE-2025-29xx/CVE-2025-2910.json) (`2025-03-28T13:15:41.533`)
-- [CVE-2025-2911](CVE-2025/CVE-2025-29xx/CVE-2025-2911.json) (`2025-03-28T13:15:41.673`)
+- [CVE-2024-39311](CVE-2024/CVE-2024-393xx/CVE-2024-39311.json) (`2025-03-28T15:15:44.647`)
+- [CVE-2024-48615](CVE-2024/CVE-2024-486xx/CVE-2024-48615.json) (`2025-03-28T15:15:45.023`)
+- [CVE-2024-51624](CVE-2024/CVE-2024-516xx/CVE-2024-51624.json) (`2025-03-28T15:15:45.393`)
+- [CVE-2024-54291](CVE-2024/CVE-2024-542xx/CVE-2024-54291.json) (`2025-03-28T15:15:45.663`)
+- [CVE-2024-54362](CVE-2024/CVE-2024-543xx/CVE-2024-54362.json) (`2025-03-28T15:15:45.827`)
+- [CVE-2025-22356](CVE-2025/CVE-2025-223xx/CVE-2025-22356.json) (`2025-03-28T15:15:46.490`)
+- [CVE-2025-22360](CVE-2025/CVE-2025-223xx/CVE-2025-22360.json) (`2025-03-28T15:15:46.653`)
+- [CVE-2025-22501](CVE-2025/CVE-2025-225xx/CVE-2025-22501.json) (`2025-03-28T15:15:46.790`)
+- [CVE-2025-22523](CVE-2025/CVE-2025-225xx/CVE-2025-22523.json) (`2025-03-28T15:15:46.930`)
+- [CVE-2025-22526](CVE-2025/CVE-2025-225xx/CVE-2025-22526.json) (`2025-03-28T15:15:47.067`)
+- [CVE-2025-22566](CVE-2025/CVE-2025-225xx/CVE-2025-22566.json) (`2025-03-28T15:15:47.210`)
+- [CVE-2025-22575](CVE-2025/CVE-2025-225xx/CVE-2025-22575.json) (`2025-03-28T15:15:47.350`)
+- [CVE-2025-22767](CVE-2025/CVE-2025-227xx/CVE-2025-22767.json) (`2025-03-28T15:15:47.490`)
+- [CVE-2025-2713](CVE-2025/CVE-2025-27xx/CVE-2025-2713.json) (`2025-03-28T16:15:30.043`)
+- [CVE-2025-2912](CVE-2025/CVE-2025-29xx/CVE-2025-2912.json) (`2025-03-28T16:15:30.540`)
+- [CVE-2025-29928](CVE-2025/CVE-2025-299xx/CVE-2025-29928.json) (`2025-03-28T15:15:49.587`)
+- [CVE-2025-30211](CVE-2025/CVE-2025-302xx/CVE-2025-30211.json) (`2025-03-28T15:15:50.863`)
+- [CVE-2025-30371](CVE-2025/CVE-2025-303xx/CVE-2025-30371.json) (`2025-03-28T15:15:51.090`)
+- [CVE-2025-30372](CVE-2025/CVE-2025-303xx/CVE-2025-30372.json) (`2025-03-28T15:15:51.227`)
+- [CVE-2025-31010](CVE-2025/CVE-2025-310xx/CVE-2025-31010.json) (`2025-03-28T15:15:51.367`)
### CVEs modified in the last Commit
-Recently modified CVEs: `60`
+Recently modified CVEs: `148`
-- [CVE-2024-28572](CVE-2024/CVE-2024-285xx/CVE-2024-28572.json) (`2025-03-28T14:48:51.143`)
-- [CVE-2024-28573](CVE-2024/CVE-2024-285xx/CVE-2024-28573.json) (`2025-03-28T14:48:47.437`)
-- [CVE-2024-28574](CVE-2024/CVE-2024-285xx/CVE-2024-28574.json) (`2025-03-28T14:48:43.373`)
-- [CVE-2024-28575](CVE-2024/CVE-2024-285xx/CVE-2024-28575.json) (`2025-03-28T14:48:40.390`)
-- [CVE-2024-28576](CVE-2024/CVE-2024-285xx/CVE-2024-28576.json) (`2025-03-28T14:48:37.483`)
-- [CVE-2024-28577](CVE-2024/CVE-2024-285xx/CVE-2024-28577.json) (`2025-03-28T14:48:33.360`)
-- [CVE-2024-28578](CVE-2024/CVE-2024-285xx/CVE-2024-28578.json) (`2025-03-28T14:48:28.610`)
-- [CVE-2024-28579](CVE-2024/CVE-2024-285xx/CVE-2024-28579.json) (`2025-03-28T14:48:24.560`)
-- [CVE-2024-28580](CVE-2024/CVE-2024-285xx/CVE-2024-28580.json) (`2025-03-28T14:48:19.057`)
-- [CVE-2024-28581](CVE-2024/CVE-2024-285xx/CVE-2024-28581.json) (`2025-03-28T14:48:15.920`)
-- [CVE-2024-28582](CVE-2024/CVE-2024-285xx/CVE-2024-28582.json) (`2025-03-28T14:48:12.423`)
-- [CVE-2024-28583](CVE-2024/CVE-2024-285xx/CVE-2024-28583.json) (`2025-03-28T14:48:08.290`)
-- [CVE-2024-28584](CVE-2024/CVE-2024-285xx/CVE-2024-28584.json) (`2025-03-28T14:47:52.610`)
-- [CVE-2024-44276](CVE-2024/CVE-2024-442xx/CVE-2024-44276.json) (`2025-03-28T14:09:35.787`)
-- [CVE-2025-0189](CVE-2025/CVE-2025-01xx/CVE-2025-0189.json) (`2025-03-28T14:31:37.077`)
-- [CVE-2025-0190](CVE-2025/CVE-2025-01xx/CVE-2025-0190.json) (`2025-03-28T14:28:25.273`)
-- [CVE-2025-0281](CVE-2025/CVE-2025-02xx/CVE-2025-0281.json) (`2025-03-28T14:22:53.790`)
-- [CVE-2025-0312](CVE-2025/CVE-2025-03xx/CVE-2025-0312.json) (`2025-03-28T14:11:12.457`)
-- [CVE-2025-1653](CVE-2025/CVE-2025-16xx/CVE-2025-1653.json) (`2025-03-28T13:17:33.270`)
-- [CVE-2025-20124](CVE-2025/CVE-2025-201xx/CVE-2025-20124.json) (`2025-03-28T13:22:42.077`)
-- [CVE-2025-20125](CVE-2025/CVE-2025-201xx/CVE-2025-20125.json) (`2025-03-28T13:37:16.650`)
-- [CVE-2025-20204](CVE-2025/CVE-2025-202xx/CVE-2025-20204.json) (`2025-03-28T13:42:57.807`)
-- [CVE-2025-20205](CVE-2025/CVE-2025-202xx/CVE-2025-20205.json) (`2025-03-28T13:46:02.393`)
-- [CVE-2025-21117](CVE-2025/CVE-2025-211xx/CVE-2025-21117.json) (`2025-03-28T13:24:51.620`)
-- [CVE-2025-2854](CVE-2025/CVE-2025-28xx/CVE-2025-2854.json) (`2025-03-28T13:15:40.923`)
+- [CVE-2025-21879](CVE-2025/CVE-2025-218xx/CVE-2025-21879.json) (`2025-03-28T16:15:28.220`)
+- [CVE-2025-2267](CVE-2025/CVE-2025-22xx/CVE-2025-2267.json) (`2025-03-28T15:41:57.253`)
+- [CVE-2025-2277](CVE-2025/CVE-2025-22xx/CVE-2025-2277.json) (`2025-03-28T16:22:58.023`)
+- [CVE-2025-2278](CVE-2025/CVE-2025-22xx/CVE-2025-2278.json) (`2025-03-28T16:23:02.837`)
+- [CVE-2025-2280](CVE-2025/CVE-2025-22xx/CVE-2025-2280.json) (`2025-03-28T16:23:07.340`)
+- [CVE-2025-25686](CVE-2025/CVE-2025-256xx/CVE-2025-25686.json) (`2025-03-28T16:15:28.993`)
+- [CVE-2025-25799](CVE-2025/CVE-2025-257xx/CVE-2025-25799.json) (`2025-03-28T16:59:59.810`)
+- [CVE-2025-25800](CVE-2025/CVE-2025-258xx/CVE-2025-25800.json) (`2025-03-28T16:59:53.310`)
+- [CVE-2025-25802](CVE-2025/CVE-2025-258xx/CVE-2025-25802.json) (`2025-03-28T16:59:38.873`)
+- [CVE-2025-25813](CVE-2025/CVE-2025-258xx/CVE-2025-25813.json) (`2025-03-28T16:59:27.230`)
+- [CVE-2025-26265](CVE-2025/CVE-2025-262xx/CVE-2025-26265.json) (`2025-03-28T15:15:47.830`)
+- [CVE-2025-28253](CVE-2025/CVE-2025-282xx/CVE-2025-28253.json) (`2025-03-28T16:15:29.490`)
+- [CVE-2025-2857](CVE-2025/CVE-2025-28xx/CVE-2025-2857.json) (`2025-03-28T16:15:30.180`)
+- [CVE-2025-29072](CVE-2025/CVE-2025-290xx/CVE-2025-29072.json) (`2025-03-28T16:15:29.640`)
+- [CVE-2025-29306](CVE-2025/CVE-2025-293xx/CVE-2025-29306.json) (`2025-03-28T16:15:29.790`)
+- [CVE-2025-29485](CVE-2025/CVE-2025-294xx/CVE-2025-29485.json) (`2025-03-28T15:15:48.190`)
+- [CVE-2025-29486](CVE-2025/CVE-2025-294xx/CVE-2025-29486.json) (`2025-03-28T15:15:48.343`)
+- [CVE-2025-29487](CVE-2025/CVE-2025-294xx/CVE-2025-29487.json) (`2025-03-28T15:15:48.517`)
+- [CVE-2025-29488](CVE-2025/CVE-2025-294xx/CVE-2025-29488.json) (`2025-03-28T15:15:48.677`)
+- [CVE-2025-29489](CVE-2025/CVE-2025-294xx/CVE-2025-29489.json) (`2025-03-28T15:15:48.843`)
+- [CVE-2025-29490](CVE-2025/CVE-2025-294xx/CVE-2025-29490.json) (`2025-03-28T15:15:49.003`)
+- [CVE-2025-29492](CVE-2025/CVE-2025-294xx/CVE-2025-29492.json) (`2025-03-28T15:15:49.160`)
+- [CVE-2025-29497](CVE-2025/CVE-2025-294xx/CVE-2025-29497.json) (`2025-03-28T15:15:49.313`)
+- [CVE-2025-29927](CVE-2025/CVE-2025-299xx/CVE-2025-29927.json) (`2025-03-28T15:15:49.470`)
+- [CVE-2025-30093](CVE-2025/CVE-2025-300xx/CVE-2025-30093.json) (`2025-03-28T16:15:30.733`)
## Download and Usage
diff --git a/_state.csv b/_state.csv
index 2dfe2fb5306..ac243a84241 100644
--- a/_state.csv
+++ b/_state.csv
@@ -92630,7 +92630,7 @@ CVE-2016-9836,0,0,8ba1c7fd9bfada920620934531cb9a163daf497da9b2eb5d6dd15ac971a1e8
CVE-2016-9837,0,0,171581a99282639171f3a68288f4c03f2492c11216579eb31842ccbbbc6edcfb,2024-11-21T03:01:50.500000
CVE-2016-9838,0,0,eb918df238b6ca99c995648bcc0ca0ea32a0a2978229358f38b97c24377365b7,2024-11-21T03:01:50.640000
CVE-2016-9839,0,0,efaba7b9180eb4b0d6cb8017d7acce2cd4b717cdf7d8be7aba5576d8467c3ab7,2024-11-21T03:01:50.783000
-CVE-2016-9840,0,0,8e8a20c6f409dddd3dc24d2d2305973321db284b9648774a64605087c1ed2144,2024-11-21T03:01:50.920000
+CVE-2016-9840,0,1,d5a1f31378ecb8a78fca7ec6375f269f469d6d0beabc88d1a1b23e1d52769fec,2025-03-28T15:17:06.330000
CVE-2016-9841,0,0,4e44250b54ad7e627cb782577c17713a4100845e6b861bceae363a4a9c6dd6e7,2024-11-21T03:01:51.147000
CVE-2016-9842,0,0,863091431acb64821d9b5770e2449bb87d8c937ca60eb137b530f259ac4bd632,2024-11-21T03:01:51.370000
CVE-2016-9843,0,0,d964855839e9a4d21c3c5397d2c13994a88bfd3fd9b6039cdb5f72b07f1f1a7a,2024-11-21T03:01:51.617000
@@ -121364,7 +121364,7 @@ CVE-2018-25029,0,0,d2b8991b8e678b304186a900d5f867ba7ced0357724ddbec89e209e94abb7
CVE-2018-2503,0,0,8e3ea32ebf1107ec294784a4411fd031e5067d7418ba03c338a6b8fd54d04658,2024-11-21T04:03:55.670000
CVE-2018-25030,0,0,91fc31904ac220f9e574bda8bb75a83e7e1398ce9ca4217ef98d104f6e4a6ff3,2024-11-21T04:03:23.710000
CVE-2018-25031,0,0,87238c3a098f9bca53bacd526bca863a87ee84aa804764603612267a38e6f7b5,2024-11-21T04:03:23.847000
-CVE-2018-25032,0,0,503f4aedb7490a3874f48edb8fe9079fad549e990224f234a7590298ebf6981b,2024-11-21T04:03:24.080000
+CVE-2018-25032,0,1,f08f2265936256e5c17baf99d85a519a575b4b9053d4005c971a056a050823a9,2025-03-28T15:16:29.617000
CVE-2018-25033,0,0,f0b81a6dcdddedc02b01d6b73a4bc374f532ef9ae8e591fa3f31c0d0bac3fd9b,2024-11-21T04:03:24.340000
CVE-2018-25034,0,0,3864ff11e28b6897e54613d3bf75062ea796e861bd67ed0ce0128be7bbbf2b19,2024-11-21T04:03:24.487000
CVE-2018-25035,0,0,182ee13b75ff96081bc3930eff99b4f8556b0c8c291104dbae454f5d723961db,2024-11-21T04:03:24.627000
@@ -136906,7 +136906,7 @@ CVE-2019-19747,0,0,611057112dbadf75d7b4163604d3b75c131e7617ba9d398e9a201c6393e2f
CVE-2019-19748,0,0,003d66c6089b9a24d32cd4a1651b8f57fde00fc0f47e0b8791d4cb6569311d3c,2024-11-21T04:35:18.653000
CVE-2019-1975,0,0,24c06b4868d756718188257376a9efe8aeacd0b60748ac6f7eaeca88b3f1ec41,2024-11-21T04:37:48.460000
CVE-2019-19750,0,0,55a285013e24bc651d991c05b211bc25bf9cbd0a58577751d4f6cec8eb6b7df2,2024-11-21T04:35:18.803000
-CVE-2019-19751,0,0,56d4c79bc14b390375789894ec926aed91956a60aa03c945c02b7f21a448ccfe,2024-11-21T04:35:19.033000
+CVE-2019-19751,0,1,4abda8e077122d50e336b4baafe7f6fd8d58f1e5dca5deeabce9220dd2af01d8,2025-03-28T16:15:18.823000
CVE-2019-19752,0,0,e5560cddcfdac752a2a752adddb8d4c402a647b0cb8745dff77b37996d14e2c1,2025-03-25T19:15:38.880000
CVE-2019-19753,0,0,992a8e42ce11043cfca0476128b1fac67d6827bce8fb6084f30f7203b4269759,2024-11-21T04:35:19.337000
CVE-2019-19754,0,0,4715ebcbfb06b86b5d5998419429b297561e7e1b400974d496a230abc486450b,2024-11-21T04:35:19.550000
@@ -163833,7 +163833,7 @@ CVE-2020-8741,0,0,c3e8a17e5a28c22051635661f79c1eb774fee731fcaa356a8f15cfc41ce819
CVE-2020-8742,0,0,6fe052284dcf8d7278e78ec037c375f26d454a033a5b8b7c418f06c6eea71c03,2024-11-21T05:39:21.850000
CVE-2020-8743,0,0,12cb869feaaf256ff682ec5d899c060770bccc31b37d09fe81da7f95f0c8e3a8,2024-11-21T05:39:22.003000
CVE-2020-8744,0,0,8e6e28c8ec88ab246e76bef6ffa97dcefd978f3f9b24cef2c835d4bab3c288b7,2024-11-21T05:39:22.100000
-CVE-2020-8745,0,0,7614664449bf2851987ed63b14ec507d8bc5c372004fa1f74023c2c6b3948b98,2024-11-21T05:39:22.207000
+CVE-2020-8745,0,1,3d02524bf806e1912b62ba3802576b48e47a77d4ecd69e1ee74ff43f0722e162,2025-03-28T15:19:45.743000
CVE-2020-8746,0,0,bcc0e568ce284b7be4a7c8433f761e3c507bd27a7b10d0c802085706355b59e4,2024-11-21T05:39:22.340000
CVE-2020-8747,0,0,e6e59b96f41ac4369ef758c480abd327ce423d704e3d9cba354d6cf737da8343,2024-11-21T05:39:22.437000
CVE-2020-8748,0,0,7f4cb7238b6c9056ffe5d25e649e9aecf97b1fd3a6181d081358be492434f365,2023-11-07T03:26:44.650000
@@ -168554,7 +168554,7 @@ CVE-2021-2197,0,0,3f3db597d4914db83f4ab28169f5f58121ce7bcca935decda34671de30a061
CVE-2021-21970,0,0,e50b82f20c897311b554d7d59260102f13c4cd1b557720ea6f916eec21ce6df7,2024-11-21T05:49:20.640000
CVE-2021-21971,0,0,a15f1643a0f04bb936cefae8f6967a0fc877c6217c175a92d1206b9f1c8fdd98,2024-11-21T05:49:20.760000
CVE-2021-21972,0,0,b57c893da4ffcca06a65da114b9ad2b198306b125accfcb2157b074d4baad2cb,2025-02-04T16:15:32.760000
-CVE-2021-21973,0,0,86cba847f56a39a420482d37e0bfbcbf8412c1ed008e94517988ade22915020a,2025-02-04T20:15:39.867000
+CVE-2021-21973,0,1,dc60dd50f629470605ed1de262a2ccbdb1b9ba731ed909b3db2071237540e597,2025-03-28T16:31:11.093000
CVE-2021-21974,0,0,3de0ff3f51a876bb964c76490a717a7a534efb367618e09e797a5112d8532ed2,2024-11-21T05:49:21.173000
CVE-2021-21975,0,0,7b39f2d4c8b5da98f18e2bc67f290d53ca75075826fabc6f2f7b004160c3fc58,2025-03-12T20:57:43.230000
CVE-2021-21976,0,0,923480596973a58660d6900e0f43c7887211c204cf1867dcd9b388637ff06cac,2024-11-21T05:49:21.460000
@@ -180465,7 +180465,7 @@ CVE-2021-37726,0,0,c827e91a735b7f3440ce297ffdd8fe249cb6dafa37932e2a5cdf2e2ff6b63
CVE-2021-37727,0,0,16914471fac9502f82e14a7be52ce433b1572171f98c40d0581cf2316d79c56e,2024-11-21T06:15:48.923000
CVE-2021-37728,0,0,667f6eccb007c6784b7007bd52fe0edcc204d215df8ca0b162ffb226469c4983,2024-11-21T06:15:49.073000
CVE-2021-37729,0,0,7590423d4d14893b6841c403db08d35c40d9ab2c637d91b9f9590db0f0231e99,2024-11-21T06:15:49.230000
-CVE-2021-3773,0,0,55e032b8ab7340873145f989a8f1ceb41d41aed3577cbbb8a664afffea4d3aad,2024-11-21T06:22:23.553000
+CVE-2021-3773,0,1,8c9d2dea548badcd4a8eb44505a5ba1afb12d4b832912ab41a03feeb847dfe99,2025-03-28T15:15:41.413000
CVE-2021-37730,0,0,ba8bdf69d7adc33fb1ff23d2e11be3b888e691088e530a578b70d0302abd3f79,2024-11-21T06:15:49.387000
CVE-2021-37731,0,0,98accbaa732048de3a0c7bae9ed1a128c5eada6e006689ad66e9f9678c9508b8,2024-11-21T06:15:49.533000
CVE-2021-37732,0,0,c61f3f34a79058ea6dbdb5af2769075b0c40a9d05e631e4388abeec496f9d22b,2024-11-21T06:15:49.697000
@@ -187172,7 +187172,7 @@ CVE-2021-46867,0,0,8ad83a8d226e4f8898ee1ce5bae4c42a6b3940bdcf36d2fee3012ddc586d1
CVE-2021-46868,0,0,f0ef3dd45f64ad741bb81b50cf78f63c19bd438fd32124d2f17de81f953a66b0,2024-11-21T06:34:49.257000
CVE-2021-46871,0,0,05c2919904c965d0b69570703d46258f27345788e02af9d544a23baf7cc1224f,2024-11-21T06:34:49.383000
CVE-2021-46872,0,0,fd01e6b4d7cf956efd9d67ee9685007e549687974e41eefa9b4ee93344bfe2ff,2024-11-21T06:34:49.547000
-CVE-2021-46873,0,0,bd696af11164da0889d93481e3bf2473217e799ee3de555882260a6e2f73ec72,2024-11-21T06:34:49.717000
+CVE-2021-46873,0,1,ba74a23d6eb978514833a40b7527a8652ccc16dbd3b1c464beccaaf964481a35,2025-03-28T16:15:20.180000
CVE-2021-46875,0,0,cd128e15ae16beb3eef5e9c0528dea9bb7a3bcbe28dc60234951f81ea8a515de,2025-03-04T22:15:35.267000
CVE-2021-46876,0,0,6a2e22af11aa26335bbedce387ed63ddf6418c87ae229e885cf311471999ca35,2025-03-05T17:15:11.137000
CVE-2021-46877,0,0,d38d83f8552fd712480fd15b31c69fae523b8d5890dcdafac1ebd8aa441c7eef,2025-02-26T19:15:12.823000
@@ -193025,7 +193025,7 @@ CVE-2022-2333,0,0,c28f4adbd39916a4b5a4fa6b69959d293504f2181c2e2df50bdbe107ec839b
CVE-2022-23330,0,0,f1a2baca69a7d892acb795edd6d59f053f26b4bfc39406223a8047fb72de1696,2024-11-21T06:48:25.050000
CVE-2022-23331,0,0,e436e07cdfebf0b21120eaf370e1466d97dbd7a2e078567168eee52b54a68ec2,2024-11-21T06:48:25.190000
CVE-2022-23332,0,0,03f48ba1075ca63cd84eddf9b5926c9e60fc8454deb95aba1ab57d79c44ba0a3,2024-11-21T06:48:25.340000
-CVE-2022-23334,0,0,d24ee4ad3fb33dc90aabf7a6a59d41fcea772359f6d96b9e72562ee3ec887750,2024-11-21T06:48:25.500000
+CVE-2022-23334,0,1,29aa41590f7745fa4ce70461104808ea0892ae440bfad7c3c95622cbb2b15d87,2025-03-28T16:15:20.363000
CVE-2022-23335,0,0,385a313ed3a88829a41c8666b0419afd784e939a25585c135946e5e0da58a9ad,2024-11-21T06:48:25.657000
CVE-2022-23336,0,0,07bfc679027bede08283a99a85d4e6a8b4895d94f4a9f3a16403548c3f82432c,2024-11-21T06:48:25.797000
CVE-2022-23337,0,0,5ed212662dbc98870ce1b4176d2f58eb0a849d67decded6fa282f33aafc7ac73,2024-11-21T06:48:25.967000
@@ -205280,7 +205280,7 @@ CVE-2022-38322,0,0,b570471af3ac3da045db7127371f2f749811c7638f1312d2f0b9ea2e13584
CVE-2022-38323,0,0,a59aa796c66304243a913448227bd84dfae16a322d88dfa5c15f131a7b9c60b7,2024-11-21T07:16:15.833000
CVE-2022-38325,0,0,f05814fdb2faeaa1a16993e9c3e4d8b593360da26da02c45383df8aed9d115bf,2024-11-21T07:16:16.047000
CVE-2022-38326,0,0,ddd7a593ab446359e0263613bd7bd24a513ca227d55a19a786e72d6d4ab9aeb2,2024-11-21T07:16:16.237000
-CVE-2022-38329,0,0,1bc5b6868a2205047bf95568b651ba7d09323d77754e70403b72abcc37738b32,2025-03-21T15:15:37.740000
+CVE-2022-38329,0,1,7491b23f4dbb0183807cd13c54f1a1794cfea6daa2f509e1c06ab6ca6a57c788,2025-03-28T15:15:42.063000
CVE-2022-3833,0,0,974c54d94de219b584179b8997883fe36eb0c7a696a69be9c7f81e0683694a52,2024-11-21T07:20:19.763000
CVE-2022-38333,0,0,56d7bfd5982c43db05a55606c661f8e0c65aff61b2fbcf70156d5f71c00f433c,2024-11-21T07:16:16.637000
CVE-2022-38334,0,0,860dd9433bcbaf1585f6c36716391fc7a1ca2a042ef681020b899ecb163d199d,2024-11-21T07:16:16.843000
@@ -206354,7 +206354,7 @@ CVE-2022-39896,0,0,f2b2f6fa9285ceee3c8fc3eedb77e594e670cf55b8d80a49a33ff57e1e1a1
CVE-2022-39897,0,0,c640466bc40d2725199d6cbe2be90ee3322553c099b36902264c3551a574d1a7,2024-11-21T07:18:29.090000
CVE-2022-39898,0,0,0c00b2b1422e6be3bdb105d1de53ea020a8f1a87b8ec2005ad97c103926c5608,2024-11-21T07:18:29.217000
CVE-2022-39899,0,0,ae6241901716922a9c7a49431debba806ef233a40ef4f20ac6c4849e260de5df,2024-11-21T07:18:29.347000
-CVE-2022-3990,0,0,dd3b2c785cbade5699bffc6483fd14a73fdce41f2dbe4b507dd273920a4ef46f,2024-11-21T07:20:41.250000
+CVE-2022-3990,0,1,6ac2975ee7dacdc5e4e87cb32f13d8d050bbec4f15a82026ccb83118eb5bb59b,2025-03-28T15:15:42.193000
CVE-2022-39900,0,0,ab57420324273113e770c846496e439d771ac44e623a031f9bdec4ac0df70a8c,2024-11-21T07:18:29.463000
CVE-2022-39901,0,0,2f5e6f42f6565605f62903b2d3b4c7cb5832756827b9c159280cfd6be2a90b22,2024-11-21T07:18:29.580000
CVE-2022-39902,0,0,7975b63131f03dde6809ca547363e6d12014fc0580a0a2e5fbfbfa05728b8cb5,2024-11-21T07:18:29.683000
@@ -207581,7 +207581,7 @@ CVE-2022-41384,0,0,f20ed5f7c5effd3d17278e9aefeebc2df0d48ecbad5a05e32719efcf915b7
CVE-2022-41385,0,0,4b250f460b985ee03e059d65336e2299cf2d749d21ed22d9f550339b10911a7c,2024-11-21T07:23:08.067000
CVE-2022-41386,0,0,a6d007d2507ff8469fb9b475c100f581120184d85666c2c61778c702c23662af,2024-11-21T07:23:08.197000
CVE-2022-41387,0,0,f5147b07143b1d3004961f7c421dda36faf3cdde7b212696b6a732f5bc239418,2024-11-21T07:23:08.327000
-CVE-2022-4139,0,0,ad72c0890adcccb54fe95b5a7679e13f049c42c0e9af7dbbf3458295eb11a7e7,2024-11-21T07:34:39.103000
+CVE-2022-4139,0,1,70bd0c4438e0d42816803bf10c2cda7fd805cb562599c934f3e9758b48394496,2025-03-28T16:15:25.407000
CVE-2022-41390,0,0,56282c1b0d50d5dbe9d9a0b2cffa175b8f3ee590c5d0a11cd16e1a827766a512,2024-11-21T07:23:08.463000
CVE-2022-41391,0,0,d32d0bc5c5503b3baf71b6f7bb7b6ecb80cfe87a48540259065e2b4987be9a93,2024-11-21T07:23:08.590000
CVE-2022-41392,0,0,70dde2ed73a2ca1acb62d97f1037a10d759d68feeff01292c17a88ef4c4582cb,2024-11-21T07:23:08.720000
@@ -208751,7 +208751,7 @@ CVE-2022-42846,0,0,23a4b3ff65377be41618e7251eefb34f40a357350151585288c3c249f6e36
CVE-2022-42847,0,0,607e77b127ac5e5d9754b39a8662f6fa23aef36828985ef1800e14b7011ac49f,2024-11-21T07:25:28.043000
CVE-2022-42848,0,0,64fd155aa7781eb93be60b428e5d1165d8b5a0a9740b094b8ed20ed437902f4b,2024-11-21T07:25:28.167000
CVE-2022-42849,0,0,59c0d9f4399d4a7c081e42d0d01b87f0d1be82073de2938f8a8c1002786b5b16,2024-11-21T07:25:28.307000
-CVE-2022-4285,0,0,aa6a5368d13555eb5cbda4eeceb3d0435453a712fde053004e07228173a35c69,2024-11-21T07:34:56.517000
+CVE-2022-4285,0,1,34fff095036fad6b6606d71b5ec5931ba2fd14a2053f30c5babab331677e9891,2025-03-28T16:15:25.633000
CVE-2022-42850,0,0,7aef950cb3a2596867592a14bdf7711a734bf3e084e2d589327777caabc15a4c,2024-11-21T07:25:28.443000
CVE-2022-42851,0,0,ed4c455dd251ed9411c809cce38393db40eb47c39637cc7c8486bd2d56ead56a,2024-11-21T07:25:28.577000
CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b474616531622e,2024-11-21T07:25:28.717000
@@ -209101,7 +209101,7 @@ CVE-2022-4334,0,0,4a37dee2ebbbbca61bfc2e12bc694d49b75fc95115e1acd3f2a5da45247e9d
CVE-2022-43340,0,0,5db857e0193b1b777f9c5fe586e64ca593781dd141374d371b29acc52a8dd48f,2024-11-21T07:26:18.300000
CVE-2022-43342,0,0,4dc9364dc49314a30ddcdce7ba52cf6cf3d36313b2e10c4eb0e4575c5e896fd6,2024-11-21T07:26:18.460000
CVE-2022-43343,0,0,160e5591155cbce5d8ead8c9b21219717a4c9394cf8fe6af691fdafeff85695d,2024-11-21T07:26:18.627000
-CVE-2022-4335,0,0,dfc8f94a57c5aa547b14a641e4ea1bcfc47c0fbc8e1ccc6f7f234961811732a4,2024-11-21T07:35:04.653000
+CVE-2022-4335,0,1,ba636c67f94d81abb522fc6fcb38741449cc737db34323300f45361f041ef89c,2025-03-28T15:15:42.973000
CVE-2022-43350,0,0,107bd99cb182c98e0b5ed410f1fc9ecaa26ba06a4afcec937a420692dedb7681,2024-11-21T07:26:18.780000
CVE-2022-43351,0,0,b3c3d192a7d15302fcbe416fc06be1b4cbcc193829e5c645ba84e55b2f7be795,2024-11-21T07:26:18.930000
CVE-2022-43352,0,0,8c22797582398d5bce1f15f40f2642b8197db2369ed82668b6a4b1747a7169cc,2024-11-21T07:26:19.100000
@@ -209846,7 +209846,7 @@ CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b03
CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000
CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000
CVE-2022-44297,0,0,a3cb205e93360d21ed0dcbf9c57c5ee9ea0e7844bfec49955da95864fde45416,2024-11-21T07:27:51.320000
-CVE-2022-44298,0,0,ec40d8ca89e2c941ec62c503d492ea166483cf6da327840a2c086399e977444e,2024-11-21T07:27:51.463000
+CVE-2022-44298,0,1,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000
CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000
CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000
CVE-2022-4431,0,0,a997979e77848dc720009496f56aa1bc847b4cf922636fc1e59621262ba1a1f7,2024-11-21T07:35:14.930000
@@ -210136,10 +210136,10 @@ CVE-2022-4471,0,0,15cc2501e5bc6518ea69d268a3b2667e64233e17b4802626ef5527eb650cc6
CVE-2022-44710,0,0,ad9f08e12c0fb5351a2179f6a61747fced7d535659cc0b15f734dbcaaf510a07,2024-11-21T07:28:21.250000
CVE-2022-44713,0,0,a733592feaf7fca1a67d4e144d0a7996e96a6a1f34eadd0a295eb2afece0d67e,2024-11-21T07:28:21.370000
CVE-2022-44715,0,0,5b241799ae6b884fe57141f2d8c41ed6fa02914a646428e290f97256578fe01d,2024-11-21T07:28:21.493000
-CVE-2022-44717,0,0,370b019989f037e96a2c2262b0f3225e0b3668c0e0eb0527ab6534489888b4cf,2024-11-21T07:28:21.630000
-CVE-2022-44718,0,0,c025de4fda89deb0c067b8ab3aea8e39e154a2f234fe3d24caaab84771ed0768,2024-11-21T07:28:21.773000
+CVE-2022-44717,0,1,fcc44a1f406f06bb2056e63a2c3c9b5d3cb55f8cb03838c43ee02480f5036902,2025-03-28T16:15:21.010000
+CVE-2022-44718,0,1,c7201319af1cb5005818428be1e02751c3e8ac6257316e80b6d0ff51af7236d2,2025-03-28T16:15:21.190000
CVE-2022-44719,0,0,95f36d24d2c2f52c1dda61947950688f864c0a30d123ed3b6f30e7b10efb6d32,2024-11-21T07:28:21.920000
-CVE-2022-4472,0,1,b29e148154b8d93946c2fa2b80f2586b95f0fb1c529e9a6fe708b58805235ad4,2025-03-28T14:15:18.053000
+CVE-2022-4472,0,0,b29e148154b8d93946c2fa2b80f2586b95f0fb1c529e9a6fe708b58805235ad4,2025-03-28T14:15:18.053000
CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311beff67,2024-11-21T07:28:22.087000
CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000
CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000
@@ -210260,7 +210260,7 @@ CVE-2022-44955,0,0,e6b0c638389d060355a0f3905e6dd762d666f9040db16167319772a36a253
CVE-2022-44956,0,0,d1b70adfdab776c1c5c0b014d9feac2cad77496972cb9a7a631c2121e94f64d3,2024-11-21T07:28:35.273000
CVE-2022-44957,0,0,fe0e43a3c399e52a8e98ea2a394a187e7e1da0eea6ef55796b0674d6e8d37057,2024-11-21T07:28:35.423000
CVE-2022-44959,0,0,afe42cf127e64338dbf62adbd3682575b6ae471a5c7331b91c6e58ec6af6d692,2024-11-21T07:28:35.567000
-CVE-2022-4496,0,1,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5c1,2025-03-28T14:15:18.247000
+CVE-2022-4496,0,0,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5c1,2025-03-28T14:15:18.247000
CVE-2022-44960,0,0,5c57a054c5232484ba125138b2e5ab52b6bc141f4e49d5a562f6cefb060d96f3,2024-11-21T07:28:35.707000
CVE-2022-44961,0,0,dc0026edf8d696785d4ad8685d73d54e682943337771cc165b834e50c32149f7,2024-11-21T07:28:35.863000
CVE-2022-44962,0,0,e872b1aec92c00d7b59fb3535b11b1ddc2890769fa87f1d1b3c5799210cb1ca3,2024-11-21T07:28:36.020000
@@ -210416,7 +210416,7 @@ CVE-2022-45175,0,0,30a61c8362a73e1541914725c54ffc87135818cfb078974970c7cf9fb5590
CVE-2022-45176,0,0,9fe4c437141397bc2895c3aa0c38bdb79c57450544da1ad7876237c2f815874a,2024-11-21T07:28:54.233000
CVE-2022-45177,0,0,77debef2be9055c7d8e38970cac080d3d6ba0ad3866eb2c1c5f9a6718ceb03a6,2024-11-21T07:28:54.463000
CVE-2022-45178,0,0,6a401299ae1bcd591dc61611b8534391e266efa087de37de33e2a76ab2789ef2,2025-02-07T20:15:32.493000
-CVE-2022-45179,0,0,58e3e288b77c46141c148cffe2cad39ba33ce87f738a27c27babe949d753b696,2024-11-21T07:28:54.830000
+CVE-2022-45179,0,1,16ece4e8c927b8061aa4d1b433ff7f3a765586cb5c2ed51939778c6a2916b884,2025-03-28T16:15:21.360000
CVE-2022-45180,0,0,9f620c4a664e3e793609c73bc097f6ede0c71acddff0176caa3a2a131c9de3c2,2025-02-07T21:15:10.633000
CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000
CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000
@@ -210934,7 +210934,7 @@ CVE-2022-45893,0,0,cc28543c74c21692ae65e94f4eea922c710ffc2b8fc5f1cbd168cd4f78d52
CVE-2022-45894,0,0,7e79c70ca57ac35fb5f5c2136ed71fa4207d68e94574986bd856b7bbaf922cb0,2024-11-21T07:29:54.857000
CVE-2022-45895,0,0,3bc1f058bd6ec4aa0f4a1dd18ff39b3427bd78a51062410d77a3230858be5757,2024-11-21T07:29:54.993000
CVE-2022-45896,0,0,9fd827559105c4a7f955449cb8e47f3ca887d56261af8ddf374327bd081d5e59,2024-11-21T07:29:55.137000
-CVE-2022-45897,0,0,16c917af12185b39e6fb7f1c28073877c91084cfb5d1b5fb970fe5118a32256f,2024-11-21T07:29:55.280000
+CVE-2022-45897,0,1,b2b882ad2f3896bcc19112e03b04415f9e60136eda918633612298a12443690b,2025-03-28T16:15:21.550000
CVE-2022-4590,0,0,5cd48cb7edb0e9432330b5fa366b9c77cd5bd8c0b506539909ebf45436502e07,2024-11-21T07:35:33.203000
CVE-2022-45907,0,0,6e9d516b5e43b2e1627e6ec56aa6c854a29ec1ba3d18358c344f60495559e266,2024-11-21T07:29:55.427000
CVE-2022-45908,0,0,f66bf3c57fd89a02e6324f98e8c7564501d3fba0621e27512aa88dc8ba707e3b,2024-11-21T07:29:55.573000
@@ -211022,7 +211022,7 @@ CVE-2022-46076,0,0,2b119d1b9f44cdfe9d10a31f87575568f9131b5fd98fae292e4ff9f12aa82
CVE-2022-4608,0,0,be843af6d4396743b51db58c72f2505739c01d27b14e0bce118248260ba2d980,2024-11-21T07:35:35.383000
CVE-2022-46080,0,0,68b2b59d09c84516563c3e52ea8ae348c5f72254930a31286339a3a247d9946b,2024-11-21T07:30:06.260000
CVE-2022-46081,0,0,8e27a6a05f54b38f7bc644f5917dc3bad23b46b85a0b29c2cb6a829c10deba7d,2024-11-21T07:30:06.430000
-CVE-2022-46087,0,0,a739745513abaf7f2211850e9542f59106ca6aca5c242a056a8e32098bc80a91,2024-11-21T07:30:06.580000
+CVE-2022-46087,0,1,8a83eb70fb96cdcc4325022904e873ef83281a17756d37d045af2dd4cd910110,2025-03-28T16:15:21.727000
CVE-2022-46088,0,0,fbec400ca51475ba9421a27e08dc711219d99cd09b17d81ab0a9e79792af5963,2025-01-08T18:53:10.857000
CVE-2022-46089,0,0,f19d133bf817c152dc8d9fb5b26b88d76b7110e1c6b600d64f973b4f5a22fb0a,2024-11-21T07:30:07.007000
CVE-2022-4609,0,0,ef6b610a9ab8c4c8cd37a74de4ddd025ba4ec8b5e1e4a1d2ed469fc695c8ae18,2024-11-21T07:35:35.517000
@@ -211254,10 +211254,10 @@ CVE-2022-46352,0,0,00a13155dc5b8ed7b035aa6118159b19d015bd5bbf2970a852fb90f56d755
CVE-2022-46353,0,0,fa817b94ddb190f2f70356e68449128669d0ac6f4734acfa383e1e6cac4ada12,2024-11-21T07:30:26.800000
CVE-2022-46354,0,0,b54e101d98bcc7bdf3369d8e22b533068f967b06511fa3684503bc3291cd0106,2024-11-21T07:30:26.940000
CVE-2022-46355,0,0,305a6a49c47ba6f068e02b03054bb94be666adcbdda42b6f54058d176f63c547,2024-11-21T07:30:27.060000
-CVE-2022-46356,0,0,47d4157e9ddca8e998236534a5386aedc980e3ac45d7e10a2de1ceb15bed17b6,2024-11-21T07:30:27.190000
-CVE-2022-46357,0,0,1199571d73b069c8a397b229ec41ff3adab01a3024cfb151a4adc4046823c825,2024-11-21T07:30:27.317000
-CVE-2022-46358,0,0,3207b80aca3f622184aa8f84e0f2179226e5fb68f75d098d7c685f2088ce1a9e,2024-11-21T07:30:27.440000
-CVE-2022-46359,0,0,4a4ff94774bc64ded5816e90ae0c5cfc0372da1092125a27583479607b2cfa36,2024-11-21T07:30:27.543000
+CVE-2022-46356,0,1,17ca9ad9399acc0a981ea70d03ac8944e2e5914be2c741108861286b4fe17cd2,2025-03-28T16:15:21.900000
+CVE-2022-46357,0,1,7a513a0d79208916fc0a2b920e5168ea7a1b12910c6484334fe4a011f8aeb3a8,2025-03-28T16:15:22.077000
+CVE-2022-46358,0,1,7514a28206684427404b865b5de71c9ba4e7415c25842706199e499397de5437,2025-03-28T16:15:22.247000
+CVE-2022-46359,0,1,7ac9438195587de5deff727fa278ba53c3fc732d2777d85361d36e310b96e966,2025-03-28T16:15:22.413000
CVE-2022-4636,0,0,62b2b9a320d3f7c1b1e6d8c5b7aeab8c8de6365fed0e24bb64bd90fcb920bb46,2024-11-21T07:35:38.497000
CVE-2022-46360,0,0,6a38c899775b07183a85ad93e30f1c636b2d9ff7efcbab2596638f5b481c7440,2024-11-21T07:30:27.653000
CVE-2022-46361,0,0,8123416efbf539917e595ae1846ae046080e1a9d1d86d394dc85bef02bcb6e74,2024-11-21T07:30:27.763000
@@ -211342,7 +211342,7 @@ CVE-2022-46485,0,0,c0c6dff55283dfb771f1a5b37a71bcda6eb783b9616964cb839caae868642
CVE-2022-46486,0,0,273bdea328c05f53d2935ee8b7a4d92db36b6cf750418b0fcbf9c9ac94631bba,2024-11-21T07:30:37.913000
CVE-2022-46487,0,0,65fe5e22876afc2cb9c6b96f2f17c89cd6669debe9e703f15386e0a779e67884,2024-11-21T07:30:38.080000
CVE-2022-46489,0,0,7e5278eabce0e4178abbc2321c3e1cb938d848560691becda1a2dd3dbb795ffc,2024-11-21T07:30:38.257000
-CVE-2022-4649,0,1,4397e99c546f206fb5608e5d52d00f6a11918bbe5a94a37f22c72384e078b82d,2025-03-28T14:15:18.420000
+CVE-2022-4649,0,0,4397e99c546f206fb5608e5d52d00f6a11918bbe5a94a37f22c72384e078b82d,2025-03-28T14:15:18.420000
CVE-2022-46490,0,0,0aba57b3e2c6acedfab8943eea7d30e9d0d314e0e1ad14ca907ef24ac2a1aeb4,2024-11-21T07:30:38.400000
CVE-2022-46491,0,0,1935572f3715f36fc93538c008dc76c9b9fcc6be4c0c502750bd2d8154d14b6b,2024-11-21T07:30:38.557000
CVE-2022-46492,0,0,ea33259e380519928079c589c50e4fd70a12dd967d5e0ef95d74810d65324acf,2024-11-21T07:30:38.693000
@@ -211370,7 +211370,7 @@ CVE-2022-46536,0,0,ba5b7d5056f87a59e895d74fb72cc3d15f19f4be6f0ad992b5fba775595bc
CVE-2022-46537,0,0,12906b63d2f5ad59fda29ada33f3d31b7a7c5331fff3bd5aa033e84dc3f38b67,2024-11-21T07:30:41.460000
CVE-2022-46538,0,0,d9bc61ef0e5ef0fa6f8492952fe761045187c8f765eaebfc4f01b4f3011fd250,2024-11-21T07:30:41.603000
CVE-2022-46539,0,0,fbb842b44c65b836721a9ca80d64c29a6175b84f4a452e4905d88976fa78e76e,2024-11-21T07:30:41.753000
-CVE-2022-4654,0,1,a11ae60e7a08e302805d9954c19f704fabaa96a1b3e3cb64005becb7d6259b17,2025-03-28T14:15:18.587000
+CVE-2022-4654,0,0,a11ae60e7a08e302805d9954c19f704fabaa96a1b3e3cb64005becb7d6259b17,2025-03-28T14:15:18.587000
CVE-2022-46540,0,0,371160f698a610d84ddca173575f46caef28646a1f08e43352262b6cad9c9354,2024-11-21T07:30:41.893000
CVE-2022-46541,0,0,42d88c6d87824269997cb6db2986e2590b1873121ed705f61857a8ae4a496132,2024-11-21T07:30:42.043000
CVE-2022-46542,0,0,12f57bc9080a641356a575564eaec43bb7c38161002f8b8efec9ad7b6d66cc25,2024-11-21T07:30:42.187000
@@ -211712,7 +211712,7 @@ CVE-2022-4696,0,0,d18a6555347b2450931b7a4499108c5f3c4aef62c5e374495c248bc437d3d9
CVE-2022-46965,0,0,4e2cf60cfa574761bac515bacf7768a3ec05fd5353442e98aba963404ab9629a,2025-03-27T14:15:20.163000
CVE-2022-46966,0,0,070bf64185beec1d346f1eb3fcc535a9f501d6d7759507c69e62ea1dfb763c47,2024-11-21T07:31:21.080000
CVE-2022-46967,0,0,7b5e0d7e72e3dba5d588a35fb64ffdf40088372a48d9222c2905273c82086be6,2024-11-21T07:31:21.360000
-CVE-2022-46968,0,0,c503254a3e5c4d42a758af6f17024297295ac5fa736be3573aab667842fa96ca,2024-11-21T07:31:21.537000
+CVE-2022-46968,0,1,0208b36a8bfd03989c26bf3b2cceaca71901f6441bc3e8e9efb8b016ba393792,2025-03-28T16:15:22.580000
CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000
CVE-2022-46973,0,0,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000
CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000
@@ -212177,7 +212177,7 @@ CVE-2022-47629,0,0,ecd587ec973943e78b94b658ce47376bf9dccfda6eb7942d23e1cd5bfa072
CVE-2022-4763,0,0,f67e1ecec8465b4c46dbc7803de4f297df5b3c3e70f59073f894bc3151f9fb1a,2025-03-27T16:15:18.020000
CVE-2022-47630,0,0,3f799235267917659e0db4783bfc8e5510700abf1ffc1463d6e21f2f28959844,2024-11-27T20:03:20.203000
CVE-2022-47631,0,0,b9d0fb147402cddedadc19767080d5a10938d5f7d217604866c1aab222ec952d,2024-11-21T07:32:17.147000
-CVE-2022-47632,0,0,ca6a6aaa940bf5236a134ca32f93c2d6730d787a52fdf59337fbd0136a75a42c,2024-11-21T07:32:17.317000
+CVE-2022-47632,0,1,39d2ec5c8084f35f5b3abff570fa9e08c0a9f0d365e70d611530301e0be74e67,2025-03-28T16:15:22.753000
CVE-2022-47633,0,0,818d067312defd637fcefb490e6552884ddf07000464b4885013dc15f47906fa,2024-11-21T07:32:17.477000
CVE-2022-47634,0,0,1eb5f4755f6705f4bf83845e716a60f55e55b25793646e17d98b3f85caae68ab,2024-11-21T07:32:17.643000
CVE-2022-47635,0,0,61824f2f5e370f575496016f2579c66430d06e60e156153206a133a5be20b065,2024-11-21T07:32:17.797000
@@ -212301,7 +212301,7 @@ CVE-2022-47936,0,0,6e97adbc077ec3b9402c2a5aaf3ed3a5320385cb500437f3dc354b28ce60a
CVE-2022-47937,0,0,538aa7918ded3b5ee10f14520b5b529dde7873a05464016f6d2d3dffbd31a4b6,2024-11-21T07:32:34.847000
CVE-2022-47938,0,0,6389c1b5c121b383d5f7cbe230e889f82fddd1762b25f480f7da52613b44b6ca,2024-11-21T07:32:35.223000
CVE-2022-47939,0,0,57858ffa209fc211ebcee12fc6be5d4d31d662c16e9e4df23ce6732a609d2ad5,2024-11-21T07:32:35.527000
-CVE-2022-4794,0,0,52edd28b17636275b54fca2982e4847be8cca20da284cc3cbc70e58499755cf6,2024-11-21T07:35:57.293000
+CVE-2022-4794,0,1,6e3a44d5ceb655df805126aaab55edbc5a82cab5062efc191610ecb48b22afea,2025-03-28T15:15:43.120000
CVE-2022-47940,0,0,0415c1caf3a79389a5d562c21410d35a138d04792f85abdd3cffe1b9a49da496,2024-11-21T07:32:35.773000
CVE-2022-47941,0,0,84fafe0c88abaef64f8fcec45aff68710d547f9377bd525c134dba046b225c2e,2024-11-21T07:32:36.077000
CVE-2022-47942,0,0,ccdfa5939f84209ad8ae0807591190e976a5ec2ede1c58d505ff099556519549,2024-11-21T07:32:36.300000
@@ -212330,7 +212330,7 @@ CVE-2022-47986,0,0,843d5ab8b25f573fefdf3ea3251218937ed9a6b804784337485155c24e031
CVE-2022-4799,0,0,d8adfba9212661d399d68907e6055576a29a9f48a62d0b6607b21376a8851106,2024-11-21T07:35:57.860000
CVE-2022-47990,0,0,18cb2a978fa8aa0898f2795e6159d13b42c436a17e524d1b78789fc11e58d48d,2024-11-21T07:32:40.867000
CVE-2022-4800,0,0,ba106e13c41c51cfd7b012fca8bf8c05e15d3017934fe4a86355a316d8cb5b7a,2024-11-21T07:35:57.980000
-CVE-2022-48006,0,0,b1a614bb1d5f8a06ae7e6b41a2a9307846c5a756dd9e3c8688f03489e52f529e,2024-11-21T07:32:41.027000
+CVE-2022-48006,0,1,7fe5ba74cc4cbd0ab86cb009befa99c90a20b98b3c2be4c9f3ca81b230050c09,2025-03-28T16:15:22.977000
CVE-2022-48007,0,0,e495582aaae7b4766b16834815d36a3627deec2f02974040c16f82644f043fc9,2024-11-21T07:32:41.230000
CVE-2022-48008,0,0,3c25e5166ffd68ae50646f26caec73e953e310de1ab7a7ab2c3b43c22b068bee,2024-11-21T07:32:41.477000
CVE-2022-4801,0,0,30d9ce15e02d45e233c179bccbab98eb085349e3250f3fbb46a65f2af5b5ac21,2024-11-21T07:35:58.100000
@@ -212352,13 +212352,13 @@ CVE-2022-48063,0,0,6a10cbec286dcf265b027d5e39908826236c5f7040f8b0bccabdc7a7794d6
CVE-2022-48064,0,0,d9352d490528939400414dea624debdec62ce595bdf2bb7f2d4840288055336e,2024-11-21T07:32:46.073000
CVE-2022-48065,0,0,1a3f387e53f3e6836a02be2c0727f86d89342556fd80eca323dd8aa147167eb2,2024-11-21T07:32:46.350000
CVE-2022-48066,0,0,68d282aa79662263908e21b818c51f22afe596add0642ac3d60f16dbb91b9fc7,2024-11-21T07:32:46.623000
-CVE-2022-48067,0,0,20d31ad66bc98dbad6ce47df4492d980d3940665d6c79ebac17f8e6b4768c8c9,2024-11-21T07:32:46.853000
-CVE-2022-48069,0,0,a82f2f370bb538a3e79c8d6cb6c10a0beeae3353637693947b4ff9560aecf40c,2024-11-21T07:32:47.057000
+CVE-2022-48067,0,1,062d782323fc69a20286371113de88f2acdab4ba681ecdabe26333ecd023521a,2025-03-28T16:15:23.153000
+CVE-2022-48069,0,1,64cd37eccd3a384f0ee4b387e9af04654da0ac71212783a40aafbdabe1673763,2025-03-28T16:15:23.337000
CVE-2022-4807,0,0,5fec0ec5de9ff238d1270246f3ab5fb4be56f69a84033aeb95d9a117b23c57fd,2024-11-21T07:35:58.830000
-CVE-2022-48070,0,0,bb7c63c58a758abb8601b08147622753edc859f0be6b16708d42fab798498b62,2024-11-21T07:32:47.277000
-CVE-2022-48071,0,0,956adade7bfb4bda5227c7e3f4fa18bad5fb91a52865614194155df935ed17a9,2024-11-21T07:32:47.483000
-CVE-2022-48072,0,0,77eb2d389fd5e608973a8b149907edd407984d6ee5ed8f74e9d5ae1cbdeb33b6,2024-11-21T07:32:47.680000
-CVE-2022-48073,0,0,2da07f93b7e02d5a7ab19580ce5f8b95b04fa4925f621f6fe3f0a7f22a353850,2024-11-21T07:32:47.900000
+CVE-2022-48070,0,1,20b2fe2c1b222aa24bcb13400745e7af6b4cb5afa29b34b8bbc0fdb19dd2c06d,2025-03-28T16:15:23.500000
+CVE-2022-48071,0,1,22082845bd792c4f5ce9fb6af28e9b6a507cdf0f3dd948ac5bba02cf2b3a3a33,2025-03-28T16:15:23.667000
+CVE-2022-48072,0,1,9951fc4093f273cd9fe05cbaed2fefee977f93a3082122088499759638b0016f,2025-03-28T16:15:23.823000
+CVE-2022-48073,0,1,ee7fe69a65d69ece9dae2c4ac47e4af9d5dd83ebf3a926d29b9136e0fd172278,2025-03-28T16:15:24
CVE-2022-48074,0,0,024026d814c3e458543ee840b0f04b6d988181a00a1c0f49c6e6fcd1f0831515,2024-11-21T07:32:48.110000
CVE-2022-48077,0,0,e114f4d91897dd7440946986bfe77b643704e523f1b6d351a7a2208587764703,2025-03-24T18:15:16.627000
CVE-2022-48078,0,0,22d7c6914cbd00e0bc8e2e4753728522e64fe21d5bd018c6a965c59dec18f17e,2025-03-26T20:15:16.797000
@@ -212372,16 +212372,16 @@ CVE-2022-48091,0,0,b284afd19802a63bb8a53744e2ccdd70bfeba3b8f828ace797a61d23c6354
CVE-2022-48093,0,0,f74f831d2241c43384ba1352e75bc8341a5601808163fb9fe6ed660f58498e92,2025-03-27T15:15:40.437000
CVE-2022-48094,0,0,f0dcf4ce9ff7d3ac834355d7e42ab51d6554828a3dc9b1f8624e04546ce54718,2025-03-27T15:15:40.617000
CVE-2022-4810,0,0,25162b24bf11dc0190512c5405cee16d314c523643e157ba40ee82b21459eb05,2024-11-21T07:35:59.190000
-CVE-2022-48107,0,0,ea86b4df2888c77620f092846cd1660fa21ca354f29faf5cf44596d14ec923af,2024-11-21T07:32:50.230000
-CVE-2022-48108,0,0,8d4f3b9b9efdf48cd29c33c16382d7f14321ac3ec536a714fd38fcbac269811b,2024-11-21T07:32:50.467000
+CVE-2022-48107,0,1,b7fd3a4c2faec39b862ebf1ce6a2319e695b93d8232a53c2cb161d4569668e1d,2025-03-28T16:15:24.193000
+CVE-2022-48108,0,1,b2e6c406616ed2daa604e477e21d91c5abf1e65d5a7a0dd7435dde4a3ca2f92f,2025-03-28T16:15:24.373000
CVE-2022-4811,0,0,c9ad55ad708c43d2e552a2a5cff5f2a41a15cb1ba0ee8006d753aaa8ca172523,2024-11-21T07:35:59.310000
CVE-2022-48110,0,0,4dfdc9bedc7c08ff14ba89cadd1d23d2de867d284056a453d36181031a922c24,2025-03-24T13:15:24.493000
CVE-2022-48111,0,0,6d90f28a337f6a00ea5e92197007edfb483aacede200ab8d61a3d9120f75dc78,2025-02-27T20:15:34.833000
CVE-2022-48113,0,0,774582892b0f857d49807b3b578d023486a5654872981d4d3b62f70345d62a01,2025-03-26T20:15:17.343000
CVE-2022-48114,0,0,59681c6f492dc2dc300b4482a4cfc9897883744188b741dd0035b1b7db528f4a,2025-03-26T20:15:17.510000
CVE-2022-48115,0,0,02d8358a7e7fb3290acfaa6cc9cfc976422606aefeb2f7a592225bc527fcfbb2,2025-03-18T16:15:14.220000
-CVE-2022-48116,0,0,d439e25a633190dba6b6a3f4ee512e50765c42f419fa5db7ae37cbd17c724599,2024-11-21T07:32:52.407000
-CVE-2022-48118,0,0,92c370b1269482a57aea9032555c816c443357bc9aca17b621cb8f86d88910ab,2024-11-21T07:32:52.550000
+CVE-2022-48116,0,1,5531d086d8c9a6559120206e26b3045018dcb7e30f6800995a3f2942de1851bd,2025-03-28T16:15:24.543000
+CVE-2022-48118,0,1,ab79f2d060b611c83a9de63bed2167faa3772ba82fe27682502bdeb97669b234,2025-03-28T16:15:24.710000
CVE-2022-4812,0,0,bbc94f47a7be1702b566e9efac3866803787a08ad1ab3c5f1c6664a83118af5f,2024-11-21T07:35:59.437000
CVE-2022-48120,0,0,2eb4bf6f3b23febe77dbff553f00efd32d0ba60c40fa8808e865b76470dee4b5,2024-11-21T07:32:52.703000
CVE-2022-48121,0,0,c502330d2c963632f98cd6db35dfa0a25700a5a765cd32ec58770fbd955e2ffb,2024-11-21T07:32:52.847000
@@ -212407,8 +212407,8 @@ CVE-2022-48165,0,0,afb678811a8f8b895285bd5354ae0c3c28189104ded28e3e98d5174faa0ac
CVE-2022-48166,0,0,37fe04a355378703a4bc73a39a30cadfbd3325bb4f2bcedcc836867a8de05f6c,2025-03-25T20:15:16.370000
CVE-2022-4817,0,0,f0e15d2c836cdd546ed9d1a4f8bb5eeb7e4b0d94aae1960867b2c42008118c42,2024-11-21T07:36:00.190000
CVE-2022-48174,0,0,ed24bcae7077a6041e46ca4fbfc8590c099d4c58251200e5ceb4edc4cffdc7e0,2025-02-05T18:02:49.267000
-CVE-2022-48175,0,0,6fece746388787891a725bedf1d79c50ba2ce6b9971433a3fe9ebe52c7c3defb,2024-11-21T07:32:55.190000
-CVE-2022-48176,0,0,f9b97f333ed2e0a9d0a9b017dd2531ea920ca2a943855468d38a69dfb2365385,2024-11-21T07:32:55.340000
+CVE-2022-48175,0,1,fd7ba98c93de8d947c4285de7c7d86534333722a75db98d8d2c07153ee201ce2,2025-03-28T15:15:42.600000
+CVE-2022-48176,0,1,1ad627162e55dc2598204dc1df1c79447f4cfb1b23abe6d02c85e0bb2226eda2,2025-03-28T15:15:42.780000
CVE-2022-48177,0,0,95e25759dd088d12027543b96c1c8080df3faec420cf8d676e57941d7d53a75b,2025-02-06T16:15:31.687000
CVE-2022-48178,0,0,f9c4811078153e3368b6488fb606ed2fcd036e09047751e39faa3fd19db6fb3b,2025-02-06T16:15:31.890000
CVE-2022-4818,0,0,8b3c45cd7dbdd501a83bb59b533552d52a9be0650b418b2ad86410c769ef864a,2024-11-21T07:36:00.327000
@@ -214004,15 +214004,15 @@ CVE-2022-4975,0,0,f3499ac468d9abe551aab7c55d7d6df29ba7ff95cc64d5206edf5add6a87fb
CVE-2022-49750,0,0,b5351f5374431b404e9c3222fd8c97483724c46ae8eb51f984311a533787f2df,2025-03-27T17:15:39.850000
CVE-2022-49751,0,0,596ad60a5a0a6c3f3a0c590db41aace2fe14a9dbb854d3c42eb8e9b263a7871a,2025-03-27T17:15:39.970000
CVE-2022-49752,0,0,6f2a3b6c5ddd66a89cf0cbf29b0652c2d0f45731c40c4072843c779a3a8521bb,2025-03-27T17:15:40.110000
-CVE-2022-49753,0,0,888e02712ee9002954dc8eeff4781907d47ad75618c77d785982d6f11bfdfd40,2025-03-27T17:15:40.227000
+CVE-2022-49753,0,1,065e4677785758a60eb825c42870fa421dab565784ca6754c1612668e16a3429,2025-03-28T16:15:24.887000
CVE-2022-49754,0,0,84e2c082700e56193c2159b2deb1ce2dda82c6d170da9319309643d0bf699316,2025-03-27T17:15:40.423000
-CVE-2022-49755,0,0,5782a3e1ce4897067444dad35c1d26e2ea70125a3a4b286c01f1958a8b7f0101,2025-03-27T17:15:40.640000
+CVE-2022-49755,0,1,917b0329667527603f08a3810ac9a3d0926f6259fd8b0701e84c6842d5957226,2025-03-28T16:15:25.057000
CVE-2022-49756,0,0,59c72d123cf02955c49721cefb33dbf5c9cb5e99814c60a6e83ad7e0f15b9801,2025-03-27T17:15:40.787000
CVE-2022-49757,0,0,c4329461c876365124c23649a4c17bda50fce2d79714d1faf6b2dbd8fd328d5c,2025-03-27T17:15:40.910000
CVE-2022-49758,0,0,b4e95e21481b05dafe2fce299f9aea3cba410fcac12aebef190fa8e03c158aa9,2025-03-27T17:15:41.043000
CVE-2022-49759,0,0,770a1f3ecd358b23a166d479d0cc2b25b865f447f1dc48efb70fcecf440b3034,2025-03-27T17:15:41.163000
CVE-2022-49760,0,0,12a7668b827a042761065b0235850d5f76c62b99ada45c1e6f10650b1edee41b,2025-03-27T17:15:41.280000
-CVE-2022-49761,0,0,bfb3f6f13a75d61c3c39f70a4d7aea04c8ba28a618ddf12858eb68bfe69903ee,2025-03-27T17:15:41.407000
+CVE-2022-49761,0,1,0591e76b710c208cc44ac3bee37454b61bf2cfad54ad81dd349c2f58d6eb775a,2025-03-28T16:15:25.220000
CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000
CVE-2023-0002,0,0,d4360529168fea353efb6226181fd2ab0e85944e3049df689718cf07491ef7ac,2024-11-21T07:36:22.187000
CVE-2023-0003,0,0,e9130921c34a8d1b2e06e89be0ccfee8f78c6c04b42ac1af0311d8e1a3808a43,2025-02-13T17:15:52.570000
@@ -214562,7 +214562,7 @@ CVE-2023-0565,0,0,ba96ac3ea6fdcd659ec323f909eb0e52a223900842087ba6d54a7ca3ecce60
CVE-2023-0566,0,0,8a2573b36d1a8c27fcd6c1f11e9fcb744a91bd684a5f7d033f5409de79716c16,2024-11-21T07:37:24.813000
CVE-2023-0567,0,0,f0326b6755e824190cec4bb20f939800cee460e3013859da98d2005078f98bf5,2024-11-21T07:37:24.913000
CVE-2023-0568,0,0,b7e89191b061ad4b9e2ecffdee8c1ec6400eae9c92b3332b3162a0e2d1f51d12,2025-02-13T17:15:55.913000
-CVE-2023-0569,0,0,2cd6c898eaf00192a0df2be58d004f6a6fc0d52b63377e2eda973404fa5c1ee0,2024-11-21T07:37:25.190000
+CVE-2023-0569,0,1,480eb363b34e1688a53b19f15231082cb405f94a2d7db76e4eba6afdf04586c1,2025-03-28T16:15:26.270000
CVE-2023-0570,0,0,d72798e431b993105708f452d019030a0d2f985bd53d4fa7a0ec1ddd8793349d,2024-11-21T07:37:25.290000
CVE-2023-0571,0,0,957d0d83e871133ba89a5943ca136ec0012851324b04e3f199c64dfcde65ff8f,2024-11-21T07:37:25.403000
CVE-2023-0572,0,0,2a5c90598a63f0657596a749f64328b5470a3b3966692640587fe9ee2314a143,2024-11-21T07:37:25.510000
@@ -217997,7 +217997,7 @@ CVE-2023-22320,0,0,1490e1a0bc30f60ed3cf477f5e002d0271f868f08c13d6423b385e47dddba
CVE-2023-22321,0,0,b6b427a124fd3635c61cf3ca11dd7049df41ff1111d08752a99f6deded7d9037,2024-11-21T07:44:31.517000
CVE-2023-22322,0,0,73e6da4b2e93cf5dafd49a0d7d2fe8f5e94d1245561177b15224f176531f8ca1,2025-03-27T21:15:41.690000
CVE-2023-22323,0,0,07c49ab1fca51a9ec6367b94f86b19d2bc9fffc54259f852693eb5bde5e66b72,2024-11-21T07:44:31.740000
-CVE-2023-22324,0,0,30d8117079140c7a1ae9f0e15bdf38893847f6feca6dcf6b3c8c75528c833c41,2024-11-21T07:44:31.870000
+CVE-2023-22324,0,1,c309d900a5871f7c29aa76a0fb990053339f0d0566d82f46c395a0ba2e494022,2025-03-28T15:15:43.277000
CVE-2023-22325,0,0,c137aef31be38ff81d8119e0632a1dc6f32b6d01fd9edca7544c48a1859fb730,2024-11-21T07:44:31.983000
CVE-2023-22326,0,0,11086e586575f5b9fed9df9894c61be7b8de2057f7348b128d6effa23345c31c,2024-11-21T07:44:32.110000
CVE-2023-22327,0,0,67f8a812725595239e2c4bcba8d48b32601ecd79a17d25a0349b80dcdce74f5d,2024-11-21T07:44:32.240000
@@ -218005,8 +218005,8 @@ CVE-2023-22329,0,0,f87a257a3f491ed4d593d771327413fcc27bcb682b9124de27e798796cef2
CVE-2023-2233,0,0,03f299c1d59d076f3123647077160e666b5ecb77282bd585e0ab47f916f62f95,2024-11-21T07:58:12.350000
CVE-2023-22330,0,0,2f72b562c10a58f1bde1370f048bf90c89a94766f9eeedb9676c2eca440dc010,2024-11-21T07:44:34.537000
CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404e77,2024-11-21T07:44:34.737000
-CVE-2023-22332,0,1,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000
-CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000
+CVE-2023-22332,0,0,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000
+CVE-2023-22333,0,1,e9b53e4821c1f5a5970f79e76ba8497a486f49a590930e00df3c607a1dfcba45,2025-03-28T16:15:26.470000
CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000
CVE-2023-22335,0,0,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000
CVE-2023-22336,0,0,f4a7cab6a1ad5814eee212d8dee5da87605af397c1ab560ff48f1b473d5cec8e,2024-11-21T07:44:35.247000
@@ -218660,7 +218660,7 @@ CVE-2023-23145,0,0,945ee191806993ce912abc0c0e77f5ab33f397920a733faa109f95d0c60f0
CVE-2023-23149,0,0,e1ddcd177deb43872b4c27ba355b3038a5d22c503a22db96a62bc5a2e215630c,2025-02-20T20:15:44.923000
CVE-2023-2315,0,0,703c619703c4fce365a6868586db5687509dcceb0fd605dc4600ff1def4a36fe,2024-11-21T07:58:22.310000
CVE-2023-23150,0,0,c3fed49dada791ee0e14dd83171734bc482f05db3917cf64a965cede2313dda1,2025-02-26T21:15:15.600000
-CVE-2023-23151,0,0,2b6ba5f4ad28fe8403b219f96f69c3a286502f418ad0e95646df6910f09d278d,2024-11-21T07:45:54.170000
+CVE-2023-23151,0,1,25cb73bb5dc29dabdcf5ae1c049a18b93af2269cf0d155a1cf517f0785762526,2025-03-28T15:15:43.443000
CVE-2023-23155,0,0,5e459e69628daf4a366e27ac052ae67a9c0c7883cb2fcbe29feac0d0ecfc8d9f,2024-11-21T07:45:54.303000
CVE-2023-23156,0,0,4736570a618e724fd5a0e2bc6cbb8092ac7a6ba00cb16906f0b406a108d65e74,2024-11-21T07:45:54.450000
CVE-2023-23157,0,0,6e6ab6da503db55d21eae312756b4eabac7bb59dbc44453fb0f28dcbbd0f6ca6,2024-11-21T07:45:54.590000
@@ -219430,7 +219430,7 @@ CVE-2023-24060,0,0,9f22102b3cecfd70cc788c7c9875e7a1141618884af2c27424251feefdf06
CVE-2023-24062,0,0,d2f5a93bf7dc1e49a8b689f32f43e7d262343479e601f04db90b39ed876f6972,2025-03-18T19:15:41.127000
CVE-2023-24063,0,0,91c0bd66efb4c4cc0ced958b18d29cddd5fbad4075264869aafe0b56f9fbcd24,2025-03-27T16:15:18.810000
CVE-2023-24064,0,0,7bdb354760226c2d2e74a93d79fcc6ec58b75f5bfa6556fb6667234425e37981,2024-08-19T19:04:26.627000
-CVE-2023-24065,0,0,cb099ee14dce3065aef0c7c9fe48e200772c06486a273cdfe68fcc3de01a35be,2024-11-21T07:47:21.830000
+CVE-2023-24065,0,1,69cfdf2458973d5b4d47f548667bd3d22b60e54c93653ef4a22c9899251dd6fb,2025-03-28T16:15:26.640000
CVE-2023-24068,0,0,2e516df1b4b1b39772e4e8d62fbb86f0faca45f73328ec51c080d671538a0830,2024-11-21T07:47:21.973000
CVE-2023-24069,0,0,81a8009b0b22b98c947d85c300ecd5c78146ee947647e31f35d100536fd0bfae,2024-11-21T07:47:22.200000
CVE-2023-2407,0,0,705817cabb12168e6445a8c22a885a979c3dcf89a4793f3af82096ac1cf0e4cf,2024-11-21T07:58:33.300000
@@ -219779,7 +219779,7 @@ CVE-2023-24528,0,0,711ea0df27e8bcc05461b62500aa392c0d8c19e065c710d842519b0170116
CVE-2023-24529,0,0,7aae9e7ae1d2e162aa697590599e7d0f425c0544d89a38a572d3b8ef723bda85,2024-11-21T07:48:03.890000
CVE-2023-2453,0,0,b4682b88f88afa2ebdcd456dc9795ff06061b8bff91c0bd4d2c1492887ecb51a,2024-11-21T07:58:38.753000
CVE-2023-24530,0,0,7ef676a634c8aba369f9683a0389e1bdb2255cfb96b6e799493b54b2b4a9416e,2024-11-21T07:48:04.043000
-CVE-2023-24531,0,0,b51c2dd327b8e15296fde49ea9eaeabb04a4dbd8bd91fd75e870ab4f55e86066,2024-11-21T07:48:04.190000
+CVE-2023-24531,0,1,6f60a5856c4729dc6a0d7d0c3f7ab189ffbe883041e194db4d7b9d7069bab294,2025-03-28T15:15:43.630000
CVE-2023-24532,0,0,88581f6b3392e74b951288a160bd414980d6e6f0465084eb25057ace37266e39,2024-11-21T07:48:04.383000
CVE-2023-24533,0,0,6648d1bdd94fa7bb91a5be3a6508c5c3313b2cbdedd755f8162815954988667d,2025-02-28T20:15:40.550000
CVE-2023-24534,0,0,3f190c9bf555ba8a80f7c40ca4f179383ac59048cc10bea8746879b358c59684,2025-02-12T18:15:19.837000
@@ -219860,14 +219860,14 @@ CVE-2023-24607,0,0,fcbccb62200552d55bc67a7a7c9180be7ac6ff617da4be510f254ee9b8252
CVE-2023-24609,0,0,425b5065ce3b98f0e73fcc1c781977c19247bf9d8fd5dcbf726c59468e33bcd3,2024-11-21T07:48:13.983000
CVE-2023-2461,0,0,be1487a1c15780c7bd238ec9dc5e462a75262a5204ae751a0e878b4cc2670d7d,2024-11-21T07:58:39.770000
CVE-2023-24610,0,0,85c4b00e7e542c95198ad6a387b66f29f1faa016bb608ff4e1e0b1ec775e3bdd,2025-03-27T15:15:45.970000
-CVE-2023-24612,0,0,ce37fa75c1fe49a6bbdd390f35fa49a1e9e49f0eaabf47997125799e6d936c76,2024-11-21T07:48:14.320000
+CVE-2023-24612,0,1,43f6416384afd118e9c2a0185d9f46e88fe07b1dc184d4576e91bd07f9669015,2025-03-28T16:15:26.820000
CVE-2023-24613,0,0,5ca1d43e4dd191a92da12be074e0cc6e498233454e6eb1b82569d8817e78b94c,2025-03-26T15:15:47.477000
CVE-2023-24619,0,0,487d3fc851d9a5041f94199c22b870ca0759791795e5c41a282f8e2947cbc2da,2025-03-21T18:15:31.523000
CVE-2023-2462,0,0,2e11f3528ed939f0220efc9a7daacc3f67d605017c175a72293b12bbbc9c06ff,2024-11-21T07:58:39.970000
CVE-2023-24620,0,0,3a3bc66320b549a4417001163bc5252914addae68831682c8e3b9eaa5826fb36,2024-11-21T07:48:14.763000
CVE-2023-24621,0,0,05389959742ec3278497f8c9309bd0abe76641449fdb280196a465b94d7bc800,2024-11-21T07:48:14.927000
-CVE-2023-24622,0,0,c066aa46ee63fbd74f051268e86dde35fde0e6bb5c6c60b992fae7fc835b9267,2024-11-21T07:48:15.090000
-CVE-2023-24623,0,0,33390f24adfdc7a5e62bed25c8eee7ece2e7dd3803d0d8ccb6bcdb0ca591df18,2024-11-21T07:48:15.237000
+CVE-2023-24622,0,1,6d0559ac5740e04bfbf91fe6866876b8f6063c78f5ef5dd08f55482aad8797ff,2025-03-28T15:15:43.787000
+CVE-2023-24623,0,1,39f50cfb55094479b5294f1d5a37d0d02bee4b0ef94805ff96fe72cdf0e337df,2025-03-28T15:15:43.963000
CVE-2023-24625,0,0,031358c3cce9ece3e30c39fd1b6a6435b4b4b6ec9c94eaf2c55f80be98ffa71c,2025-02-21T18:15:14.160000
CVE-2023-24626,0,0,f8c05a82508ace6da42ff99c3373707d59b1b90f2c4e5f8dccbbb2c862bb909b,2025-02-12T17:15:14.380000
CVE-2023-2463,0,0,f46badffb051b802c8d4c418e9ad13db7cd5c54b60cd8c2536b7f64dd0d44ee8,2024-11-21T07:58:40.123000
@@ -219988,7 +219988,7 @@ CVE-2023-24827,0,0,8f730733bac740ffbce69a40aba59d618897ba431266e38c3e5c0bab98ca7
CVE-2023-24828,0,0,43a52d219ab3488fd4b93e5ee1f724e169d8253d925a46e53a8393c11319f057,2024-11-21T07:48:28.647000
CVE-2023-24829,0,0,757ecc198ab5fad96b7d5c2ec9ddffa4cce0e57b8d000f4558a7faa7555bd85a,2025-03-27T18:17:25.100000
CVE-2023-2483,0,0,54a2a6fd22199954be9a4481c481dc39884bf44c2bb0745882c6504df8733a6f,2023-11-07T04:12:45.080000
-CVE-2023-24830,0,0,a2a788303d16b4bbe7066c1d165c4268fa176a7064789e7506e2f679a27e6d1b,2024-11-21T07:48:28.877000
+CVE-2023-24830,0,1,3b41ee51c90b22cc18f00324a95fe9eee6383f8e4b1fe1c8d865afb0405f29b7,2025-03-28T15:15:44.150000
CVE-2023-24831,0,0,d7949a9dd2d43d5627cd41a481e10331ded3e77c2336200ac5129910a4bd8ccf,2024-11-21T07:48:28.990000
CVE-2023-24832,0,0,caf4a483f2cb7c8fcdf75ef85a3c61dff115a7f19facb4a1cb945c56705d42cf,2025-01-21T21:15:09.160000
CVE-2023-24833,0,0,975e396f7c3efc181ab7fb3ab3c5840503ac5a70f5ce18fa48be1249aadb3e19,2025-01-21T21:15:09.350000
@@ -239044,11 +239044,11 @@ CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b
CVE-2023-49539,0,0,fa31534f56545ea133b0ffca594c9cec771dfcd7a58fe43a64b5181a65ad6cb7,2024-11-21T08:33:30.410000
CVE-2023-49540,0,0,e1bbeead0d4c47048abd2a39187eb4c0af1ee24fb9641e708f014f21bbd6a369,2024-11-21T08:33:30.643000
CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000
-CVE-2023-49544,0,1,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000
-CVE-2023-49545,0,1,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000
-CVE-2023-49546,0,1,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000
-CVE-2023-49547,0,1,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000
-CVE-2023-49548,0,1,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000
+CVE-2023-49544,0,0,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000
+CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000
+CVE-2023-49546,0,0,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000
+CVE-2023-49547,0,0,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000
+CVE-2023-49548,0,0,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000
CVE-2023-49549,0,0,9a2cebaebaf97239f2bfd9173576257a692bf9d1d5d1560d13729dd131766317,2024-11-21T08:33:32.147000
CVE-2023-49550,0,0,90ae251e67635b7fa54b057d1493ed9eea320b49928086b9b51c17ca0a7c6b29,2024-11-21T08:33:32.297000
CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000
@@ -239373,15 +239373,15 @@ CVE-2023-49963,0,0,716a28f46de42a2e56dd2dbb762be5dc774690d8da0a8361cd05a453c1e45
CVE-2023-49964,0,0,68e81d9007921be61201b4b69446355cbaa46e44d19df4f8532af74e68f85bb0,2024-11-21T08:34:06
CVE-2023-49965,0,0,ef388bac4cc546bedef71999d058081ade12398c6f30adb285e66370d4c444b9,2025-03-27T17:15:41.540000
CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000
-CVE-2023-49968,0,1,97377596cdba5536ff0311c7d520808ab6dc15969b28250280847661805e1558,2025-03-28T14:32:27.133000
-CVE-2023-49969,0,1,b0aa2df24f015e2ec9dd6eaf374adcb2f950caeca313a4a225d569537ebe772a,2025-03-28T14:32:21.523000
+CVE-2023-49968,0,0,97377596cdba5536ff0311c7d520808ab6dc15969b28250280847661805e1558,2025-03-28T14:32:27.133000
+CVE-2023-49969,0,0,b0aa2df24f015e2ec9dd6eaf374adcb2f950caeca313a4a225d569537ebe772a,2025-03-28T14:32:21.523000
CVE-2023-4997,0,0,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000
-CVE-2023-49970,0,1,554f580e23ae19185eca0545f17817222c5a39acf2827ea39ca7f2b008b86908,2025-03-28T14:32:11.623000
+CVE-2023-49970,0,0,554f580e23ae19185eca0545f17817222c5a39acf2827ea39ca7f2b008b86908,2025-03-28T14:32:11.623000
CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000
CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000
-CVE-2023-49974,0,1,348ee359439081d72ce9187bf69627ba1126d6b681312b67518b561274e51026,2025-03-28T14:35:30.683000
-CVE-2023-49976,0,1,7842662c4b0af2daa6730e8628313d9027337d2060a5820d0de30539d035a521,2025-03-28T14:35:34.803000
-CVE-2023-49977,0,1,b7af45a0db923330a861cac6d351021b003f94dac16375865374f3de5ce43d3d,2025-03-28T14:35:38.520000
+CVE-2023-49974,0,0,348ee359439081d72ce9187bf69627ba1126d6b681312b67518b561274e51026,2025-03-28T14:35:30.683000
+CVE-2023-49976,0,0,7842662c4b0af2daa6730e8628313d9027337d2060a5820d0de30539d035a521,2025-03-28T14:35:34.803000
+CVE-2023-49977,0,0,b7af45a0db923330a861cac6d351021b003f94dac16375865374f3de5ce43d3d,2025-03-28T14:35:38.520000
CVE-2023-49978,0,0,fa500e23f48da6df2a860b98eda481781ba05e9f7f13de0b425bad34116a5f73,2025-03-05T18:51:00.240000
CVE-2023-49979,0,0,75f23943a375ce8279e3286ef1840c70cb95a9e90cf00813fe39f1dd23977277,2025-03-05T18:51:45.150000
CVE-2023-4998,0,0,e165eb9587ade3f2685138122c6908d08aa666717671177d785c6c36e56a4e40,2025-02-11T02:15:32.447000
@@ -240145,7 +240145,7 @@ CVE-2023-5126,0,0,9ada6a8f2e9b9491a8fe3f4eeafb2a31d386842291921479a06d9dd8a73add
CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130e0,2024-11-21T08:41:06.983000
CVE-2023-51277,0,0,ab81eaea8de114fbc99d2d9587fb99b0e511144ce0a98dd0d340bbd095f06374,2024-11-21T08:37:56.290000
CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000
-CVE-2023-51281,0,1,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000
+CVE-2023-51281,0,0,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000
CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000
CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000
CVE-2023-51293,0,0,572ed6a446805f6a16a7884a5b142aaa064f4477ce8cda8bdc3dc8fa68963f57,2025-02-20T16:15:34.460000
@@ -241623,11 +241623,11 @@ CVE-2023-52928,0,0,b6d1e170ab6b9a1d89619faad3623a2192246996bcad7b2f08195be8e1a4b
CVE-2023-52929,0,0,3d93e8db817e6afc68e68109399530a663cdffb38d7c35b1b3ad0b893f452347,2025-03-27T17:15:42.353000
CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000
CVE-2023-52930,0,0,7791df57d22b8264796ac5cd6d676e2efe506a777a2de3b86ddc88649835c511,2025-03-27T17:15:42.477000
-CVE-2023-52931,0,0,43498402483dcb8b2bfc9de061f1281cf84fed29d25cea98c8a368008e8ce11a,2025-03-27T17:15:42.800000
+CVE-2023-52931,0,1,6023213dfcc17cd36459559c882b1c1dd68264235cf609ea6f406331c5233b1f,2025-03-28T16:15:27.013000
CVE-2023-52932,0,0,31b94b5efee31e07f9d39a5269b242a5b788e4c664f9e596c421716d12e2d2ab,2025-03-27T17:15:42.930000
CVE-2023-52933,0,0,91317a1a8bd8d5a0e442b8d89cbe595ae93bf1c7b67b21ef05d54c7d6dd13b44,2025-03-27T17:15:43.063000
CVE-2023-52934,0,0,622e77329d5435b0653f5a8f560206e3ebf65bab1487f792c983ac25d531952f,2025-03-27T17:15:43.207000
-CVE-2023-52935,0,0,73ff48519ea6e9bd61a239f2a8a23ba2739bd95fbf504d7111a517f1f3cfd111,2025-03-27T17:15:43.330000
+CVE-2023-52935,0,1,2a466ee7194bb32131f14ea1f0dbdd14c6eecc7744ce198416f83b35d6a81e62,2025-03-28T16:15:27.180000
CVE-2023-52936,0,0,95b12fa00acdb5a115949fe570726a54b77f6830147acd6bc729fcaf54329989,2025-03-27T17:15:43.450000
CVE-2023-52937,0,0,46c39849dbb71683675077522bb1fe92fb0b33f30fbc2c37c6a2fb7054679004,2025-03-27T17:15:43.577000
CVE-2023-52938,0,0,2d56eaed33aad4436d5eb3d11a04f84436a7e7fa50bd9869f82a88c05fa41687,2025-03-27T17:15:43.687000
@@ -241688,7 +241688,7 @@ CVE-2023-5300,0,0,eada94012fd708691ea3792cf6b054b3ad0de381a1556cd7e6c92c322c4e2e
CVE-2023-53000,0,0,3c0cd761098fd6674115ee83edb37b1a3b1bb72c0393526e8823de7246df939a,2025-03-27T17:15:48.810000
CVE-2023-53001,0,0,069414a508ab78120cec72fb95d3d5d8b666b134713f4f4fff351e686addd6e3,2025-03-27T17:15:48.927000
CVE-2023-53002,0,0,bb67faa3f18f4c01a97d0e82fc6be679831c20c0cbe629fccf8f16c8eda9c942,2025-03-27T17:15:49.050000
-CVE-2023-53003,0,0,8477eadab90bf54147878c2b99d55da4adec83e6fe5dc79a32d95df28700e5d0,2025-03-27T17:15:49.170000
+CVE-2023-53003,0,1,ce4c02d54d4b74d10f889496b149231e6babd57397a676951d4fa860122fca8f,2025-03-28T16:15:27.340000
CVE-2023-53004,0,0,19ff2cf93584b5b6a78da4ded212948a2f6f855fa3fb89568492a1a569fa37bf,2025-03-27T17:15:49.307000
CVE-2023-53005,0,0,7c9d3bf074339f7b3b76e341fdadc901ae6f3875b3f6d7f1c7e1a6767667bdf4,2025-03-27T17:15:49.420000
CVE-2023-53006,0,0,63302919eabc0944262edc4c553b19d39e5f5dc0433392ca6a521f914721f1b8,2025-03-27T17:15:49.543000
@@ -243569,7 +243569,7 @@ CVE-2024-0037,0,0,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05
CVE-2024-0038,0,0,baee8527daa9fa065a043ee87cb5ae43b4d4acd906f6069ea7197faff9b6110c,2024-12-16T19:02:43.323000
CVE-2024-0039,0,0,abfbbbb69ca94190c6c5a5331ed6878ccd6fd34c98f0bf9365113718b0747cb2,2025-03-13T19:15:40.940000
CVE-2024-0040,0,0,482e23ff76f3327407e40e3d508d01e97e22ee3b05630d7571f0b9bc84b62862,2024-12-16T19:16:31.127000
-CVE-2024-0041,0,0,30f391e32967bb0baf25d8a5436bac2e10d105d6b34926d3751c53b398bda865,2024-12-16T14:47:50.477000
+CVE-2024-0041,0,1,300bcc6d1896f6ea043184e372af29b6bca681f501ce10670683044877304be7,2025-03-28T16:15:27.517000
CVE-2024-0042,0,0,7265bcce4e87025566b81559e9a2a904d94427e17ed2d8159b49b70351e50b78,2024-12-17T16:47:02.183000
CVE-2024-0043,0,0,9c5415d367b2b00fbb658ba49909a69019febd5394910268036d8c799fd4ab53,2024-12-17T16:47:21.967000
CVE-2024-0044,0,0,390eee44c5719eb873a39ca1024261a0f80c6eacd2c165a8bb8bd19adf315b80,2025-01-28T20:15:30.207000
@@ -244376,7 +244376,7 @@ CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c
CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000
CVE-2024-0902,0,0,e5c0bb07183b8e8ea4fd2c82afa13d6b327e88a61d78f9e115d171da58ecf313,2025-03-26T21:15:21.037000
CVE-2024-0903,0,0,5bd10efc0a81076e6dcfdb52608d45c3ac855afff6ca0448ee1a48050ad1a1bd,2025-02-05T17:42:03.150000
-CVE-2024-0904,0,0,45daa3dbc580b949bca4e58eb311d6c298c2232cb68c307457b71e82318860c0,2024-11-21T08:47:40.290000
+CVE-2024-0904,0,1,f6f2dface0fc99cba17c1738c7ee6dc5f4f1df1af5d8a74cf0fd946b4d0d6eb7,2025-03-28T16:15:27.737000
CVE-2024-0905,0,0,60c2a3fa899fcc1baf7ef2a8fb1eb0ba21e33e967f759165b74dea3036464f8e,2024-11-21T08:47:40.503000
CVE-2024-0906,0,0,b560aa75cc11a08ab9bae11619e6dc3e28ea0827998e95e1f1f5e2b9362fbfc5,2025-03-13T01:22:21.293000
CVE-2024-0907,0,0,80ce163e8f6522eafa09b16e328ae6a26d722bbfd36eb6494359f0687a798e67,2025-01-15T17:20:49.153000
@@ -245118,7 +245118,7 @@ CVE-2024-10666,0,0,49bf1c01a7a40d59a213466d88a395d5e2ef5e66732ceed7fef597c7d0ebb
CVE-2024-10667,0,0,678bf083c89c7ad05bf9bdcb575b9b9fdecc02dbedf8c91a13e006db67595539,2024-11-12T13:56:24.513000
CVE-2024-10668,0,0,93cbbf53783e16fa0a9d8a3b30d47fcdc6406d426c60c5d4265b9af3c5cd40c8,2024-11-08T19:01:03.880000
CVE-2024-10669,0,0,fb44b1243a144b1dffb90ec9fe140819e957513cdc69a368b2a19c2a439fcfb4,2024-11-12T13:56:24.513000
-CVE-2024-1067,0,0,23462754aaea9bc16ffcf18a32d74989744681f4619dcc72667b9405c467e563,2025-03-27T15:15:48.533000
+CVE-2024-1067,0,1,170d3ee34baabec8cd796fb4b256e5279d80b07377f017805a48ac07309cfff7,2025-03-28T16:24:03.043000
CVE-2024-10670,0,0,fc4dc2f92f41a32f5830ad7ce6a6ea6300359395964e63c0636a1c1b5312f505,2024-11-28T10:15:04.987000
CVE-2024-10671,0,0,06cf170e7e09d10891696c258d1d2ab3f3b0d3a88e2826c32f8b9ea1ac747db2,2025-02-27T21:39:15.790000
CVE-2024-10672,0,0,038616dbdf9b791477ee35e1c0e0d65b1608f7b4ce47df77f94b07306e965f3c,2024-11-14T18:49:26.733000
@@ -245947,7 +245947,7 @@ CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155
CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000
CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000
CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000
-CVE-2024-11504,1,1,2d88e5e7be479df873d338e951bab20c84937b0425549a8c20401e5aaf19ae80,2025-03-28T13:15:39.663000
+CVE-2024-11504,0,0,2d88e5e7be479df873d338e951bab20c84937b0425549a8c20401e5aaf19ae80,2025-03-28T13:15:39.663000
CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000
CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000
CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000
@@ -246067,7 +246067,7 @@ CVE-2024-11618,0,0,0e3a6f9f43124700db03eb1b663dd8529795046f0f664ad17bec9e799f8ac
CVE-2024-11619,0,0,199afb7118552bdb4d05394f3b278f423ca0e36121b2f9801d8d56e20db43382,2024-11-22T21:15:17.500000
CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000
CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000
-CVE-2024-11621,0,0,b329e79916cee7e61bce0b4c4fc0f8c914ac36e6f0c6fffb8c59ef58794213eb,2025-02-10T16:15:36.937000
+CVE-2024-11621,0,1,b716cf6b4803ca216c4e81796276990cde1870fd08da47681aad36842a97ea71,2025-03-28T16:20:47.230000
CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000
CVE-2024-11623,0,0,345d50a6159ad332bf74d1f96fee6efc06141172f84c2187cf001be392bba81a,2025-02-04T14:15:30.480000
CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000
@@ -246121,9 +246121,9 @@ CVE-2024-11667,0,0,d49984260edd35324ade252d16fec5f82013df20426b06aae02e4e32d5501
CVE-2024-11668,0,0,951435f777624adb56d5c11f0805bf2011a10a2c13f46ff08847d8ceb122c0cf,2024-12-12T21:42:07.607000
CVE-2024-11669,0,0,ac5ab35209eeafc67a9dc11e753687674b6fd098af988beaa09e6cf26c867fa1,2024-12-12T21:11:00.737000
CVE-2024-1167,0,0,305374f1d68abba26470a704fb70617e13ceb2e36f31540f4607dc864f81e0e0,2024-11-21T08:49:56.880000
-CVE-2024-11670,0,0,de64fe94b2cd253689c66cb91ad0cd7fb28b5eb208230d56c5477bd17ea489cb,2024-11-25T16:15:12.173000
-CVE-2024-11671,0,0,eb17c618d92fcee412dbbeb034b7c16ae8e65659bedd5ba21c4d072fad7e5dca,2024-11-25T17:15:11.930000
-CVE-2024-11672,0,0,bf46558436febe8820ce5316caa86f0ac93f619fe18c6a235420f3102399170a,2024-11-25T17:15:12.110000
+CVE-2024-11670,0,1,6719fcdd75d861dee74534df3d79a8b705a494c116f8eba5975b3fb08eb1d864,2025-03-28T16:22:03.903000
+CVE-2024-11671,0,1,f79cddbef5cf70c954b58f32ce9cb315934ede2b37af192e57815715324c2257,2025-03-28T16:21:57.537000
+CVE-2024-11672,0,1,d34ca615eacd14e52f26bb63375746506f57b350da43521a6ef6d66a75e498dd,2025-03-28T16:21:52.263000
CVE-2024-11673,0,0,0d00d4d39b53a8278b1de3de8092c22108c327ee83acb79cd6542488ef159a5e,2024-12-04T20:10:53.617000
CVE-2024-11674,0,0,b99e67536e775612f00c93fb9f7c72cd8676a407cdf947c51a3b5c576cc735d5,2024-12-04T19:35:52.697000
CVE-2024-11675,0,0,3307440f3fbc1d0020addd10cbdefb08c2908e3f9d73aa5c6b8271db5c084b9c,2024-12-04T20:15:39.110000
@@ -246601,10 +246601,10 @@ CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408
CVE-2024-12144,0,0,5ad374ae161b81c02dd52fa717a7d20838d0374ff8a2c01287b8a69e49581cb1,2025-03-06T14:15:35.297000
CVE-2024-12146,0,0,94e303002d6bd6731794caf755e131a26c106cb9795464278d57fb494be8940d,2025-03-06T15:15:15.137000
CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000
-CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000
-CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000
+CVE-2024-12148,0,1,16e949e4c0812a2d78a8443d5ae4b5d79a9a13cdd58307868257c2ae017b92e5,2025-03-28T16:22:20.900000
+CVE-2024-12149,0,1,a83993a4e2ca147f0b32ff65add4dc0ab0b5074a07c8437da6cd01b3bb0a535d,2025-03-28T16:21:47.753000
CVE-2024-1215,0,0,4329416f300d2c475797311e08de13347ae9dc69f951944050207e3d4abf36b5,2024-11-21T08:50:03.560000
-CVE-2024-12151,0,0,958cd3e076f1ea17ca0ad827def723dfad6dc87ee6b3f8172337cf6f1994be20,2024-12-05T19:15:07.773000
+CVE-2024-12151,0,1,e8d13992532d4961aa37d540eb10e8db5aced703c7e96584b766e12d7b5a1d81,2025-03-28T16:22:18.057000
CVE-2024-12152,0,0,5a1d4d7f0aa379bbbfc5c795af6f48efa7d2c7af7b58f75617e710a6121e79b8,2025-01-07T10:15:06.577000
CVE-2024-12153,0,0,ee8fdb07044f47e63da8bef3775a8e8b6e3c5cfbf491a775b0902d77fe82a75e,2025-01-07T05:15:14.927000
CVE-2024-12155,0,0,a9bad28298e0ff298ba13b998a693d2b1a968d7ec52abbb9a976f5fdc4810431,2024-12-06T09:15:08.417000
@@ -246650,7 +246650,7 @@ CVE-2024-12192,0,0,0a29f7559d21fa1227318f7f3dd3f9a93d503d8f394ecef90429464dd2f95
CVE-2024-12193,0,0,7e0eccdf2f5215d62c837f8197a84447bdb2e4fea9aa46ebfa91ed1dfc673a1e,2025-02-10T21:15:16.483000
CVE-2024-12194,0,0,69feab87364cc89565f3dd964ae57489f5b3238977846a656dc7e5c80491236f,2025-01-29T17:15:27.590000
CVE-2024-12195,0,0,42de4954f88d78277d068242b43ff46a49abd4e0966e9a8a6c1cda915a565bb3,2025-02-05T16:50:05.270000
-CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000
+CVE-2024-12196,0,1,a2eeaa964232e90bac8cb947a50e1956c1c9243acbc57644deb089f152d8d7ad,2025-03-28T16:22:14.803000
CVE-2024-12197,0,0,a991ed72580cfd4b38e90f0a4c77bf80911efe3d113b3ef2ac31717c62ea91e3,2025-02-10T21:15:16.587000
CVE-2024-12198,0,0,c209536c0ad6829b7f8711360506c4544aa031e11b77e25c1551e1f35b2f09cd,2025-02-10T21:15:16.683000
CVE-2024-12199,0,0,7276b0adf8d6dd5f8bc47ae2cf0e61c646ca073d344509518492123f3f4bee27,2025-02-10T21:15:16.790000
@@ -246789,7 +246789,7 @@ CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4db
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000
CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000
-CVE-2024-12336,0,1,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000
+CVE-2024-12336,0,0,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
CVE-2024-12339,0,0,3eb83436990555e2815b093662c73c0abac18956e62294ddc11370b3651631b5,2025-02-19T08:15:13.907000
@@ -247393,12 +247393,12 @@ CVE-2024-12965,0,0,da8c6ab28cc2b34137be07155a862e7bf1f082dc2ba9f4a6760e921794d49
CVE-2024-12966,0,0,c2b788294439f0bd0f3bb8909eb1d3a1c2116e47ff310cc9b143408ca5228aef,2024-12-27T17:15:07.733000
CVE-2024-12967,0,0,5895d3ef9d4ecd62d5689ac4ca7745f936872ccc81d8e05395b0655899467c3b,2024-12-30T15:15:08.143000
CVE-2024-12968,0,0,352f3215ed40719a7a3c8fe635fe1584f3733d062304c5ff3d490633f369371a,2024-12-27T17:15:07.867000
-CVE-2024-12969,0,0,96938b98061df41a07f7d7458298190ea191c6a72f4ab846d1adca80ab0a48d2,2024-12-27T17:15:07.993000
+CVE-2024-12969,0,1,1f11b9374a66d1fb16358186560d12b2caedd2691b31d066e1c4e0c7097ca3c7,2025-03-28T16:59:21.010000
CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000
CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000
CVE-2024-12971,0,0,c2c5c3fe38e87deb07976a7e25dd1dc1fe90714181112bc7a4543d9c7913a870,2025-03-17T10:15:14.797000
CVE-2024-12975,0,0,d2fcfd8a6ee09a057f1e63cdb3bd18d308081cd2bf8b6a1de24fe3b24c862cd2,2025-03-07T17:15:18.263000
-CVE-2024-12976,0,0,a7896141b08b975c59cc02fb56de4b5b8fb1f07cc8194762ff5a1f544ab3be60,2024-12-27T19:15:08
+CVE-2024-12976,0,1,d338d7730077b4e2e2cb08ffc6b8698552ff9ed3642a985c41ffc4b5f2d8ab94,2025-03-28T16:46:04.210000
CVE-2024-12977,0,0,a3d393b71af82518afafbd1c679660f25331ee3d2ea0704ebcda5ffbe8610a8d,2024-12-27T19:15:08.130000
CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa3fc,2025-02-18T18:51:08.940000
CVE-2024-12979,0,0,ae24db0e4f2a66f4e1de36af93143ab82962ea0c4d3e66e74916a1e08a75a73b,2025-02-18T18:50:22.963000
@@ -247406,7 +247406,7 @@ CVE-2024-1298,0,0,0071f245b4c3dcfe4cd2c1a3c0fb04eecaf156fffcc1dcce4f925fa8cede47
CVE-2024-12980,0,0,6000ffa079d16649502ca9127ef4a551b968e4d7369085deb6f16c832355001b,2025-02-18T18:49:54.517000
CVE-2024-12981,0,0,ffddc97766707b80fc85f7b3ff8a42f8a8881f710bf091525d28a760073377ad,2025-03-05T18:42:42.580000
CVE-2024-12982,0,0,e7fb56a3ab6559658c6d7a80dd35f9732df0dd37c08bc66d7cc5ed7d2da0d409,2024-12-27T16:15:23.540000
-CVE-2024-12983,0,0,f0f1274b31531cd87e4ac88beea7a68c21418dc0cc88382516efb32282ea81e5,2024-12-27T16:15:23.683000
+CVE-2024-12983,0,1,40fdd11d916f5e2224d090f9a6008ba93589e46cd23030a88b2e718a361982b4,2025-03-28T16:44:14.160000
CVE-2024-12984,0,0,2f1f6d47358f5bf062b046e597be4abadb2d2163986aa69703e28be2bc64f2f0,2024-12-27T15:15:11.957000
CVE-2024-12985,0,0,d4a76a2362f1758d86bddad7f928601739b4725522b1084e160f0600dff7746c,2024-12-27T16:15:23.807000
CVE-2024-12986,0,0,7dd3f2d726dcb5a458fc7b91b18601177f669d7d46611c5cd80f422704f659a7,2024-12-30T15:15:08.390000
@@ -247922,7 +247922,7 @@ CVE-2024-13493,0,0,42ff21ae6aacbec92978e0ea28bdc61ddb564d9f2d81f25e9d1e5dfa73ff8
CVE-2024-13494,0,0,bede3e10bcdce16bee9938d3ecfa7092e216537a6cbcb1d2c48a7a5ce0afd5fd,2025-02-28T01:45:06.390000
CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000
CVE-2024-13496,0,0,ca4235722eb0c1b0c268a8bd76cbfc815627bfc3542c099f00d4dcb1d8de6fe1,2025-03-24T16:15:17.677000
-CVE-2024-13497,0,0,da2b34d3e4d3b61573ec8f37b148644657fc3757f1bd2d1efa920af58f1069b6,2025-03-15T05:15:45.713000
+CVE-2024-13497,0,1,7e5f1faf09475917f5ba6a8212d92ad65e7d109bfb67898560962e2f63abf3e9,2025-03-28T15:22:59.280000
CVE-2024-13498,0,0,b5de2876eaa7badfb1de048e1b1406951067b1c844c8c3988a0993e0d4b2c048,2025-03-12T06:15:21.360000
CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
@@ -248187,8 +248187,8 @@ CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
-CVE-2024-13771,0,0,949738633d703300748648fb69f661517bd96978bb56c94eead1be99afb2462f,2025-03-27T01:27:47.273000
-CVE-2024-13772,0,0,e18724330a936d4d790bad539c0685998ca571e65ae4da14273706ffc70edac4,2025-03-27T01:22:24.920000
+CVE-2024-13771,0,1,78dfb02d91ca05c22b83526f5bd3a521e54cc499bf63c37fe482b93e99d97dd3,2025-03-28T16:18:52.857000
+CVE-2024-13772,0,1,1d5961251148beac7ef936803d48aea86b346d1b5b12d83fc965e64f4e204bde,2025-03-28T16:19:00.850000
CVE-2024-13773,0,0,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000
CVE-2024-13774,0,0,7926f46cbbe245fc4b69a913b305cdf8d086f57fe42cd5293333d393cb9ec93a,2025-03-12T17:01:06.413000
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
@@ -248326,7 +248326,7 @@ CVE-2024-13923,0,0,a528ee5b51622639984378ce5c82c5f3996bc4ee38135a9723b678cb2485b
CVE-2024-13924,0,0,6771f2a575eb9b234ba437c9c60a2d5807f8aded376287df6e1ca4c3782207e4,2025-03-12T16:23:39.567000
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
CVE-2024-13933,0,0,6c1d1592227807572b59c7607e13d58cd1b568936f1ec0b9bb42956c7610a4b0,2025-03-19T12:15:14.003000
-CVE-2024-13939,0,0,9095ab11c8403140c63d606d75e5bbd0f4652ec635cba4d1445fca7f23b40b58,2025-03-28T03:15:15.720000
+CVE-2024-13939,0,1,38d580b9d85dd0c996da33a34ded1f6d0701bf667118050526eef3a9b842f5c1,2025-03-28T15:15:44.340000
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
CVE-2024-1395,0,0,ed536711b27a260dcabc83b13b40c152f8095e7ae0057538c9212759790c4e88,2025-03-27T17:07:28.860000
CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000
@@ -248511,7 +248511,7 @@ CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e
CVE-2024-1585,0,0,71ae3df5898ed1d800d67a7dfb8fb2405deb4fb1f3280ed74a24204758d911c6,2025-03-05T19:19:46.430000
CVE-2024-1586,0,0,d57c818aba605692857b8a35b32d1b940effc9e4cce5f547504161c2949193b3,2025-03-04T12:36:37.443000
CVE-2024-1587,0,0,a9ac802b0d54a903a0bf85abcc1262ce1879d4e5c364dccacbaa8e6bba3919e3,2025-02-26T19:15:20.073000
-CVE-2024-1588,0,0,e155d43c506fceff5742262863e16ba18d051d3214971949c228605f64495c11,2025-03-27T16:15:21.190000
+CVE-2024-1588,0,1,a1aa523f4dcf5313914b401109afe06ae5b407d4667f0ad12f7a9b5c3e0bdccd,2025-03-28T16:18:52.937000
CVE-2024-1589,0,0,3828cec5ba897ab5ce440048677ac8f1e63575e630c777982dc0f31348db94ab,2025-03-24T17:19:10.643000
CVE-2024-1590,0,0,6d9b04d7b981210b45fa2f9cd9264abc183d984b67f454db5f762b263d057df6,2025-01-28T17:32:02.713000
CVE-2024-1591,0,0,47a6e7f965ad05e89026d1d1c7b51b4fbd3e2a179c0283326c20740ee574740d,2025-02-07T15:07:53.133000
@@ -248673,7 +248673,7 @@ CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729
CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000
CVE-2024-1762,0,0,fe2beae86ebf429743526632269b9e47ac722f6147b2c8ea526e0fa203619a09,2025-02-07T17:47:17.933000
CVE-2024-1763,0,0,8012c9da585ee6f917a9409a9833d6a11a3350a300f66a5f7f8d81c0e859cb09,2025-03-20T11:05:42.940000
-CVE-2024-1764,0,0,9af00bc3a2cdec19cf0cc3ce6677a0f4b515b26edef4b60b7c6a5e9330153847,2024-12-04T16:15:24.527000
+CVE-2024-1764,0,1,fb5950e9c2eb3377549da03b033a5389af3ad3394da3193aba65d703dceaadb1,2025-03-28T16:21:19.423000
CVE-2024-1765,0,0,59c91913d171a81fb5475f94729055825298c4825c2c1c89296f006dcdad04bf,2024-11-21T08:51:15.800000
CVE-2024-1766,0,0,26479150659cd3f5df7acd169ad3dd6cdc1c4baea7cebb71839a8afc07aec3fe,2025-03-21T19:16:28.867000
CVE-2024-1767,0,0,baef958abb8d02ce0e77d39e5455301fda321cb3c7dbc1f62e744892ba3db05e,2025-02-04T15:37:30.920000
@@ -248805,8 +248805,8 @@ CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1e
CVE-2024-1897,0,0,67d87c13c5ecef27a8c7d05c9fe60fa40e1af48fc634d9ba72f95351d0f4bc02,2024-11-21T08:51:33.080000
CVE-2024-1898,0,0,0c4d43c4434078b331d9877a59f5107e1cb59b494a30bef57836c972a47b5072,2025-03-14T01:15:38.407000
CVE-2024-1899,0,0,40fb5e76195a966ed2f9c2f9f806f40458f96148e21a41dc2acf991f4cece812,2024-11-21T08:51:33.317000
-CVE-2024-1900,0,0,f881fab7684a20d971b8a8aa44c738635846f8721e30624ba500440528156b1c,2024-11-21T08:51:33.443000
-CVE-2024-1901,0,0,7c912c9d925cface47b3667a73bd4854a08825c4b20741b5a200d0c51e0913f0,2024-11-21T08:51:33.640000
+CVE-2024-1900,0,1,d1681c8fc7d747108f96463045705a997eaa303af36b5fd18ab38aeae53b44ef,2025-03-28T16:21:15.220000
+CVE-2024-1901,0,1,ae2fb4d0db49c6bcf89bd1aeb69356a186cfc08c0bf34e22c5fc2117de6eeaf2,2025-03-28T16:21:10.993000
CVE-2024-1902,0,0,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000
CVE-2024-1904,0,0,0cf7723d0c62c6cd3e75c38e78ad1d2cd4227a97de5199b013cae16deb74248f,2025-01-17T19:22:36.853000
CVE-2024-1905,0,0,89e66388bf72309fd4ff9726e625980aab39e8c33d56a042fc26e7a64fb92fc5,2025-03-26T21:15:21.247000
@@ -249411,7 +249411,7 @@ CVE-2024-20669,0,0,e9e909c338c3f6d515442e4d445e3a02212d4fc594d9699a0b3917f3c8d67
CVE-2024-2067,0,0,a8dd550ece8b530902e09df7b88d39ff1486ad5078a91ac1575702e5d89e4adb,2024-12-17T22:01:09.097000
CVE-2024-20670,0,0,585ab2f9f4843a9d7fddbf140b5162ed21e06a237c2d5478d83c0131d7d6314f,2025-01-08T16:39:28.907000
CVE-2024-20671,0,0,05842bec816e55e8fba59dc3be4b73e3fddc9d445a481c66095c6d4ca70ce591,2024-11-29T20:40:08.810000
-CVE-2024-20672,0,0,b42d47318baedd22eca2ae203d33888d0d8e37dc0227cbd8b4ac4691899ee26f,2024-11-21T08:52:53.400000
+CVE-2024-20672,0,1,ceb717e000b6d6a2b0621eb1030ced909ad7aa7a5f8f61d1155c72ec89d251e6,2025-03-28T15:15:44.500000
CVE-2024-20673,0,0,fb73b13062c5207c25f7e883414ec699f189c49690bc7cdc168f811729cd8889,2024-11-21T08:52:53.537000
CVE-2024-20674,0,0,f8ff37061fb270c4cbded711edeb5d64081234a2635d28ed6828a4c60f65c5c9,2024-11-21T08:52:53.683000
CVE-2024-20675,0,0,d93607b8445df9ad9ce9cea41429312530fbb5a444732bf71a2474f624533a9a,2024-11-21T08:52:53.853000
@@ -253974,7 +253974,7 @@ CVE-2024-26559,0,0,77579a317422b2517728ee5978bc7ec2f8eaf2102b599e2c765a82e7b7847
CVE-2024-2656,0,0,0150174a8d94793dc5719eb8a7fb2483210b97f82e6c22dd3e08575727c15d9e,2024-11-21T09:10:13.570000
CVE-2024-26566,0,0,17fcdac1abfd469cf3ffd2a7711c92e40eda453c6c83e0105c8a9c787273b557,2024-11-21T09:02:33.860000
CVE-2024-2657,0,0,0a4026599cc8f564da68adf5d96fb16ac5a93f2d83477b37500b3fcf5ca350a2,2024-11-21T09:10:13.690000
-CVE-2024-26574,0,0,c9911895eba0376ea8a04813b72831a135e34cb8219fef4dc4368d52d0492aa2,2024-11-21T09:02:34.080000
+CVE-2024-26574,0,1,d8484fffe1ac66eaa08d2d0a38d7c9a16ef8ac040214b6d45272c794bd8cae33,2025-03-28T16:01:24.697000
CVE-2024-26577,0,0,b31cfe48a896bbe0069a91709f0e0fcdcc1053cc2c31cf21b6fc4d7e6e447649,2024-11-21T09:02:34.307000
CVE-2024-26578,0,0,b3a8ead68e9b1ae0b466e127a1444d13593e44647cd1512e86348375ea067826,2025-03-20T20:15:31.513000
CVE-2024-26579,0,0,1c35c589175a4e8dc59e6d8cbac9747722f5ae8a50d039abb97019d9ad4bc75a,2025-02-13T18:17:19.517000
@@ -254046,7 +254046,7 @@ CVE-2024-26638,0,0,2a4f3bb20e2caf97372f08747b14f0f756a5e78cfc68f64b38dd4fc85a147
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000
CVE-2024-26640,0,0,92616912f090b40ff68ef6c67c1229e9dbb48d65cc55494bdcfa16aef14d191f,2025-03-10T17:01:43.500000
-CVE-2024-26641,0,0,10c28089baedfd2d8b601c97aba159dc1eba346b5a6100553e6f40db239cd422,2025-03-10T16:59:54.610000
+CVE-2024-26641,0,1,6fc98682350855583f4aed86c2b4df02c8720a1347414ecf2096fcabbb4dcd8a,2025-03-28T16:17:08.557000
CVE-2024-26642,0,0,eacd4ff479b39c2b25a02a522a2b3ec84673f2bba8fab6c27cbe88f0970e2322,2025-03-13T21:20:08.647000
CVE-2024-26643,0,0,381435a1915721f5e392cc3aea148501afeee0f5cc10c03df1f341443e25405c,2025-03-13T21:20:19.930000
CVE-2024-26644,0,0,cea9a7e4803c79d4d81c182e1c7e8b487ebc56704470714078d61743c1187477,2025-03-17T15:20:20.027000
@@ -254945,8 +254945,8 @@ CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b79432618
CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000
CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000
CVE-2024-2754,0,0,3c146feabec526a8d57153969ca10ec7861e0891282d7465bc0903e40372f4e2,2025-02-18T16:56:54.550000
-CVE-2024-27558,0,1,5761ec9fdce6ef2e5e63b6775d933b83bee2438c99df0ca7e9c1f4893296dc22,2025-03-28T14:09:20.343000
-CVE-2024-27559,0,1,ae8f360ea3bfb9b14662fbb3b1eacc93b9bb3567ce84bd5abdf4e632b00e9db4,2025-03-28T14:26:01.253000
+CVE-2024-27558,0,0,5761ec9fdce6ef2e5e63b6775d933b83bee2438c99df0ca7e9c1f4893296dc22,2025-03-28T14:09:20.343000
+CVE-2024-27559,0,0,ae8f360ea3bfb9b14662fbb3b1eacc93b9bb3567ce84bd5abdf4e632b00e9db4,2025-03-28T14:26:01.253000
CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000
CVE-2024-27561,0,0,fc16f92d17651bc7c1c4e9050d562b06f5135d4a3f335b425cd240bae1399bcf,2025-01-21T15:08:34.140000
CVE-2024-27563,0,0,5533c243cccd53d02317f51d488d5c114a766a4a03a83659e29f733a18ae8237,2025-01-21T15:08:45.213000
@@ -254976,9 +254976,9 @@ CVE-2024-27613,0,0,fe390c84da4aac8c6d02587e863de3f07e44d807a70688990b49160a9fcd5
CVE-2024-27619,0,0,16934e9e1cea809cb9988000431d38604c3c6a4209c13c6a2741025d227a9a76,2024-11-21T09:04:48.367000
CVE-2024-2762,0,0,d472cc555d8a3de21ab30459fbc5365112c81a098a9ea85d9c354892bec69842,2024-11-21T09:10:27.607000
CVE-2024-27620,0,0,9d93a7995af700d2b5f47649a5a324bcc1220340d6f2f847a3ffbdc29a8325bd,2024-11-21T09:04:48.600000
-CVE-2024-27622,0,0,7e6bbf556aa75d48d688825538873f3e9f5345a7685bf80c7b908a680a32b3ff,2024-11-21T09:04:48.827000
-CVE-2024-27623,0,0,75b2ee33202636d29e2457755d9050c966fd7c9e2b10f99b81b27a365a949df9,2024-11-21T09:04:49.047000
-CVE-2024-27625,0,0,7c150d2f8dc1b9688fc881fd20ec6f3d11b62f100e993066e42db1cf5787b3e2,2024-11-21T09:04:49.267000
+CVE-2024-27622,0,1,8e0b032d21a35fdd5288842c4805671f9cf9ea0437669d9f87a13ae4b3bdf881,2025-03-28T16:05:54.780000
+CVE-2024-27623,0,1,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8ee1,2025-03-28T16:07:47.727000
+CVE-2024-27625,0,1,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000
CVE-2024-27626,0,0,9a1abf5d0b8cb2d3b863768b43ec83911190b875da99fdca947dfb8d0f43eff6,2024-11-21T09:04:49.480000
CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000
CVE-2024-27628,0,0,1f8afca8560984d1e89d56d5ba3d725ffacfb46d6fb433f79a414003de710b28,2024-11-21T09:04:49.920000
@@ -255007,7 +255007,7 @@ CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab4
CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000
CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000
-CVE-2024-27689,0,1,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000
+CVE-2024-27689,0,0,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000
CVE-2024-2769,0,0,f5fed59b7bca296011d1da69594ac44436bea25a4aa43870a75a391217b8bea1,2025-02-21T17:14:54.783000
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000
@@ -255037,10 +255037,10 @@ CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a
CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000
CVE-2024-27734,0,0,5520fe6516adbd7c3f921cf16d2643163c02ae324582977bf7301b0b4ba5b2bc,2024-11-21T09:04:58.490000
CVE-2024-2774,0,0,0c25920b57d442dd5a233b579cf27e95446a07cdad8c6e0e7b03eb2c3014b13c,2025-02-21T17:49:07.243000
-CVE-2024-27743,0,1,cd7c0a0ce5fe4f27e3ad8aff189ec43ab8a8aa92d1fa4e983c682c35b1e638a4,2025-03-28T14:34:38.150000
-CVE-2024-27744,0,1,d280c6a50d1acc2279803f87f5fd590eca421c9059b05f8d5d568ff9b17bc89a,2025-03-28T14:34:30.930000
-CVE-2024-27746,0,1,b585be55013faaaa137868651d1760039a51ba5162ac0d5a3114230e67117775,2025-03-28T14:34:25.407000
-CVE-2024-27747,0,1,6f1ddae8b249acf53b9166e440726ecfc1ce36472977a70dc04ccd917691be1b,2025-03-28T14:34:16.973000
+CVE-2024-27743,0,0,cd7c0a0ce5fe4f27e3ad8aff189ec43ab8a8aa92d1fa4e983c682c35b1e638a4,2025-03-28T14:34:38.150000
+CVE-2024-27744,0,0,d280c6a50d1acc2279803f87f5fd590eca421c9059b05f8d5d568ff9b17bc89a,2025-03-28T14:34:30.930000
+CVE-2024-27746,0,0,b585be55013faaaa137868651d1760039a51ba5162ac0d5a3114230e67117775,2025-03-28T14:34:25.407000
+CVE-2024-27747,0,0,6f1ddae8b249acf53b9166e440726ecfc1ce36472977a70dc04ccd917691be1b,2025-03-28T14:34:16.973000
CVE-2024-2775,0,0,c7ffaeb0461f05cca21e646af6acc77ea3eef3d3454b74ba7b43a7ce629618f8,2025-02-20T18:29:08.757000
CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000
CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000
@@ -255640,31 +255640,31 @@ CVE-2024-28558,0,0,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0c
CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000
CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000
CVE-2024-28560,0,0,bb940286b1ac2c7041e7fd9a499645864d82efca5b646de14d7cabba2bdacf62,2024-11-21T09:06:31.887000
-CVE-2024-28562,0,1,546f9e95f1ac7221637a3c37ac915ba60e52c8426360cde1cf4cc63831388938,2025-03-28T14:44:56.623000
-CVE-2024-28563,0,1,822cdb8b0e5e61e29acef8fcea7528fc6793f08518f6f570a4af369999fc5e2b,2025-03-28T14:52:00.437000
-CVE-2024-28564,0,1,edb16379ed48243b327497243e538094e4fe994646ba0dedf46e13be97bb55f2,2025-03-28T14:51:57.007000
-CVE-2024-28565,0,1,618b66620abb3c0bb79b06e8932dfaaac3a3b1cac10f5266e1bbed23527a9220,2025-03-28T14:51:53.900000
-CVE-2024-28566,0,1,81ac8320f758b1290567ab5bbff6732548d5cbd00ed4018aa55d9406326b287b,2025-03-28T14:51:49.903000
-CVE-2024-28567,0,1,30291626499bb9e642bdbcddcc7d995098d34c83a7fdbb9365bc256dab3d9e35,2025-03-28T14:49:08.173000
-CVE-2024-28568,0,1,5dcf253cce1d2e0ec342a381869dbadcf4885f82a3c38c89389ff9298b986b10,2025-03-28T14:49:04.690000
-CVE-2024-28569,0,1,89f94c291c3764568419aeba0eea5234bfeda10e1719928f6e04eda112f29a96,2025-03-28T14:49:01.337000
+CVE-2024-28562,0,0,546f9e95f1ac7221637a3c37ac915ba60e52c8426360cde1cf4cc63831388938,2025-03-28T14:44:56.623000
+CVE-2024-28563,0,0,822cdb8b0e5e61e29acef8fcea7528fc6793f08518f6f570a4af369999fc5e2b,2025-03-28T14:52:00.437000
+CVE-2024-28564,0,0,edb16379ed48243b327497243e538094e4fe994646ba0dedf46e13be97bb55f2,2025-03-28T14:51:57.007000
+CVE-2024-28565,0,0,618b66620abb3c0bb79b06e8932dfaaac3a3b1cac10f5266e1bbed23527a9220,2025-03-28T14:51:53.900000
+CVE-2024-28566,0,0,81ac8320f758b1290567ab5bbff6732548d5cbd00ed4018aa55d9406326b287b,2025-03-28T14:51:49.903000
+CVE-2024-28567,0,0,30291626499bb9e642bdbcddcc7d995098d34c83a7fdbb9365bc256dab3d9e35,2025-03-28T14:49:08.173000
+CVE-2024-28568,0,0,5dcf253cce1d2e0ec342a381869dbadcf4885f82a3c38c89389ff9298b986b10,2025-03-28T14:49:04.690000
+CVE-2024-28569,0,0,89f94c291c3764568419aeba0eea5234bfeda10e1719928f6e04eda112f29a96,2025-03-28T14:49:01.337000
CVE-2024-2857,0,0,6295ecc20584366c794ee0ccb42f15320623f61e630cf97810cfc422fe1c34d8,2024-11-21T09:10:41.607000
-CVE-2024-28570,0,1,ad2785ae9617051620d5840e06eafe4ff9dfef47c56d434ee1acd01fb2e620e8,2025-03-28T14:48:56.937000
-CVE-2024-28571,0,1,40b1f850be2810c82e5fb19cd21bcf0a3e3ac534513afaedf079c7e24a03f718,2025-03-28T14:48:54.140000
-CVE-2024-28572,0,1,04fc282e4b7f64248bc2cb60eff2823593936b427825c6a62dff9231c9ea838e,2025-03-28T14:48:51.143000
-CVE-2024-28573,0,1,f48b33ec35392a77c74384a73dbb40982da7413ac85987a6ae26244b20fcb870,2025-03-28T14:48:47.437000
-CVE-2024-28574,0,1,e24221c7f9c0dc767f1a4af68f67dac8b863bc93b77a4d3fc34c5f9e8dd5eb3a,2025-03-28T14:48:43.373000
-CVE-2024-28575,0,1,6d698b31f6a8ee56112b639023cf9679319442f063850d57ad76a28d58acd6a3,2025-03-28T14:48:40.390000
-CVE-2024-28576,0,1,0351857f9663fe04411fd141642711a40532f1c9ea1f0c9c81917feb5c58bf9d,2025-03-28T14:48:37.483000
-CVE-2024-28577,0,1,a7cb6c7ed03f3487ca50cdc6503815f6723fe0131c0bbe949ef36ec326df72a7,2025-03-28T14:48:33.360000
-CVE-2024-28578,0,1,cf270d69ca34a93783a0b985174a8c47f840b263a63da4a88622d3d39feb79cb,2025-03-28T14:48:28.610000
-CVE-2024-28579,0,1,7a9c0efba9c8a73c1ffa4bd3ee26fdfe2e3e640138bbe9e85ad9a2ceb4968d3a,2025-03-28T14:48:24.560000
+CVE-2024-28570,0,0,ad2785ae9617051620d5840e06eafe4ff9dfef47c56d434ee1acd01fb2e620e8,2025-03-28T14:48:56.937000
+CVE-2024-28571,0,0,40b1f850be2810c82e5fb19cd21bcf0a3e3ac534513afaedf079c7e24a03f718,2025-03-28T14:48:54.140000
+CVE-2024-28572,0,0,04fc282e4b7f64248bc2cb60eff2823593936b427825c6a62dff9231c9ea838e,2025-03-28T14:48:51.143000
+CVE-2024-28573,0,0,f48b33ec35392a77c74384a73dbb40982da7413ac85987a6ae26244b20fcb870,2025-03-28T14:48:47.437000
+CVE-2024-28574,0,0,e24221c7f9c0dc767f1a4af68f67dac8b863bc93b77a4d3fc34c5f9e8dd5eb3a,2025-03-28T14:48:43.373000
+CVE-2024-28575,0,0,6d698b31f6a8ee56112b639023cf9679319442f063850d57ad76a28d58acd6a3,2025-03-28T14:48:40.390000
+CVE-2024-28576,0,0,0351857f9663fe04411fd141642711a40532f1c9ea1f0c9c81917feb5c58bf9d,2025-03-28T14:48:37.483000
+CVE-2024-28577,0,0,a7cb6c7ed03f3487ca50cdc6503815f6723fe0131c0bbe949ef36ec326df72a7,2025-03-28T14:48:33.360000
+CVE-2024-28578,0,0,cf270d69ca34a93783a0b985174a8c47f840b263a63da4a88622d3d39feb79cb,2025-03-28T14:48:28.610000
+CVE-2024-28579,0,0,7a9c0efba9c8a73c1ffa4bd3ee26fdfe2e3e640138bbe9e85ad9a2ceb4968d3a,2025-03-28T14:48:24.560000
CVE-2024-2858,0,0,1b76ee215a17131c0be72ed024c7b73b1e03349dc8f6072a53a0e1699d6fdc20,2024-11-21T09:10:41.807000
-CVE-2024-28580,0,1,0c82968f6366c553f74f7c6ec07a86559c4777b7d5e30537a1d20c17d787afcb,2025-03-28T14:48:19.057000
-CVE-2024-28581,0,1,191b8c9324750f099e546daee36bcabaa27fb826baee53f51e3285fbb77b43a2,2025-03-28T14:48:15.920000
-CVE-2024-28582,0,1,6e69e62a685361851f0997bc47167c320b84ea905c873f3b4702a12de5a6a826,2025-03-28T14:48:12.423000
-CVE-2024-28583,0,1,871d5e7614a91d5aa7be768444e4b1a611dd29c5c2e4535b36fd330788bc9c11,2025-03-28T14:48:08.290000
-CVE-2024-28584,0,1,280815d56b9906ce1763261fe7a802bfeefc69e503ae39d7d5e342479901b86d,2025-03-28T14:47:52.610000
+CVE-2024-28580,0,0,0c82968f6366c553f74f7c6ec07a86559c4777b7d5e30537a1d20c17d787afcb,2025-03-28T14:48:19.057000
+CVE-2024-28581,0,0,191b8c9324750f099e546daee36bcabaa27fb826baee53f51e3285fbb77b43a2,2025-03-28T14:48:15.920000
+CVE-2024-28582,0,0,6e69e62a685361851f0997bc47167c320b84ea905c873f3b4702a12de5a6a826,2025-03-28T14:48:12.423000
+CVE-2024-28583,0,0,871d5e7614a91d5aa7be768444e4b1a611dd29c5c2e4535b36fd330788bc9c11,2025-03-28T14:48:08.290000
+CVE-2024-28584,0,0,280815d56b9906ce1763261fe7a802bfeefc69e503ae39d7d5e342479901b86d,2025-03-28T14:47:52.610000
CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000
CVE-2024-2859,0,0,caa75afab36dcf492b03d579a92cc4d5b32496de16e8a53f8ac97b57d5699ab1,2025-03-19T19:15:40.793000
CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000
@@ -256144,7 +256144,7 @@ CVE-2024-29176,0,0,10c519a58243fa60d8cb12375f6db3b7c0c78f193cb795fac43f3b2804858
CVE-2024-29177,0,0,989bb0df1643b9a7b89e37a8003e76b7f921fc34121bcb1e8d027d237205360d,2024-11-21T09:07:43.943000
CVE-2024-29178,0,0,8f45c2ad8a2db5b223440df97d47eee1d54dd86d0f4715fcd3f0e401dc692ad0,2025-02-13T18:17:50.040000
CVE-2024-29179,0,0,a03213dd44931706586fdbc3bca5ca0578ffb309b141b195bed3df3b6ff74c9d,2025-01-09T16:59:41.167000
-CVE-2024-2918,0,0,4b176845f014bb23abda3ba74984151a83286559b65ff253d8f5f37f236b6815,2024-11-21T09:10:50.213000
+CVE-2024-2918,0,1,b3253139b585010c2d50af768987f0d0ac0a0e24eb36954fbc1bf3b7aa2ef5ba,2025-03-28T16:20:56.060000
CVE-2024-29180,0,0,116b696fe96a4565704c86f1098f1218e060f9688c96251259ff2087a89c91b1,2024-11-21T09:07:44.450000
CVE-2024-29181,0,0,787534a49fdc63ee4e12d4639da0074229100df572eea4d1a3a06db8df3f16a1,2024-11-21T09:07:44.597000
CVE-2024-29182,0,0,84fab37a55923e968892a68e297c3b6f80fcae95a1591c1201e406df4067b079,2024-11-21T09:07:44.747000
@@ -256176,7 +256176,7 @@ CVE-2024-29206,0,0,8a7eb39d95b3b371c830e05b1b6e4cde0bfabacd8958128965c1eeebb11f8
CVE-2024-29207,0,0,2464c80a3c697e101d9833ca029d1f5331b8df477f1dd413b74e2ad355f20379,2024-11-21T09:07:49.203000
CVE-2024-29208,0,0,8acb575fbb6553fe88b9329632fc776d834e7be7ceeb397e3472ead1329f3bc1,2024-11-21T09:07:49.330000
CVE-2024-29209,0,0,0602187db9645bc24c7ea3bede39626c24d7ca8f446afb88b1649784b10602c9,2024-11-21T09:07:49.460000
-CVE-2024-2921,0,0,cb6cec1b05a416480770f2949b980096381a44a237be65b81e14330f95779be4,2024-11-21T09:10:50.660000
+CVE-2024-2921,0,1,7a5d30115f272319572d92a96c5c73cfed51411b5828c82b1c4e054fb0f33624,2025-03-28T16:21:04.050000
CVE-2024-29210,0,0,0b9e1da3e79f2303b1e56f9a5c9d0f9d5677bc9bee283f6034952eed6ce5812a,2024-11-21T09:07:49.607000
CVE-2024-29211,0,0,0331567c6af8fd83b1e0a24feaf54333b88f51ecbe3f9d759c864c4433a7edc5,2024-11-14T19:09:01.213000
CVE-2024-29212,0,0,57ad6f456ad8c4e58aee0ad243fdb4a1692ad3d121ea88d523c26b7fe273ad46,2024-11-21T09:07:49.800000
@@ -256219,7 +256219,7 @@ CVE-2024-2927,0,0,760e13d63ffb1aa6a6097fc1c420dd924f8af6747ca04c686b3b6cab9f0c73
CVE-2024-29271,0,0,37f926466d04417e896efefe23e469b02c33926c2512f94216987bab3c6b9581,2024-11-21T09:07:53.797000
CVE-2024-29272,0,0,2856fc70b0ec5cc9b3179f269199b1b80194795a938f481175966887300de617,2024-11-21T09:07:54.027000
CVE-2024-29273,0,0,e88c38979e6a8cb440359a757929c3c3768beb837dec53069b260cb2536d1e3b,2024-11-21T09:07:54.247000
-CVE-2024-29275,0,0,04d24ec0b09e8992b316d39205c49d05d0ba002c7de004a46972837ba649ad19,2024-11-21T09:07:54.473000
+CVE-2024-29275,0,1,89179450cff6bd242efa87e5702bd962171bbc5420f761d638b1bc409f5cc15b,2025-03-28T16:51:45.747000
CVE-2024-29276,0,0,e492e2b9f2cab402ec63c3351f8ac901d3688e777b31189c69f2d34536b203c2,2024-11-21T09:07:54.710000
CVE-2024-29278,0,0,810e815ceeacd459126cd2f0be1468e4723065d75f15ecab73f4c892d8b4bcaf,2024-11-21T09:07:54.933000
CVE-2024-2928,0,0,4f9d141452f84e180c0e1f09f7c8fd6e6fdfae447a1da31584938ee63d171ea3,2024-11-21T09:10:51.707000
@@ -256296,13 +256296,13 @@ CVE-2024-2946,0,0,997d6b53bb745a8fe904139e2791e2c813b08bddcde7c3f57e212bb43a8941
CVE-2024-29460,0,0,8d92453cad8a8393fa15cddde56132ecc5c7ca6e2ee3a6965bdc21d4886ca532,2024-11-21T09:08:02.840000
CVE-2024-29461,0,0,6784514e8f6ad0fcfc7af2e2ecc7f7e5ac701f479b42634f80923d877f6e76a5,2025-03-17T16:15:21.387000
CVE-2024-29466,0,0,d1c8dd4175f772e9684f7c0531d839c45304893b8eb7f47c0e48698c58964c2e,2025-03-20T20:15:31.863000
-CVE-2024-29469,0,0,b4ff7e7dd0886c37f289432ddc27d014390f9ccece3870733ae3b10ba447da3a,2024-11-21T09:08:03.500000
+CVE-2024-29469,0,1,c185a691753b377e74e3ffa745c574e83b0f5b88bb3c96fe75965fbcc7484a3a,2025-03-28T16:45:49.587000
CVE-2024-2947,0,0,a2260296cea0a8b0297fccf6e19d9b38e7eac981b1298727580d42f3bdd9e8c4,2024-11-21T09:10:54.473000
-CVE-2024-29470,0,0,75cc4ff47ee046b1275e5889318f83247d27860717755453f2a30467ae3c8e1c,2024-11-21T09:08:03.713000
+CVE-2024-29470,0,1,6a20d214e4f4bb836b3ce1259e09859cfc9cbe197dae98c68b134c2321b5cae9,2025-03-28T16:48:37.833000
CVE-2024-29471,0,0,aedd63d93fa18021f61e0c8ed7383f117836a9ddd5bfe77b5e623c014ee1e4cd,2024-11-21T09:08:03.933000
CVE-2024-29472,0,0,15d290ea9f98736b449bc7787935a2cd2021c80d69ba95973c22cb5842a1df64,2025-03-13T18:15:39.353000
CVE-2024-29473,0,0,f2998a926737c827876c84ada013454825da8f5d7ba056248f2c493caf13fc94,2024-11-21T09:08:04.343000
-CVE-2024-29474,0,0,8d13151693ee147ceb114c1cd4d5297dd4a25e25b3dffd00fd435190cec6d708,2024-11-21T09:08:04.493000
+CVE-2024-29474,0,1,541f226998628ae6b5e31191d9f1979e464f65bfbf8cd71ee02cb3f83ba33174,2025-03-28T16:48:47.957000
CVE-2024-29477,0,0,ae3fe05fb8c437005b62ea61c5e00f7ff5ab4cd6c6fae4f89f5257a31a7ae6f4,2025-03-06T19:33:27.710000
CVE-2024-2948,0,0,9b014acbc58947b357b9e41de566aaedde9b165ceb6c89be18c403d44f038e7f,2024-11-21T09:10:54.623000
CVE-2024-29489,0,0,07f5b3a5e4c9d9dd4bd17cfda9a58f8a163c6a3150e80753fbcf5f8a1d2c0bab,2024-11-21T09:08:04.877000
@@ -257213,7 +257213,7 @@ CVE-2024-3056,0,0,156a3ff16ef1e7c0a07171966ca2163c4735c8d33004ad66e5a8927f3659dc
CVE-2024-30560,0,0,b59125ce2223ca2880fb89db3a3f3dfd059a1d0d73b4049fe43e1fd24daf2c54,2024-11-21T09:12:10.740000
CVE-2024-30561,0,0,ac7e0304f31638e780a2d720d189c314381f988fd2e6f5eb3ed2071500f77264,2024-11-21T09:12:10.877000
CVE-2024-30564,0,0,b20ff337c9f1037b2e952029ea8bdf19426b12dd02e41f2275aa126ef8bb1798,2024-11-21T09:12:11.007000
-CVE-2024-30565,0,0,3f8705cb7248f632f330b4ce75cd3dfc475f4e47b875590050e266452f0faa28,2024-11-21T09:12:11.230000
+CVE-2024-30565,0,1,fed5348d7a25dfad7ba408e22e1df26a888cfa70ec82dfdec6da97c387e5ca81,2025-03-28T16:52:54.670000
CVE-2024-30567,0,0,56d321622fe54066281ae3f4c3e57cc485754758b6b7eac706a1b8d07c9db2f8,2024-11-21T09:12:11.443000
CVE-2024-30568,0,0,2f2974e4f43eb513d22f486c8b5e262c042a4e7b166d459a8d8058619c7643f0,2024-11-21T09:12:11.660000
CVE-2024-30569,0,0,af716782dfdbdd6300d40d892f04bd4f48102bcc5dac712ef7ce5d499c07c5fb,2024-11-21T09:12:11.920000
@@ -257996,7 +257996,7 @@ CVE-2024-31650,0,0,74932210814720d3e9cb26d5c43a0857ecc1658ed6e15daf4bdd59e219bf9
CVE-2024-31651,0,0,7a05bf060550658aeafb598f6d26f061393d2c8a3005e7e0ac280f9d616f37cc,2024-11-21T09:13:47.943000
CVE-2024-31652,0,0,af62d2ee0de062f978c0bade4d4d954f663c94f8c5efa1dc0544f972ca6821cd,2024-11-21T09:13:48.143000
CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000
-CVE-2024-31666,0,0,aeab187d4e372cf53ada217bf529b4da90a82de4a9a4da55410824233a756180,2025-03-26T21:15:22.100000
+CVE-2024-31666,0,1,9feb924667e4d55fe73065a5c4296ea21e1ac0f03e29d40ad28b081993f9d303,2025-03-28T16:00:36.103000
CVE-2024-31668,0,0,92d852b5513f85b46c5c8aacca49dc78103d1045b501ee09fe75860fd2d477f4,2024-12-18T16:15:12.693000
CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000
CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000
@@ -260838,7 +260838,7 @@ CVE-2024-35432,0,0,ced9de72c3bbcb4e9eb80bc2fabbb0ed55c2fd0dc103afeb5274fbf689dfa
CVE-2024-35433,0,0,b493ef1c1f660f4525c4b3c861e30fc780cde47e49bfe7f8f859b2235b5ed7e1,2024-11-21T09:20:20.267000
CVE-2024-35434,0,0,0fcffaa00cbc213252ffe7916deef7a46e78adaf94b00c9474f03d7ed84f9b20,2024-11-21T09:20:20.497000
CVE-2024-3544,0,0,2056c8385985aefccc45ead5e31b0ec097417378af08b30a42b3680f42015625,2025-02-03T21:38:22.117000
-CVE-2024-3545,0,0,7b9236373d9ab11af1789b681fa050d76729541f270e002aeefd34c01bf94533,2024-11-21T09:29:50.790000
+CVE-2024-3545,0,1,955377816aa30a64ceef290f6fe292fba51e636d73b3d97e950ee6c5c33cc26c,2025-03-28T16:20:52.220000
CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000
CVE-2024-3546,0,0,6a929a5ec13b1df70de88509356c904b07d7b8ba34b598d5dfca415671fdec86,2024-11-21T09:29:50.977000
CVE-2024-35468,0,0,f078143d20bd8ff2771314faaf608d4d85c29a73695f1655b68a13225fe33a65,2024-11-21T09:20:20.703000
@@ -263987,6 +263987,7 @@ CVE-2024-39308,0,0,5e2a254789b6adf99c0777cff7acf6dd961d09c4b36426a3aeec492e32936
CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb382bd,2024-11-21T09:27:25.990000
CVE-2024-3931,0,0,da17b20e582e862546056d14aa128822fb3b0fc4d7319c4f35adbc82010d816c,2024-11-21T09:30:43.577000
CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000
+CVE-2024-39311,1,1,22f01950122e6f925bdd258499f4df1d2c65b77c53d3a12e6c666fd4e0853f8b,2025-03-28T16:15:27.900000
CVE-2024-39312,0,0,40b5287c2d6ecd3d71481f475e176c68c18b6b66eb89c859b58dc9d5ca882f06,2025-03-05T15:02:51.830000
CVE-2024-39313,0,0,b115d3b78f35e7dea98a72603bba4219df7032cb204602053744e9732af62a26,2025-03-06T18:04:02.763000
CVE-2024-39314,0,0,e7aff7b8a85ec42f1938bc61b661a77715a4979d21eca4d4fbf4901151758256,2024-11-21T09:27:26.497000
@@ -266458,7 +266459,7 @@ CVE-2024-42584,0,0,c802f479d90286fd5c5341698abdb95dfefafd21b5b328ae1fe1d56c59837
CVE-2024-42585,0,0,1e32a3d5f79837e833d41285fe15b9d72191a8fec92b249430433a51895c5189,2024-08-20T16:35:31.307000
CVE-2024-42586,0,0,7a159575f356a4882566414d5b649fe23f9c478a0df95f8cdbbe9c8880c8c34f,2024-08-20T16:35:33.523000
CVE-2024-4259,0,0,7b5db6f5af934278f3b40f71abd4c0cfc960e3e509cb7a0f49a52fd67ef76f30,2025-03-14T09:15:12.003000
-CVE-2024-42598,0,0,55d16ea8304188ee4320cfffe1073abd24faafec63a7452351eaa97abbb17b84,2024-08-22T18:15:10.187000
+CVE-2024-42598,0,1,5fb3f3bd56c5e052710708c02989a440782ca185eddfe9310a5b9cfa07e3f31f,2025-03-28T16:53:29.593000
CVE-2024-42599,0,0,5708f882270384fd1c370b56aa51de239b6f56c6475b221424a79cba5b347ea6,2024-08-26T17:35:07.137000
CVE-2024-4260,0,0,7cc4b7fd661ec19af96c223fcd725ef21b11847fb0c17ee8c63eee5e50cbac7c,2024-11-21T09:42:29.750000
CVE-2024-42603,0,0,230eae16acd0b4472ab1bd8a982d41be12a5b6a1c3a4d2f3a11ba5a34ee12543,2024-08-21T13:21:56.383000
@@ -266808,7 +266809,7 @@ CVE-2024-43165,0,0,d6b26bb563a0e6badcd424e8717f3eee2117ad61bb0aaa9e33b8f5d6bf543
CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05ca8c,2024-11-21T09:35:06.587000
CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000
CVE-2024-43169,0,0,ca312dffe966efd8b5b66da9976b865eeded21d5219926bc8f6ba4521a4d3905,2025-03-07T19:45:45.010000
-CVE-2024-4317,0,0,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000
+CVE-2024-4317,0,1,bc4c1d6b66ecacc00a7702284dd4cbda765fcde49e5260fc82751a2023009737,2025-03-28T15:15:45.250000
CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000
CVE-2024-43176,0,0,63af555209e7ed77ba0827d2538004bfc82a8d5acdbed249baeecac6794319ce,2025-01-09T15:15:15.737000
CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000
@@ -267114,7 +267115,7 @@ CVE-2024-43480,0,0,2b8c7026769acc492cb135f3a902f5b8efd2fdfa0fc93d7a520b9c444afc6
CVE-2024-43481,0,0,d15cfdba06a15c9666080e0bd42adbcd2af12dfa448c0c50a4e9ceaa264f4d30,2024-10-16T21:34:19.840000
CVE-2024-43482,0,0,89903c68b36e49a6091c3e7a5777c860656178e35e49a4d00a3feccbed7e71eb,2024-09-18T14:11:50.303000
CVE-2024-43483,0,0,5894fab1cc031d8ea06b78ea45889e81fae431abd9aa278d2ff49e57fe811037,2024-10-21T17:35:34.827000
-CVE-2024-43484,0,0,39a653762326643169601b95e3e894f19f4fa90fbcba8636a1563048542fd009,2024-10-21T17:35:44.460000
+CVE-2024-43484,0,1,9726772d466a20462c9a13a6c4abf30d49378de50bf4250e311123b67f2cb9a7,2025-03-28T15:15:44.823000
CVE-2024-43485,0,0,d337f08e2ac97c6c2247123acf322480c683dcae8b32e15558c2a5b46a074c53,2024-10-21T18:01:28.623000
CVE-2024-43487,0,0,a9a7f267c4a773e9412c8796bdc2a9677324c51e1b310739b73411f6cc12c2a7,2024-09-18T14:10:20.320000
CVE-2024-43488,0,0,b22dc2eda805ba4c390a3bcdecf7b116f03391446b1f75ee5351fa05c368a1fb,2024-10-21T21:05:53.340000
@@ -267885,7 +267886,7 @@ CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf
CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000
CVE-2024-44275,0,0,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000
-CVE-2024-44276,0,1,1cb833ffb18fa9f2e36eaf915a97fc850b9e1576b6bef756fa1155e91f6af5a1,2025-03-28T14:09:35.787000
+CVE-2024-44276,0,0,1cb833ffb18fa9f2e36eaf915a97fc850b9e1576b6bef756fa1155e91f6af5a1,2025-03-28T14:09:35.787000
CVE-2024-44277,0,0,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000
CVE-2024-44278,0,0,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000
CVE-2024-44279,0,0,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000
@@ -268848,7 +268849,7 @@ CVE-2024-45765,0,0,d08df3289bc68e719740469698ac413966bdff60f13781ac62b99dc021094
CVE-2024-45766,0,0,3c96c4b692f72cef2f3b9553cac8d6f167af7d571a147249c8f73e3c5c52eb55,2024-12-02T14:37:32.017000
CVE-2024-45767,0,0,7c5b48c8e706e6c8ae501761d8be0d401e1b87d8e52b758c1a580381e866ae36,2024-12-02T14:32:37.183000
CVE-2024-45769,0,0,b04be771ec22a94fd636520cce7793ef84bf69518cc6b17c7f3bae1b59effde1,2024-11-12T18:15:35.427000
-CVE-2024-4577,0,0,eb1924de0f14ef2d02449ec7ed7fa4317489ceb6cc64a8c3762d1c0f65ad153f,2025-03-21T20:18:54.330000
+CVE-2024-4577,0,1,d0fa159b4741afb83a3b240f8c8a3f769329bb7a38feb781505372c4d7939d09,2025-03-28T15:12:44.513000
CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf0a5,2024-11-12T18:15:35.643000
CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000
CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000
@@ -270711,7 +270712,7 @@ CVE-2024-48455,0,0,7d16a6752881f9c2507814c64a467c98b64e570b5df68063a15b1ef3b600b
CVE-2024-48456,0,0,5157f8dd26a6f4dec318ad8d7c80b2cd217ac77f0e9ed233c772d4f65ef0a60a,2025-01-07T16:15:34.867000
CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a537,2025-01-07T16:15:35.057000
CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000
-CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000
+CVE-2024-4846,0,1,bd5a813f3f1de37afd20443e535ede94f3264c3881bcbee42428d6668b3c1747,2025-03-28T16:22:26.443000
CVE-2024-48460,0,0,34f8ed9ab98ddfc75ca095067339237e8229c3fecc07fb29885848ae665d4986,2025-02-03T21:15:13.217000
CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000
CVE-2024-48463,0,0,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000
@@ -270760,6 +270761,7 @@ CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a
CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000
CVE-2024-4860,0,0,43edac6988670c251a3268565520d2147fd38eb2c203678751a12426c018f3e3,2025-03-25T17:50:50.723000
CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000
+CVE-2024-48615,1,1,ffb075ce68902a7e23959bd31c513cf7242c5d81addf3194d35e465800a51a23,2025-03-28T15:15:45.023000
CVE-2024-4862,0,0,f2cdc4c8590cc224b89516a71786d6254cfba1f6171c0919e726c428cf5def93,2025-03-06T15:07:23.547000
CVE-2024-48622,0,0,7b5734fdf710218dd18d04eccbe27f1ea32dc572aaf26b2fbfe91cd5543b9021,2024-10-16T16:38:43.170000
CVE-2024-48623,0,0,5cea775385f6ce5ebba2cd449299789230da6b7f1dc9f4a14dddcec3dde7198b,2024-10-16T16:38:43.170000
@@ -272540,7 +272542,7 @@ CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5
CVE-2024-50715,0,0,d80036605e9d39c57bf73ec8b65a72ebad6adcf1d272a88d9f7f78f0167202ea,2024-12-28T18:15:09.790000
CVE-2024-50716,0,0,ff7139747070d1865bee3e35d9818a32b6c31830627003594b66b97e8ce57a71,2024-12-28T18:15:09.997000
CVE-2024-50717,0,0,11fa2afbcd3540c8ea3fc4871e24ced6a1f1f3bff6d82e6a5d9acf86b4274a63,2024-12-28T18:15:10.210000
-CVE-2024-5072,0,0,38bd8ba0572ad544e5273dfb8f5f6bfba13772caa98624367620d218345874da,2024-11-21T09:46:54.310000
+CVE-2024-5072,0,1,6e11f88ba479eebe1eca4c1def7025f7c31c1c452b47f6e805c5fc6c1f1b914c,2025-03-28T16:22:30.187000
CVE-2024-50724,0,0,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000
CVE-2024-5073,0,0,8f9666a5d3a8eb23f45b7a6a371b532fc485ca12ecc00275ad0b6ca4b8ff4f3a,2025-01-15T17:48:03.477000
CVE-2024-5074,0,0,300fb8a2ae76071163fb30d885721444a084ca820de7e72b30304998ec6beaa3,2024-11-21T09:46:54.600000
@@ -273017,6 +273019,7 @@ CVE-2024-51620,0,0,9f3c5342b04529a4ba1988a0378987633ac6cb1420149d0012236cb557c55
CVE-2024-51621,0,0,ad990faa68f653d7edf7c4f127742a95822a936152b7da682aa6af8f3bdebf72,2024-11-12T13:56:24.513000
CVE-2024-51622,0,0,a8223a947586efb89290aa6e2c15be7977fcd06db44d443b9982678fa8c720d2,2024-11-12T13:56:24.513000
CVE-2024-51623,0,0,6703f5b025cb8d843ba74bc3560cd376d306a31d87ea460aef29dbc5f0ab92c2,2024-11-12T13:56:24.513000
+CVE-2024-51624,1,1,8f53721ed483dfa9530df52f849cb93b7770c1b7f77398ad87fb77602b93a663,2025-03-28T15:15:45.393000
CVE-2024-51625,0,0,09d0e1888715d9f8121d4711c3d9a85a6cbccc4072e1d4a8a7b65f0a1d54580a,2024-11-12T13:56:24.513000
CVE-2024-51626,0,0,3ea6cfbecf6d0a010e47ec7e18ebc64f13a22acb8963c62d98cc5b7cb452635b,2024-11-06T22:10:20.517000
CVE-2024-51627,0,0,9441dbfd558987f77e4ef79fd5c47060c88079ff7367a501635d73f88eaccb82,2024-11-12T13:56:24.513000
@@ -274381,7 +274384,7 @@ CVE-2024-53427,0,0,5e821b042543ee82d33c34720304409034d0bf41a56200df2ff2594b425b9
CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000
CVE-2024-5343,0,0,a520df0d2c87c5fe35335a1b343c956cc8dcf1b7b7959b5acc51996bdc11fd0c,2024-11-21T09:47:27.647000
CVE-2024-53432,0,0,91200366caef4fd477ae549a4b97936ab0103419821400acdfe9619ad1d645ce,2024-12-04T16:15:26.240000
-CVE-2024-53438,0,0,af421dbe7c7f38fc48dc3da6bba61e62d4aceee28575a50b869f0d02d1e1b7ee,2025-02-03T19:15:12.633000
+CVE-2024-53438,0,1,6f86d2f1fae70eddbba85a1a03508a82fab6b4531d5e5c5b62e05bbbfde6e5f5,2025-03-28T16:39:27.213000
CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000
CVE-2024-53441,0,0,15e36cc5d95e47c6196e0366735e3d4fafceb35f2476d36323b8dd3867fef6fc,2024-12-12T02:07:57.850000
CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db1661418723b2,2024-12-11T17:15:19.083000
@@ -274822,7 +274825,7 @@ CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef6643
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
CVE-2024-54084,0,0,c1aee3e143998bbdc982177558f44486e207fe61fab43f3469a59c234690bf0a,2025-03-11T14:15:22.730000
-CVE-2024-54085,0,0,2eb4e85a4954fad493e63b1d0363f6c2a2915f74115cdae84734b8297025373b,2025-03-11T14:15:22.893000
+CVE-2024-54085,0,1,44631dc4ea36ebfeac3463397955a78235aa73c39f9e5787179507a91ff8a117,2025-03-28T15:15:45.540000
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
@@ -274910,7 +274913,7 @@ CVE-2024-54175,0,0,6922222bcdfc7b96fef3a341f6cefc80aabd1e3cb954e956a74e6c94cdaed
CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000
CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000
CVE-2024-5418,0,0,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000
-CVE-2024-54181,0,0,dfc1a5ecb59f8ee1aa215392f6a5f462d2b4bfc57816ecf4c45667d73975fba9,2024-12-30T14:15:05.867000
+CVE-2024-54181,0,1,3e04974e8b1a6b14bc562b3f38845258be106e346d87e72f2301979081de7867,2025-03-28T16:32:40.990000
CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000
CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000
CVE-2024-54193,0,0,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000
@@ -275009,6 +275012,7 @@ CVE-2024-54288,0,0,3c9c3c6eb7ea5d0e80b3dc6c380a970c41d1702fdccfcbf7a1eb9279bdb11
CVE-2024-54289,0,0,4924b8c9ee0119eb21584ceb261116e542e084f80864da6819de24f085376959,2024-12-13T15:15:32.840000
CVE-2024-5429,0,0,c5c127d3962dc4b6ee503ad5fd97fce8ef1325aee9713e37b6918218af05ded4,2024-10-18T12:53:04.627000
CVE-2024-54290,0,0,94f24c824c8ffe1a5d1b4e7456c8c53bdf7ab3ec7f2d25cded89b1a2e931e028,2024-12-13T15:15:32.997000
+CVE-2024-54291,1,1,9a44c4ae6a95498120b4d9319fe1f8f6e2e5ff693096da121c310da094a09236,2025-03-28T15:15:45.663000
CVE-2024-54292,0,0,23ca83ef1b927ea8c753f6ff6aac4e8f46b4cc684f1a85a4d56d010b0b62eebe,2024-12-13T15:15:33.143000
CVE-2024-54293,0,0,42cf37db0ff709eca735462416937e47c8f3a74562d752738c510e807b90fce1,2024-12-13T15:15:33.293000
CVE-2024-54294,0,0,8a9334dff3a1a76409b7a41f4dc2a8fa7e8f1ac279aeea257fda6867355ac748,2024-12-13T15:15:33.420000
@@ -275086,6 +275090,7 @@ CVE-2024-54359,0,0,fa0a9f20451ac7e0c36ba20018c12a0ec4833a93fa93fc8eddd26232eff57
CVE-2024-5436,0,0,16a2d2f1a9a3d9d246e525c05e5f6ef4140f57c182ceaa616ff131de2cb2ad61,2024-11-21T09:47:40.917000
CVE-2024-54360,0,0,7cecc5c9b33bbc356f5772e4c43bd169f3e770f679ac31dc4fe24a944af9b3f9,2024-12-16T15:15:08.793000
CVE-2024-54361,0,0,1fbefec397ae08c1d4ab1ee239f4011081ba235e6463dd89ca2c24fccd07c3a3,2024-12-16T15:15:08.970000
+CVE-2024-54362,1,1,a3db78471162f72e0fc5a1a57347650c81d8dbc6bf8e6d956c5ff13f375a42dc,2025-03-28T15:15:45.827000
CVE-2024-54363,0,0,a758b21d504842c72bce968c480430a0b58b48352a9cec3cae02554bd59f1189,2024-12-16T15:15:09.130000
CVE-2024-54364,0,0,302e6428c3975bfd1b81b5caf03464d744cd6a9b74a7e91f70bc8fe4275e821f,2024-12-16T15:15:09.283000
CVE-2024-54365,0,0,5e337e24502c845aef33f4c06f7c4e94b03b2019f78d434025bd26e36b24fbbc,2024-12-16T15:15:09.437000
@@ -275398,7 +275403,7 @@ CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3
CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000
-CVE-2024-54954,0,0,c5f7bba0f482724c8baeb34ff731ef8127c621f5f601d09231830cf72a39e47f,2025-02-26T19:15:22.440000
+CVE-2024-54954,0,1,bd6322507b33dbf7676b3d047db7e71ad46212f09cfe0c196ceeabe7a1c0b796,2025-03-28T16:49:01.760000
CVE-2024-54957,0,0,e4e8d12c7fc7d58c0714df01efc15cd62969d1708fd6892bccb61bf01ac33284,2025-03-03T16:15:38.450000
CVE-2024-54958,0,0,69980aeea30a2a881a4d3d60af27dc56a66e90cd80d98f68c95b14c20a9676de,2025-02-21T22:15:12.440000
CVE-2024-54959,0,0,9f0a686e6ecddb708d340473cce33ce83c57a259a6f56d0e5117df6a2fd44baa,2025-02-21T22:15:12.593000
@@ -275454,9 +275459,9 @@ CVE-2024-55089,0,0,fe8d9b2e0356506b20b9e891287266dbbb47fd17083ee062946773a1570b3
CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000
CVE-2024-55099,0,0,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000
CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000
-CVE-2024-55100,0,0,95028b27871ac62718afbfbab3332a8b1dc5af8fb564b5f3ff9235ca8136b414,2024-12-17T17:15:09.497000
-CVE-2024-55103,0,0,2d1bf7de6e8ddbeed19c39c30ece97ef5f046f11bf32a09905b7319aebfbbd7a,2024-12-17T18:15:25.260000
-CVE-2024-55104,0,0,89d3d58efc57157a740708a2dcef2c59f16a1c0cc5594654e6cb8083054710bc,2024-12-17T18:15:25.460000
+CVE-2024-55100,0,1,33d0b68b4a1b95b13d83b0a554f1c0b5e79107824be878c03bd773954b614651,2025-03-28T16:25:16.377000
+CVE-2024-55103,0,1,ee0ccf1ed1fd812fbea27730ca088b997a7c393b2a345905c94250b1dd4695f0,2025-03-28T16:26:07.910000
+CVE-2024-55104,0,1,ae0215fb336b22e1e2cf2bf52097046ebc3a3cc5276eb6f7eee4333132e842c3,2025-03-28T16:31:25.177000
CVE-2024-5511,0,0,56fb77e68915452d67789c3a74a2cde0633cd6fde099063447a457a2d0c56373,2024-11-22T20:15:09.453000
CVE-2024-5512,0,0,e291a0f62c622b98719d0669427609426642277e7e0c79f3db83875786e582a2,2024-11-22T20:15:09.563000
CVE-2024-5513,0,0,6fc05209f2de569aa2d53ff875b7b70727a658dcae4b0d69e9a3aacc36b9dc55,2024-11-22T20:15:09.673000
@@ -275492,7 +275497,7 @@ CVE-2024-55227,0,0,ea2a0123939f9b1ea5315d2e571a3cfd2a2b9c563e7d434bfdd1e42b71dd3
CVE-2024-55228,0,0,eecb7530d030d8ee385f7f9d91b0f88ebc1f92238de3682fd2d3a79e15c4889f,2025-02-19T20:15:35.670000
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
CVE-2024-55231,0,0,0f2879a830bf65ca740c9104d0f5b7cf06ebbf48cb12754d4e2775c0b62dda8b,2025-03-27T16:30:14.617000
-CVE-2024-55232,0,0,1864ac97778845b0c2006d5c17dbf59eb90aad80a835e2f552f3f64f26c6392b,2024-12-26T20:15:22.673000
+CVE-2024-55232,0,1,0ca7947c8f20ab530f6ef9f382dd1a93ea84b85960cc7132226746574ebf3ddb,2025-03-28T16:21:59.560000
CVE-2024-55239,0,0,cbfed4e5dffe1c92f805fb83f4f8a51e197e12f93a7416bc9c5ac9864cc8d243,2024-12-25T03:15:19.813000
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
CVE-2024-55241,0,0,187ea8b2ce4e3d344bad396027a912baec6f3e2b9e5b42839c08917307b0c3f3,2025-02-11T15:15:18.593000
@@ -275538,7 +275543,7 @@ CVE-2024-55457,0,0,7b4cb86f3761833ca26fd0a858cadcf91eb7e69cbfa7df0c347b996d089fc
CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
CVE-2024-55460,0,0,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000
-CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000
+CVE-2024-55461,0,1,df958f7c00c8a8535af124b3f4fbfcd81a3726621b4e3eac8dd977dfbdb6bb10,2025-03-28T16:55:56.543000
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000
CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf26a,2024-12-20T18:15:30.730000
@@ -275886,7 +275891,7 @@ CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b18
CVE-2024-56161,0,0,74b9e0f4da77c5661e3a9b8f6f148609867e6a20dd72c293a01b3c60c27da44c,2025-03-06T19:15:26.840000
CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000
CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000
-CVE-2024-56171,0,0,8cc43a9d9ba32f16f963a5c9359e85704bcc5f8cac2b879034099a3ffd3643fe,2025-02-18T23:15:09.413000
+CVE-2024-56171,0,1,f6d3110b767b8d3afcd970fbc47d832abca9ca5dd825fdae066e60289081341d,2025-03-28T15:15:46.003000
CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000
CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000
CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000
@@ -277399,9 +277404,9 @@ CVE-2024-6051,0,0,aa65e6649174075424662e8995678fc6862fc773008508455b7b34ad879623
CVE-2024-6052,0,0,c0bac5c1634a8b4157b1fe6fe6b7f990473233d9a06dfef8ea9121e1562fd02b,2024-11-21T09:48:50.920000
CVE-2024-6053,0,0,821b1378f2d36782acdeacabe835656b85ef0b1b32b265c41c1abe4fabc86b3b,2024-09-19T17:22:36.697000
CVE-2024-6054,0,0,330d22a9d680926a5514364dfbd4b4ba63aaad75c104e23030c0427d4e976830,2024-11-21T09:48:51.140000
-CVE-2024-6055,0,0,96ba422005b25d13763e673ef8d9c92e9f506083cd474d58581e00898310f77d,2024-11-21T09:48:51.270000
+CVE-2024-6055,0,1,42a35b7ae9753e0ad1b002364a5ff21ca96538d34d90fc5fed78b800b4d9c519,2025-03-28T16:23:27.830000
CVE-2024-6056,0,0,e867b5abf71fb1c916cafbb891319ba249810d32d78cab4b12066b0b31c1e483,2024-11-21T09:48:51.450000
-CVE-2024-6057,0,0,0b4d6228732dfc77397c755c729e8b8c35779bd0d7a41f7c12504aa93da62077,2024-11-21T09:48:51.630000
+CVE-2024-6057,0,1,5fecce42da2860467a149f2dc60cc0949eee30db8ccbc48966f7c82fcc888a8d,2025-03-28T16:23:36.887000
CVE-2024-6058,0,0,aa14c9702325d70d9e2fb76f706ea4bc493b952790d84b7627114ec1e983bf94,2024-11-21T09:48:51.813000
CVE-2024-6059,0,0,528ce858c4a3e1c773b05c440d73dc25fd6995206f35b7652bf7b372346f70d4,2024-11-21T09:48:51.973000
CVE-2024-6060,0,0,92e2403422bea418868af02fada6c1f01b8ca159584156cb8703e0169c604688,2024-11-21T09:48:52.130000
@@ -277687,7 +277692,7 @@ CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318
CVE-2024-6351,0,0,a12a4c2d39ff729e4e90846810aec1c0c565a0e734f8a92541ca3181ef73eaf9,2025-02-18T19:15:22.833000
CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000
CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000
-CVE-2024-6354,0,0,3cda1563f8e5e6324dfebe36358cd6d36f2322ef740f70cdc8d5c2e216669f46,2025-03-13T19:15:49.370000
+CVE-2024-6354,0,1,36b911a8bccf1843ecfd3b30e222c7cea3be951fcc6dea1b76d52cdcc7af4e33,2025-03-28T16:19:33.260000
CVE-2024-6355,0,0,1a7342d55f17bb222d87b5a8aab97562ff1d52e95ca0e20d2b55888a028fccfc,2024-11-21T09:49:28.797000
CVE-2024-6356,0,0,391f80ddd9c80912d68ca7cb34a9ed8abc87902780460bba886ae0d7ec0ded03,2025-02-05T10:15:22.523000
CVE-2024-6357,0,0,ac68351f8f2ae9df9a3fd8303856280c67b015f60c2dc9118a8436cb09ca3676,2024-08-19T17:23:16.973000
@@ -277813,7 +277818,7 @@ CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566f
CVE-2024-6489,0,0,231e9813e515f1abdef06bf7e87ae67da0b47c391d532eef0539e6f69c239697,2025-02-04T18:04:39.737000
CVE-2024-6490,0,0,f07c5d01534f9d7db74ad4f9c70da26cd7d2ecd19d83d76ec7babc7619efc0e4,2024-11-21T09:49:44.290000
CVE-2024-6491,0,0,a07e0d56f7fc28c3f1292b90a22fd6a616cc710caf31e939ed63246741b6e559,2025-02-04T18:04:16.517000
-CVE-2024-6492,0,0,9c2414922871ab30614f56835ecccc8694f189e5e267c59f2a5c738ba43c5038,2024-11-21T09:49:44.590000
+CVE-2024-6492,0,1,36a4a1db3aaa39764112385de78ff2b5ce319dcb4c7577f39d9fee3ff43cf6e7,2025-03-28T16:22:07.177000
CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff16217,2024-09-27T21:28:49.020000
CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000
CVE-2024-6495,0,0,552714992ade7df369704ec5a67abc29783969349a6aa7efbf61b2aacecb1af3,2025-01-15T17:37:12.707000
@@ -278654,7 +278659,7 @@ CVE-2024-7399,0,0,c63a2f56ac97180c8eeaff7425fc4e1891afb5117e5e5ee0a06426ef5c6cec
CVE-2024-7400,0,0,b76f467bea873c8198d239fa89d885a8d397522f6f80ed1fa2b1862679c1bdd0,2024-09-30T12:46:20.237000
CVE-2024-7401,0,0,0c1aa626bf1f013cd6efcf64cafc89bc58668305e616bb93bc951d283ad465e7,2024-09-05T18:34:17.433000
CVE-2024-7404,0,0,6148e9ce6d58228af84e4655cbde2088c6036af50794e9b6097ba0e8b415003e,2024-12-12T21:48:13.673000
-CVE-2024-7407,1,1,d00d43dbbd913d662b499a9096f6a0c797a075c158935863f0d5c141726d1d39,2025-03-28T13:15:40.760000
+CVE-2024-7407,0,0,d00d43dbbd913d662b499a9096f6a0c797a075c158935863f0d5c141726d1d39,2025-03-28T13:15:40.760000
CVE-2024-7408,0,0,941fb6d771fbc604d540f68018eab8ecb75ec650c1b66e874ba92cbbafa4a029,2024-08-13T16:06:08.213000
CVE-2024-7409,0,0,745add50a7f9f83aeae3165fe582507d9b760d467cb9268750136f81de9a6463,2024-12-12T04:15:08.177000
CVE-2024-7410,0,0,3acc879284fb297363138787309c2aa9ff410cc3958418c08efd55e0119fa6e8,2024-08-12T13:41:36.517000
@@ -279363,7 +279368,7 @@ CVE-2024-8172,0,0,5e062d7fa9b382dea93e1f767fffb1fa53a9fae08c970d11918d99fbdd4158
CVE-2024-8173,0,0,79d0a5bcc298ac96a53f7987d1a6d8cd25e9e6d09db6737baa14ffb177e446db,2024-09-05T18:39:00.950000
CVE-2024-8174,0,0,3446999d604a73b64824b7dfc0f9030b87b9bf86620bf485c6700ced4124e5f3,2024-08-27T14:32:08.607000
CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000
-CVE-2024-8176,0,0,006810a4d7106c310b9a2cc60ff63ef3c53febee391d37178f91b3de5a1cdfa3,2025-03-17T17:15:36.167000
+CVE-2024-8176,0,1,01a8df828e80c9f18e787cea5f03b7bf9ef4a881de418100d7f98fcac62a2ae1,2025-03-28T15:15:46.157000
CVE-2024-8177,0,0,b6b87a35240fa465258bcf1069a2f42ce120e742e643226c45df1f3c07fd30d8,2024-12-13T01:29:28.587000
CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000
CVE-2024-8179,0,0,b1b4aece608ad1a17ae7c49798e553f4880b682fdd1e7f65e9fe5b21bed13415,2024-12-12T12:15:27.937000
@@ -281087,8 +281092,8 @@ CVE-2025-0184,0,0,b184a63ccfba52aab27fef6691d340e1daddf4d99a47576e2d38909af97d37
CVE-2025-0185,0,0,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000
CVE-2025-0187,0,0,d12a337bc74d87519d5374b684a3dea7ffdd06cf77effdc0f40e0dc463609868,2025-03-20T10:15:51.413000
CVE-2025-0188,0,0,e9031ff53ffef21475c8aa9f8ab1c19b6522b51f136de0f15b15cb0b70e0e528,2025-03-20T10:15:51.533000
-CVE-2025-0189,0,1,eb102a6a48c92eda67c16e70908cbfabd41b03486056a8f701abee55cf0ab25b,2025-03-28T14:31:37.077000
-CVE-2025-0190,0,1,53e2908612bb73c2c24609187f041bdce849fd9fe447d49d2376c215d06f80fc,2025-03-28T14:28:25.273000
+CVE-2025-0189,0,0,eb102a6a48c92eda67c16e70908cbfabd41b03486056a8f701abee55cf0ab25b,2025-03-28T14:31:37.077000
+CVE-2025-0190,0,0,53e2908612bb73c2c24609187f041bdce849fd9fe447d49d2376c215d06f80fc,2025-03-28T14:28:25.273000
CVE-2025-0191,0,0,64c66c7c1427f64cc3892b0da850af5ec28804e7cd62aedbe5c560debd12fdd9,2025-03-20T10:15:51.907000
CVE-2025-0192,0,0,4efec9c1255ccd0a3d2bb956c84c31801bd3aa354ef28ec5fc9595ff9332bb67,2025-03-20T10:15:52.033000
CVE-2025-0193,0,0,e17fc9e0ccd728e301ded30b14f7be42c74aa85aac5db475710fd304e3ff3102,2025-01-15T11:15:09.280000
@@ -281147,7 +281152,7 @@ CVE-2025-0254,0,0,c0b515e46d918691acf880cf7e48dd1484bbbda9200e70d05e0bbba9fd762e
CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000
CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000
CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000
-CVE-2025-0281,0,1,2f178337cc54bece29a62c185e27ac31b0fc9ea32855fcb9c996c42739c26e1a,2025-03-28T14:22:53.790000
+CVE-2025-0281,0,0,2f178337cc54bece29a62c185e27ac31b0fc9ea32855fcb9c996c42739c26e1a,2025-03-28T14:22:53.790000
CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
CVE-2025-0285,0,0,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000
@@ -281172,7 +281177,7 @@ CVE-2025-0306,0,0,d624312a1c8b12756fc5d0bd3e740f6bb7afb0946b71499dfca32a0f9d8ebf
CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da39d,2025-02-07T18:15:28.337000
CVE-2025-0308,0,0,69aa7199372cd49af22bdf53a6d4af3a3fe1a182a67295d9df7e0ede45a3d01c,2025-02-25T22:14:17.707000
CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000
-CVE-2025-0312,0,1,a77dfe55b9b8e9fd0cba677d874c5e6e1fc87ea1c4a7421660dac4e10405e186,2025-03-28T14:11:12.457000
+CVE-2025-0312,0,0,a77dfe55b9b8e9fd0cba677d874c5e6e1fc87ea1c4a7421660dac4e10405e186,2025-03-28T14:11:12.457000
CVE-2025-0313,0,0,e04e59ca18724183fc504276fd01824f7c821656cc44b0d64bb8f617e07b8fd8,2025-03-20T16:15:14.923000
CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000
CVE-2025-0315,0,0,5d98fa6a770161856e42c23257da6b1a5bceff2066d6b0d41a72d94c75bb0350,2025-03-20T10:15:52.530000
@@ -281655,7 +281660,7 @@ CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b5
CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000
CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000
CVE-2025-0985,0,0,b7e69fe9aab5a8f8f386d8658128b018c3bd5d2957b0618e798c2f6db4110f39,2025-02-28T17:15:15.937000
-CVE-2025-0986,1,1,ed15f2edadbeabb249f8bae31b072a394f7d803c08951aaaa5c8a49022221b78,2025-03-28T14:15:19.357000
+CVE-2025-0986,0,0,ed15f2edadbeabb249f8bae31b072a394f7d803c08951aaaa5c8a49022221b78,2025-03-28T14:15:19.357000
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000
CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000
@@ -281805,7 +281810,7 @@ CVE-2025-1189,0,0,e4eb678cba834278c817b0655cf1d1ccb0ebf3aac198cbef30b78dc9ecdd35
CVE-2025-1190,0,0,33f0c1cfdf1b5453d3ca4168d001f81bd5d9763fb79c5da74115fc04295cf4e5,2025-02-18T18:47:00.127000
CVE-2025-1191,0,0,68ae64db52ba71826cca74e51d5098a0f6b7516bdf742f4f6aa2dfaf1af2b56d,2025-02-18T17:51:51.260000
CVE-2025-1192,0,0,bddfdd8bf7ec90d72695992bca2c3b133244650a31e9e38c0b8b8d53178351ce,2025-02-18T17:52:35.107000
-CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000
+CVE-2025-1193,0,1,eb3ead96a13b793e6e9b5b92bec2342b3721a77c6d9f3280b201ec2aa1c59b07,2025-03-28T16:20:35.580000
CVE-2025-1195,0,0,80f030388af8fea7825bd1907b4fe21f17857f909b5920854f4ff3175ca4ca32,2025-02-20T20:37:54.487000
CVE-2025-1196,0,0,dd006c25814afd256aa97758b279860261417526a6b19678795b25893f289a48,2025-02-20T20:38:49.990000
CVE-2025-1197,0,0,de43e5b6692d1b9b0eebd9c927bc4fff429b39277d83cf06754f96cad74186b0,2025-02-24T16:15:20.820000
@@ -281836,7 +281841,7 @@ CVE-2025-1227,0,0,d63c7e3c8d25c84b516f2d4288c4058312ea310a35098a6f5f948110a8cf3b
CVE-2025-1228,0,0,12c830b22a778120983d037d36321ed8fb02836367f4bbbd9be0e19668100480,2025-02-12T22:15:41.493000
CVE-2025-1229,0,0,fa5787151bd081a7c3655f50c46799853d648eeeec0e4010ed7332955f8d9df1,2025-02-12T22:15:41.667000
CVE-2025-1230,0,0,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448d5,2025-02-12T11:15:11.230000
-CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef33383e,2025-02-11T15:15:20.643000
+CVE-2025-1231,0,1,dcc7744995b7d6bb53bad0c3a17ccdace3cc9ce75803cc23b72d1ab8d116a265,2025-03-28T16:22:09.763000
CVE-2025-1232,0,0,70fa05f64d70f4f99806ee5917ab254387b18b5b1cbfa977b5d854807b6ef4a0,2025-03-19T15:15:53.263000
CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000
CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000
@@ -282081,8 +282086,8 @@ CVE-2025-1628,0,0,0981be15b6355fe96e6cf6533415aadaefca54b32ab4ef2345058038a2f7e6
CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0c3,2025-02-24T05:15:11.280000
CVE-2025-1632,0,0,73963594ec349af4ff5563baefa2275473270d101d132ae7dd238c3c85b0ecda,2025-03-25T15:41:41.683000
CVE-2025-1634,0,0,765d25a71e7596e3d1f1f1f40fca8aaec5cc08e3158b2f39db981240c06c1630,2025-03-03T14:15:34.237000
-CVE-2025-1635,0,0,47aabed071498e67f6b790182bf107f39e0743498ccf0a7bbe6a278ecc424354,2025-03-18T17:15:45.017000
-CVE-2025-1636,0,0,5c3492630ae3406e3a5b69018aeb8c51fcf5010ce6bdb8f42c1a19106407dd65,2025-03-18T17:15:45.263000
+CVE-2025-1635,0,1,0499f172f9ad04082d92344ffc1551c65c1ba825d69539bd091607b7115ee757,2025-03-28T16:20:27.283000
+CVE-2025-1636,0,1,76209b53ada620ac1db5782040876be75fe1cf6931e7839f2c9a9e46ee35bb38,2025-03-28T16:20:21.163000
CVE-2025-1638,0,0,627220f87bb0a3619d145b1fa74713ce7dfbc18460f28421739180b159028d87,2025-03-01T08:15:34.167000
CVE-2025-1639,0,0,da159a509ff0db0fc6859254884c97bbcb558323cbe73cc135353de09e900bc4,2025-03-05T16:42:35.967000
CVE-2025-1640,0,0,ba1070cfb95f1953dddd4c9b0d163f5480fe2b853bdc18f3b9a9da9de694a46b,2025-02-28T17:50:32.953000
@@ -282097,7 +282102,7 @@ CVE-2025-1649,0,0,3b5fbb2e4731dcc40a7a4ed88d2c8a60211ff1f5cbe5c969993021f107517e
CVE-2025-1650,0,0,4218c32cbb82256e1ff0a9ceabf09dcbbee0c890d930e1b88a57eb073009cf05,2025-03-13T17:15:35.990000
CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf17c,2025-03-13T17:15:36.153000
CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000
-CVE-2025-1653,0,1,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000
+CVE-2025-1653,0,0,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000
CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000
CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000
CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000
@@ -282153,19 +282158,19 @@ CVE-2025-1755,0,0,09476b6d542bfcc927e067fe8e3ce0d3ca1fbe0a9d5ffac658df7f448d43f3
CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000
CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000
CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000
-CVE-2025-1762,0,0,ce5f230370b79f7bc53052e2ff511d886eca4bd8b9760a3e1a224e01388ab45e,2025-03-28T06:15:32.770000
+CVE-2025-1762,0,1,ed408e94e382a24562a9dcd1306de2cef96ecfa0e24adc939b624bf82fa44f9c,2025-03-28T15:15:46.297000
CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000
CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000
CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000
CVE-2025-1768,0,0,21c4d8708441d636d3d85a241f0a7821ff945f56838f66ee7adb3147ed9da671,2025-03-07T11:15:15.653000
CVE-2025-1769,0,0,40a5f722c30fac35eb6f1c2b5584f1f53ecf84c5015f4b5e10367b65507f6b46,2025-03-27T16:45:27.850000
CVE-2025-1770,0,0,dabca41c99283c1e30c784be93a5fbf7941611623d961fbc22d34f6c0b873c34,2025-03-20T06:15:22.903000
-CVE-2025-1771,0,0,f941eeb87406f27b32688fc24536403440e01c6f12dad32afe5e745de8f06ad7,2025-03-15T05:15:47.253000
-CVE-2025-1773,0,0,8ec8dbded090ba64a07cfd6b14e86950d4c62160e124de793edae4c60a6f92e5,2025-03-15T05:15:47.403000
+CVE-2025-1771,0,1,fbe92b0fe50601c60b5583b38f822aee7d75f574ab45d98310de4f563be4c316,2025-03-28T15:05:47.470000
+CVE-2025-1773,0,1,e53acc6a4d10abe2acaf7ea6efebc18b3608dede84de9a0653563728a0b5f4b1,2025-03-28T15:02:33.313000
CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000
-CVE-2025-1781,1,1,9110731c3988f380d19d25549f49f14dcac832bed7aa92d5e3ee29cdbb0c344e,2025-03-28T14:15:19.687000
+CVE-2025-1781,0,0,9110731c3988f380d19d25549f49f14dcac832bed7aa92d5e3ee29cdbb0c344e,2025-03-28T14:15:19.687000
CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000
CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000
CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000
@@ -282336,7 +282341,7 @@ CVE-2025-2002,0,0,f6633a4bf95f1acca6461e5746742a468fcfc4de740f49e091d294f640d7fe
CVE-2025-20021,0,0,cf31c7f602ee9b0ba953ed77eb772822363a1b9145058bcffb29e8773e23b7d0,2025-03-04T19:12:58.403000
CVE-2025-20024,0,0,1421aed3b28d8aa108abc69a83b80de8afd5f6f8b68be3b64553a4ed5e3780c6,2025-03-04T19:12:22.553000
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
-CVE-2025-2003,0,0,1b1804be805ddc2f4a439446a67f221006a8e61bdc04aeb480345599447d9d73,2025-03-05T20:16:06.380000
+CVE-2025-2003,0,1,1ff74da9902681eb388838cb7011652f9b1b0fb32f468944cb3ae220136a25e3,2025-03-28T16:22:53.547000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000
CVE-2025-20042,0,0,7331f9a32fa8f7edda7e90ecfb8214172e30817ece2cf7e097fe968d19847586,2025-03-04T19:11:26.743000
@@ -282365,8 +282370,8 @@ CVE-2025-20118,0,0,46ee44de51b9da02bd8d432dfa199efdea3d4009128ccc31daf3be958d7ba
CVE-2025-20119,0,0,966174a4c9d991ad6b83e65d9f7d13b4b14250c9460c971b03cac87408097d39,2025-02-26T18:15:14.570000
CVE-2025-2012,0,0,0b8d8afd00eda96ec005af8edf0d7d04b1fb0ed2ed11512934641682f43663d5,2025-03-11T21:15:52.333000
CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000
-CVE-2025-20124,0,1,6db356d2fcd38b26aa3e47d7a0ec82ed7c18925211d51966c9b8a29c55acd1c9,2025-03-28T13:22:42.077000
-CVE-2025-20125,0,1,d061ff1519e48d95901944b45526454224b9d67046eae5a72bdd0b7b8937d87d,2025-03-28T13:37:16.650000
+CVE-2025-20124,0,0,6db356d2fcd38b26aa3e47d7a0ec82ed7c18925211d51966c9b8a29c55acd1c9,2025-03-28T13:22:42.077000
+CVE-2025-20125,0,0,d061ff1519e48d95901944b45526454224b9d67046eae5a72bdd0b7b8937d87d,2025-03-28T13:37:16.650000
CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000
CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000
CVE-2025-2013,0,0,7432ed434a81be08eebea71dc536132f3b4153ef4361ce42ddf523e2ec29dcd5,2025-03-11T21:15:52.473000
@@ -282406,8 +282411,8 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
CVE-2025-2020,0,0,ce26c5965e99864b9e0a9b9af3af837a751d1f222c43aeb691010c4ea46e517a,2025-03-11T21:15:53.477000
-CVE-2025-20204,0,1,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000
-CVE-2025-20205,0,1,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000
+CVE-2025-20204,0,0,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000
+CVE-2025-20205,0,0,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000
CVE-2025-20206,0,0,9a82394590b91b4aed7223068e34dd2e6c890c30b29f73231c2aa9f9587d8fd0,2025-03-05T17:15:14.450000
CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000
CVE-2025-20208,0,0,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000
@@ -282591,7 +282596,7 @@ CVE-2025-21105,0,0,7769ede7d6d67929cda835ad36f1b7f8a4f0b24a4fa55bfbbf6043d06ace2
CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2f91,2025-02-20T12:15:11.373000
CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
-CVE-2025-21117,0,1,645b1da2e8af06c5f3d21bae0eae50f754102ea2f31528d1d042846d09e2ec44,2025-03-28T13:24:51.620000
+CVE-2025-21117,0,0,645b1da2e8af06c5f3d21bae0eae50f754102ea2f31528d1d042846d09e2ec44,2025-03-28T13:24:51.620000
CVE-2025-2112,0,0,12876043094c79f81e904e1d2257170a373b17e7d0d24c6eb1a19e93cc051c0d,2025-03-10T16:15:13.817000
CVE-2025-21121,0,0,802c8ab06cca7a283fc5df774dee22f4815bee93ce4d27eceff64530964239b4,2025-03-03T14:59:35.637000
CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000
@@ -283010,7 +283015,7 @@ CVE-2025-21636,0,0,3ae85a8633d6e4c7c4afc5f451961d9da40e543a763d571ae649ce9785a31
CVE-2025-21637,0,0,05925b5efa9f02ac6aa5ea9a870677d070a2594d067656530286fdfa84ac33a2,2025-02-27T22:01:21.430000
CVE-2025-21638,0,0,2cf12756103fa057c758685520e5d32673cabca9788320ddb76ebc6dafda2566,2025-02-27T22:01:34.240000
CVE-2025-21639,0,0,6951f75342622895a60945bf95682a2b99fe500b47ade5ffb8d5307929bbefd5,2025-02-27T22:01:10.337000
-CVE-2025-2164,0,0,900cdbdb61ceb1074a5b4a7bb3af5359c5aca5494dec7a9cf45edd03737a9725,2025-03-15T04:15:22.260000
+CVE-2025-2164,0,1,d129d9f55d497cb5ee956a685ad5a71b65aaa7cdf73250ad0c7ad1c2f1b56f93,2025-03-28T16:07:07.700000
CVE-2025-21640,0,0,543f40a49c92fa803e05fd285cd1c9581d6fecdba4ff3a54d984f97f6ee95e4a,2025-02-27T22:01:01.257000
CVE-2025-21641,0,0,e146fe147f4fa7c09deeed8b7b710dae78c5022fd48636d72f67d9a8f95f9998,2025-02-27T15:15:08.843000
CVE-2025-21642,0,0,db386d9b7ed30d3f5c13d931cfd57fded14502dce954776abee9b860bf0b293e,2025-02-28T18:54:58.420000
@@ -283235,7 +283240,7 @@ CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809
CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000
CVE-2025-21853,0,0,69aef8837c81847ced3742cc31c58a0f2fa01f1030a59d09ec56b6defad2ef68,2025-03-13T16:30:22.740000
CVE-2025-21854,0,0,9c78450b8715b387e8b26947750bb1e0ffed5820b15e3f2e0a35a80d6d8f2f8c,2025-03-13T21:18:24.623000
-CVE-2025-21855,0,0,ac6ee5f35379a2857d20f2a16134ba52ced6422d01cb5d14bb2ca34275bd4e05,2025-03-13T21:18:17.013000
+CVE-2025-21855,0,1,b60684fe956750d19be1267ce72b8af8344e6c62db29457ed70e99353d1b5be9,2025-03-28T16:15:28.047000
CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4332,2025-03-13T21:18:08.423000
CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000
CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000
@@ -283260,7 +283265,7 @@ CVE-2025-21875,0,0,b5625c8e550275d03916a5a20e4feeb93d091dd6e8a0bc9bd35a7506d0cb5
CVE-2025-21876,0,0,4a0038b7c7e3ad9384cea82279b1cf64a05a3e4225ed9d56a36a485128171757,2025-03-27T16:45:12.210000
CVE-2025-21877,0,0,c437563af9a3bbb4466053437f14e6318de6523f073b70a549fee56451cd2d50,2025-03-27T16:45:12.210000
CVE-2025-21878,0,0,85bb1d4ce91851874a9876add0fe2bdb719454b0f602c413429852acacb7c4e9,2025-03-27T16:45:12.210000
-CVE-2025-21879,0,0,f898a4c7a195d54b37167f5fa610cb1df343883f0a4083de16fe54ec6dcdf952,2025-03-27T16:45:12.210000
+CVE-2025-21879,0,1,75655f5a5bc5528b706a589f55c3efbfd28ed61fa015fc73f11c37ccde2072ef,2025-03-28T16:15:28.220000
CVE-2025-21880,0,0,65446dd7a88d3aea0edc0fbbc44ae1ecb39e31762207fdb90d675ebb3ecfd495,2025-03-27T16:45:12.210000
CVE-2025-21881,0,0,621c593ef852fd10664a6193911b19f75ba42ef286e0ef80709cdd2519027040,2025-03-27T16:45:12.210000
CVE-2025-21882,0,0,b07c3caf9a06f9aa5a6a3daff13eb0af4f51c57b66970e54bef6a1226adf5b1d,2025-03-27T16:45:12.210000
@@ -283442,9 +283447,11 @@ CVE-2025-22352,0,0,05ab364f7e7a1c5c049208b0f9460479a7ff74cb37dbb98d3f27efafd51be
CVE-2025-22353,0,0,000f3439c34c0fd18a96f9bb39dd1b25c8059f2fcd0e1683a6551f664e444d87,2025-01-07T11:15:18.693000
CVE-2025-22354,0,0,66e404e55340b213b0c2657d1f6b7ed8a803e8838cb6bbee91b29999b4687ec1,2025-01-07T17:15:33.230000
CVE-2025-22355,0,0,ca39854898c1796213661f5ba88920b4dbe4062400b636abea87602baebf8bcc,2025-01-07T11:15:18.857000
+CVE-2025-22356,1,1,f66e564e441e6a31914a9bb8a7588151fe7dec30c3ccb2bf4c774036642a51a2,2025-03-28T15:15:46.490000
CVE-2025-22357,0,0,8145dc70a7e6819f28516928dba6a6374a9f2bfc6bb0f15e92ae4f33b07e879f,2025-01-07T11:15:19.013000
CVE-2025-22358,0,0,58275121d439329ac6bcb88bfbc8948125788be2bee13fdbccdb8edd57659b00,2025-01-07T11:15:19.167000
CVE-2025-22359,0,0,995a1cace9e7721854dee56d9daa4b4cd821bc63cb750269e526e424750b384b,2025-01-07T11:15:19.310000
+CVE-2025-22360,1,1,580ef71ac9fa009edf5b1ead3908022ca89b43b2036176e5e9dfe965196629df,2025-03-28T15:15:46.653000
CVE-2025-22361,0,0,af12e2c6ebfec3624d0ee30cd638aa7b24fc59355579c0263e32fae5077df9f7,2025-01-09T16:16:26.830000
CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf16a,2025-01-07T11:15:19.453000
CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000
@@ -283495,6 +283502,7 @@ CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75
CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000
CVE-2025-2250,0,0,6a0e04abb2adbc03bbe00299adb0beb9b8293cf33361973132e7a4e0a309006c,2025-03-13T04:15:23.137000
CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000
+CVE-2025-22501,1,1,f764511be8b399ef05e4ccd91d6432c253d7550ed40d1d01d5036be9672bf429,2025-03-28T15:15:46.790000
CVE-2025-22502,0,0,3183867d6d0bb4304290089bf31cd36b52e2a0152aa74b8aad25d0ed6a2a48d9,2025-01-07T16:15:45.717000
CVE-2025-22503,0,0,2312eda7beecfe6ecfb9249f8a971c65cfe30e58668d20a90b2c6b9852f7f977,2025-01-07T16:15:45.877000
CVE-2025-22504,0,0,a9139c7e10a4bdae0f6c289db8b58ce819e8b48dfb9a72eac5250d51a0c5e3e4,2025-01-09T16:16:27.110000
@@ -283516,8 +283524,10 @@ CVE-2025-2252,0,0,8225b36f95860f767886fbbd52c7dc832516be319652facf235d70dcb25749
CVE-2025-22520,0,0,d90fcded13c83210ff25a704cf2d7700ad6fc2bbd95729d89ec73c52d86588de,2025-01-07T16:15:47.310000
CVE-2025-22521,0,0,e62fb335e410addf0641d689eefeeec9d9054d8a13b83f38fee365914160d44b,2025-01-09T16:16:27.743000
CVE-2025-22522,0,0,1ebc82346c4e34dee12844f6aa464ab0e7c0d220eb4925eee3392344e450fdee,2025-01-07T16:15:47.513000
+CVE-2025-22523,1,1,571fb27b1a71084b0550d66118199cd511fd05776edc5144dea99385547d5410,2025-03-28T15:15:46.930000
CVE-2025-22524,0,0,8a23e2aa149aafa1995794612c63a3f12fada023081e14e67818a48edc5f07e4,2025-01-07T16:15:47.680000
CVE-2025-22525,0,0,2450e2a7890b860ebbedbee23a3778e19f1af2d502cf8e6fca48c14a5e43a264,2025-01-07T16:15:47.830000
+CVE-2025-22526,1,1,0116cd0dc36d5d75b394e47514fa7a68168fc69fe6489cd0b781b82b3130e6d3,2025-03-28T15:15:47.067000
CVE-2025-22527,0,0,dddb72d486920faec7518243d87904d14ce0784eb212bedd940fa2ffaca5856a,2025-01-09T16:16:27.890000
CVE-2025-22528,0,0,587c2eb86a91198b816a3b392027083dc7733d721ed5f73afa2d78180d1fdaca,2025-01-07T16:15:47.987000
CVE-2025-22529,0,0,f078564d1a2cecc5128f9b5ad9b171bcf776a688face6093deb4549ab61309fe,2025-01-07T16:15:48.180000
@@ -283557,6 +283567,7 @@ CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5
CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000
CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000
CVE-2025-22564,0,0,c6bcdc2f84aa39c7ba65ae760aaf069d1367d782297729876d0295b371334f83,2025-01-31T09:15:07.627000
+CVE-2025-22566,1,1,6ab24387f0e08fe630e9a2da799ac67e4ee47c64288e0fec37f660c5c7df2f9d,2025-03-28T15:15:47.210000
CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000
CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000
CVE-2025-22569,0,0,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000
@@ -283566,6 +283577,7 @@ CVE-2025-22571,0,0,589592d19e0408795b9c88db00be613623e0a28c0ced64bee3ab080db5508
CVE-2025-22572,0,0,09d362e6905110bf03efd8d9b3422685fc5a6f559575660b2f11c273a0d7b10c,2025-01-07T16:15:53.357000
CVE-2025-22573,0,0,cef0a0fee2a846fdd99777eab6d59d8922d33c31d91c1289eff639dfb1ced15d,2025-01-07T16:15:53.520000
CVE-2025-22574,0,0,84e101e6655207515e3d308aae10328b324f66020c49c27e6a9a740f08e66749,2025-01-07T16:15:53.667000
+CVE-2025-22575,1,1,e9a0d68eeeec2e5d05fa557ad057d6034f6501f1166684f77d113aeb31d41c54,2025-03-28T15:15:47.350000
CVE-2025-22576,0,0,d91ec1220267346d1a0f0443983782bbf181c797facca8f491a7bfecb878d90d,2025-01-13T14:15:12.117000
CVE-2025-22577,0,0,de49ca44634bd4c2dcd4ed4b2c861f3aeca16b15d3e20dc646883514b316145b,2025-01-07T16:15:53.823000
CVE-2025-22578,0,0,a663c0074d74b9b4b7e504663f4236ea23bd746235c7a6cf544a9a518e4833f7,2025-01-07T16:15:53.970000
@@ -283657,7 +283669,7 @@ CVE-2025-22665,0,0,ee04fd003d3737181aa71ed8aee1455af1ed540c5946074dd04fa358f3424
CVE-2025-22667,0,0,2ab317bfb9739f9ac69abaab5066562f28e15bdd464ff7c31f6ed096782914f7,2025-03-27T16:45:12.210000
CVE-2025-22668,0,0,d1a30578a3813e474f66c5bc21c20232c78286e745c9ce23f3a63f59b8708ff3,2025-03-27T16:45:12.210000
CVE-2025-22669,0,0,e5fbf912bc05fa45475aad2c168ae954ab63ba0abbd5bea8bdde2e4ebd40e813,2025-03-27T16:45:12.210000
-CVE-2025-2267,0,0,8ebcb576f6cf45b856cc4a4913dbe0761ad22d81a4d32ef5308ef162a12eadbc,2025-03-15T04:15:22.443000
+CVE-2025-2267,0,1,0c210bb94de91f1a5c946acfcd05444c3820c09c735514c8cda79d04010d61ad,2025-03-28T15:41:57.253000
CVE-2025-22670,0,0,f7d120be15ec687637a24f4cfe34ca174d878f05cc9709f53bbf32189a117b75,2025-03-27T16:45:12.210000
CVE-2025-22671,0,0,7049746c0103b49a53468496e534a8831850ccdfee2f43af04ce208028c9bf54,2025-03-27T16:45:12.210000
CVE-2025-22672,0,0,d6fe52a7a95257cebb58cc9fe6e43dddd5412620585ce73657df41a91a7113a6,2025-03-27T16:45:12.210000
@@ -283746,9 +283758,10 @@ CVE-2025-22763,0,0,947af1deb8d9cae5ca079e909cf29879fdb4e7f4a385aecbc64b3952727ab
CVE-2025-22764,0,0,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4fd3,2025-01-15T16:15:39.373000
CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000
CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000
+CVE-2025-22767,1,1,906bf89a24611fd4deed246b2242643be50252a1e1a56dc404717f2c6936d024,2025-03-28T15:15:47.490000
CVE-2025-22768,0,0,d67e24e3bb095b6fc3cdd1ddf309e20d3ead32546acca77b1e796ad170199e1e,2025-01-23T16:15:37.403000
CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000
-CVE-2025-2277,0,0,cf9ff4985b9ed26fd50a71c17f474b066305b0d2fd8d5ad5d89d1344cd28a585,2025-03-18T17:15:47.460000
+CVE-2025-2277,0,1,a8bc5cd0b16e309d43e095ac49658b66e2986d9cb52a0ffd2f162d5b8eec71aa,2025-03-28T16:22:58.023000
CVE-2025-22770,0,0,6c0a61f5d2c09a807a23423a9bcfcaaafa14efb25e8cd93f2594fef192e51f9d,2025-03-27T16:45:12.210000
CVE-2025-22772,0,0,a49a7641398a6c78abf7bdcb1538e84ecbf25664c0b69cb2fc2516de3178101d,2025-01-22T15:15:14.990000
CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000
@@ -283757,7 +283770,7 @@ CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa
CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22
CVE-2025-22778,0,0,a2bc20469f55e874da32fca9be88da64c934748fc51c1927967277612aa1f61f,2025-01-15T16:15:40.350000
CVE-2025-22779,0,0,1dbe2ad312835dc346b83ea64bb7019d11586a48cc8d249ef5a6c76c895b3238,2025-01-15T16:15:40.510000
-CVE-2025-2278,0,0,561180bd46cf51d19a3cdbb94bf0249db283e0249df2bb035a2b96b1dc90d1f4,2025-03-18T17:15:47.670000
+CVE-2025-2278,0,1,1f6ba3e8865a0fc197221680bef34c2019c013aa87a883c69215d2a422304533,2025-03-28T16:23:02.837000
CVE-2025-22780,0,0,2d5a324e293c4c4f1be80441263a70eba23c271f2f2cb79bdaadc07dcabb9591,2025-01-15T16:15:40.660000
CVE-2025-22781,0,0,1afa1e21c86cac8ee7b1d1071985c89e8ee67ff99915e1b488521ef5a115afa5,2025-01-15T16:15:40.813000
CVE-2025-22782,0,0,4d4a57c4ca0b47080b236548a74a5ed3bac54edcb8336bdf840fd3b341ca7ef9,2025-01-15T16:15:40.973000
@@ -283773,7 +283786,7 @@ CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9
CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000
CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000
CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000
-CVE-2025-2280,0,0,f4a48035829663cfae86ea311e78db4fe353e4689096d30459dc2c2261cf7c40,2025-03-19T14:15:39.743000
+CVE-2025-2280,0,1,3c729bf718b53d7a8fbc2e72fa5f16dcd614901b486dc8adcf49241fbde2616b,2025-03-28T16:23:07.340000
CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000
CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000
CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000
@@ -285596,7 +285609,7 @@ CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec
CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000
CVE-2025-25684,0,0,3b58a1bef0cae9aea4ea5fa2ee9c7e1f876d6c7c88d8df3de973a9b1df4c99cc,2025-03-19T20:15:19.383000
CVE-2025-25685,0,0,204deb7c4ce53f6e492fa281d6e8bf3f8c2d8728cd8c95a39540e1d64c356261,2025-03-21T14:15:16.177000
-CVE-2025-25686,0,0,16544cfc13e7a6b609c704dc6fb6aeb6a50027f9223e1cc198abb8926085b841,2025-03-27T16:45:12.210000
+CVE-2025-25686,0,1,e949e54740011abafbecbb4bc49b486613f5e4303f5a0e5cbdbf56266ecf9912,2025-03-28T16:15:28.993000
CVE-2025-25709,0,0,9d314f451c270f6d71f71b4acae3d9115f11fe64a66489ce5bdac5bbfa4be764,2025-03-12T14:15:16.077000
CVE-2025-25711,0,0,687cbddc40bafa1aa553307129c536c978baa7c3ff70ab2a66988ede6a6f0e53,2025-03-12T16:15:23.023000
CVE-2025-25723,0,0,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000
@@ -285646,11 +285659,11 @@ CVE-2025-25793,0,0,06fda905cb5d366b2dea7114751b25efc66045f1d1efc5dda933bb838933d
CVE-2025-25794,0,0,0998585ca8b4d1c33b7e8f931090b2805dd26430daee7449f23e43ab4da36dc0,2025-03-06T18:15:41.883000
CVE-2025-25796,0,0,55b92943226ba1df7d1079492bfa786eeb07d68abd2ff61cb507b6fe778a3f45,2025-03-06T18:15:42.103000
CVE-2025-25797,0,0,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cbc26,2025-03-06T18:15:42.377000
-CVE-2025-25799,0,0,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000
-CVE-2025-25800,0,0,84c0703ad8895be752ba6115cd9ffe473c7260c43dbc52d30ca606520fed7ac5,2025-02-26T16:15:17.053000
-CVE-2025-25802,0,0,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000
+CVE-2025-25799,0,1,415d9296bcdb789b1daa56df27f39194cdf4cfa7d524e01604ed37241e3e04ce,2025-03-28T16:59:59.810000
+CVE-2025-25800,0,1,ea55c8654d981d4133ce161a389a2e22daffcd91bf7b6df3a2ed9667b331879a,2025-03-28T16:59:53.310000
+CVE-2025-25802,0,1,5b7312d109c7306b98466d7b4ccf8332b5ad6cb4414de741bacf1428ceb36893,2025-03-28T16:59:38.873000
CVE-2025-2581,0,0,152f852fdf29a94280a5a1f86deb5956c11dda610413d186f51763bbca5cb2f2,2025-03-27T13:24:49.403000
-CVE-2025-25813,0,0,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000
+CVE-2025-25813,0,1,1cba07b97776d83599b7df63b5b5766d7b58fec6ea11e828d5d68a4a88b39cb9,2025-03-28T16:59:27.230000
CVE-2025-25818,0,0,40ddbafdf9692bd0bb31a2e859c8e57e42e627fd7e19bb409eb5a4ac63b878d1,2025-03-03T17:15:15.230000
CVE-2025-2582,0,0,4785ce7c12661aad317c69e36620dea23112ae200c7b0211413b5528a73e06a9,2025-03-24T14:29:50.370000
CVE-2025-25823,0,0,01cc00e46c57e1cd4b84caa1ec0705b698501680e84031ab252f0d5809c36fcf,2025-03-06T21:15:15.130000
@@ -285784,7 +285797,7 @@ CVE-2025-2626,0,0,2ec672e2fe0c1e79dfa3082efb3637c788281bb0a435927822d89abd613cd4
CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000
CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000
-CVE-2025-26265,0,0,dfd260c0fccd729b752a019ec6af0a4a8e67997f385fa4c034496b4b03036302,2025-03-27T16:45:12.210000
+CVE-2025-26265,0,1,a1e1cddd3368455d8fc7af1822e4326b1b03402845c4f5127e6206ac1ed92a37,2025-03-28T15:15:47.830000
CVE-2025-2627,0,0,866d688a78139ad30a252503dfe1e20ddb58caaa73407bb43bc362af005f98f6,2025-03-24T15:15:17.530000
CVE-2025-2628,0,0,83a1631f49317916690a06572d89f47748433e4b0c01a8875ee0f80e5ce95629,2025-03-24T14:15:19.187000
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
@@ -286242,6 +286255,7 @@ CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3
CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000
CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000
CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e195d,2025-03-27T16:45:46.410000
+CVE-2025-2713,1,1,96361d4a279a8339e89efce75d6906b399a84623aa4512151ae5c208d68dbf4f,2025-03-28T16:15:30.043000
CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000
CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000
CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216889,2025-03-10T19:15:40.770000
@@ -286634,11 +286648,11 @@ CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b9478
CVE-2025-2815,0,0,ae8483c7dc37fd3e44032d03f541292a385437aa962e27f88b8c36a255e50f41,2025-03-28T12:15:15.550000
CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000
CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000
-CVE-2025-28219,1,1,d7fe6408904eaf7d1b8df2498bf4e47705c64034b5d3901d1f8d354d75fdc406,2025-03-28T14:15:20.253000
-CVE-2025-28220,1,1,19854ddd28ca5587c3d8eceae6031d6a48f7eae409d298a89bc08248184124c1,2025-03-28T14:15:20.377000
-CVE-2025-28221,1,1,ae9d4c3b6977b54666ee5723ceeaac1c5cc795e338ba7aa47e34a0f2f6384543,2025-03-28T14:15:20.483000
+CVE-2025-28219,0,0,d7fe6408904eaf7d1b8df2498bf4e47705c64034b5d3901d1f8d354d75fdc406,2025-03-28T14:15:20.253000
+CVE-2025-28220,0,0,19854ddd28ca5587c3d8eceae6031d6a48f7eae409d298a89bc08248184124c1,2025-03-28T14:15:20.377000
+CVE-2025-28221,0,0,ae9d4c3b6977b54666ee5723ceeaac1c5cc795e338ba7aa47e34a0f2f6384543,2025-03-28T14:15:20.483000
CVE-2025-2825,0,0,b0ac602f299249f0031cd4605db7336883e5a9c727d54fb2508254997b2a81ae,2025-03-27T16:45:27.850000
-CVE-2025-28253,0,0,817483eedee34c743a4481820dc3dbf577051ae76a82bf6f0b0a1c9d13de7780,2025-03-27T23:15:34.867000
+CVE-2025-28253,0,1,a8b8aa6ae9cb84bb3406c0157f0953fee5aa3538db7d6748813526907b039fa0,2025-03-28T16:15:29.490000
CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000
CVE-2025-2832,0,0,9ba849558861453fef9ac84ebe5df211359e27bc420cd4cffb0300d913dc6662,2025-03-27T16:45:27.850000
CVE-2025-2833,0,0,eb7c84413fdadec03caac6d347a0740edf7f927c7fe3c7d696d59524f7f2cbfe,2025-03-27T16:45:27.850000
@@ -286650,22 +286664,22 @@ CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e5
CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000
CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000
CVE-2025-2852,0,0,765e659269b1e0d3eb25b4a8bbde2d93ec95002b11855016ed47d09f9b6497d1,2025-03-27T16:45:12.210000
-CVE-2025-2854,0,1,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000
+CVE-2025-2854,0,0,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000
CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000
-CVE-2025-2857,0,0,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000
-CVE-2025-2858,1,1,6bbee639dd0aab6dd26bbfcd974d0bcddafdc32a33a61593861e278ccf5bda8f,2025-03-28T14:15:20.650000
-CVE-2025-2859,1,1,67f56f2fbf417b2f61e42c53ed212a256361b5ba25b19b84b5ca84c7ed2c0b9d,2025-03-28T14:15:20.810000
-CVE-2025-2860,1,1,2f5f3312ae65adf4f8e2a2e3b13946f9917e6188fdcd30086ab5d086b3970fba,2025-03-28T14:15:20.967000
-CVE-2025-2861,1,1,45a0b85fdef388e3fa22ae322d4e453181f488a75d88d85c29f8ce89913c6443,2025-03-28T14:15:21.113000
-CVE-2025-2862,1,1,fe00293c4cf30ffbab114d7bf2f7dee730dc374d918c22070c7ec496d286c22c,2025-03-28T14:15:21.257000
-CVE-2025-2863,1,1,34e0071c0cdcac7436cc82f177934ff700cbed706c62795b825c9d44db7660cc,2025-03-28T14:15:21.410000
-CVE-2025-2864,1,1,493b556778b174bf0df7fb7bf034c03dcd1c20da8165cd4f2a8ad8b89ce26c0e,2025-03-28T14:15:21.570000
-CVE-2025-2865,1,1,3b9a08d9359bdaa5849a4681ad69ec471503afa2c59d2d24179744630a925929,2025-03-28T14:15:21.727000
+CVE-2025-2857,0,1,8c7f8ac266f15d25c9af4fc5e517cf8a450da35ae1d4923b3d1c4b2dbd19ab2e,2025-03-28T16:15:30.180000
+CVE-2025-2858,0,0,6bbee639dd0aab6dd26bbfcd974d0bcddafdc32a33a61593861e278ccf5bda8f,2025-03-28T14:15:20.650000
+CVE-2025-2859,0,0,67f56f2fbf417b2f61e42c53ed212a256361b5ba25b19b84b5ca84c7ed2c0b9d,2025-03-28T14:15:20.810000
+CVE-2025-2860,0,0,2f5f3312ae65adf4f8e2a2e3b13946f9917e6188fdcd30086ab5d086b3970fba,2025-03-28T14:15:20.967000
+CVE-2025-2861,0,0,45a0b85fdef388e3fa22ae322d4e453181f488a75d88d85c29f8ce89913c6443,2025-03-28T14:15:21.113000
+CVE-2025-2862,0,0,fe00293c4cf30ffbab114d7bf2f7dee730dc374d918c22070c7ec496d286c22c,2025-03-28T14:15:21.257000
+CVE-2025-2863,0,0,34e0071c0cdcac7436cc82f177934ff700cbed706c62795b825c9d44db7660cc,2025-03-28T14:15:21.410000
+CVE-2025-2864,0,0,493b556778b174bf0df7fb7bf034c03dcd1c20da8165cd4f2a8ad8b89ce26c0e,2025-03-28T14:15:21.570000
+CVE-2025-2865,0,0,3b9a08d9359bdaa5849a4681ad69ec471503afa2c59d2d24179744630a925929,2025-03-28T14:15:21.727000
CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000
CVE-2025-2868,0,0,33f03011f98d9b773c14b1eaa32de439498e396e9d02b847bc09f3a2dda95cda,2025-03-28T11:15:37.840000
CVE-2025-2869,0,0,70e39c53ec99674bbca84518f2d52539d24d976a5693f00166c6a21ea8ec0e44,2025-03-28T11:15:38.053000
CVE-2025-2870,0,0,b58b8becc9dd52506e052ae4c75da0c6f2fc105e0d55b4b26829d67c68e704ee,2025-03-28T11:15:38.207000
-CVE-2025-2877,1,1,cc98c6b852ffd3902484764384f64302df452aade6e9454fddef82a200fbdcb4,2025-03-28T14:15:21.877000
+CVE-2025-2877,0,0,cc98c6b852ffd3902484764384f64302df452aade6e9454fddef82a200fbdcb4,2025-03-28T14:15:21.877000
CVE-2025-2878,0,0,28f11500fb554822acb92093abd5f7f7b4e10dac47c29b89b43c371fafe7f359,2025-03-27T23:15:35.067000
CVE-2025-2885,0,0,1f299ee6f9c1687c7ad3d5b4a66ac1f9f94c352f666602218763c98e2dde7ca0,2025-03-27T23:15:35.240000
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
@@ -286760,19 +286774,20 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651
CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000
CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000
CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000
-CVE-2025-2901,1,1,38f9c417a6c20fb5be2bc1a8b73e0b30e4b01f4859c5680551c20eedbe06df17,2025-03-28T14:15:22.020000
+CVE-2025-2901,0,0,38f9c417a6c20fb5be2bc1a8b73e0b30e4b01f4859c5680551c20eedbe06df17,2025-03-28T14:15:22.020000
CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000
CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000
CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000
CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000
-CVE-2025-29072,0,0,35ce48c77c318e6003a1e18972edd70a67880d00b73ee6fdb606d5e887da4951,2025-03-27T16:45:12.210000
-CVE-2025-2908,1,1,f64cd7fcb5d24ae83e31008923f3bbe96834955e323591c3be0523672ebfdf4d,2025-03-28T13:15:41.217000
-CVE-2025-2909,1,1,3a720593aa3fbf005f652d39614ce0640eb45ef48808a9985cc786293f08c174,2025-03-28T13:15:41.387000
-CVE-2025-2910,1,1,4978130c69eda3969fc4aaa24df412c9ffafc7d3ed2c7fd50401dcf2d877cc1e,2025-03-28T13:15:41.533000
+CVE-2025-29072,0,1,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000
+CVE-2025-2908,0,0,f64cd7fcb5d24ae83e31008923f3bbe96834955e323591c3be0523672ebfdf4d,2025-03-28T13:15:41.217000
+CVE-2025-2909,0,0,3a720593aa3fbf005f652d39614ce0640eb45ef48808a9985cc786293f08c174,2025-03-28T13:15:41.387000
+CVE-2025-2910,0,0,4978130c69eda3969fc4aaa24df412c9ffafc7d3ed2c7fd50401dcf2d877cc1e,2025-03-28T13:15:41.533000
CVE-2025-29100,0,0,0625adea7bf9c09ffed0ed9abe2303de146d9db5873c20263fd526077ae2d8d9,2025-03-27T16:45:46.410000
CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000
-CVE-2025-2911,1,1,9bae5cfa1688da65016914b89758dc8a004a890da707071921228c5eff17be45,2025-03-28T13:15:41.673000
+CVE-2025-2911,0,0,9bae5cfa1688da65016914b89758dc8a004a890da707071921228c5eff17be45,2025-03-28T13:15:41.673000
CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000
+CVE-2025-2912,1,1,5ab256fc4daf55a091c66b443a5cb117e84957e8d8aafcf84069f19e4af8d370,2025-03-28T16:15:30.540000
CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000
CVE-2025-29135,0,0,da45252de14e5b082a9bdba4d9fc8b7a9e0d31f1a0a6a8b0f99fb851cd8fdacf,2025-03-27T16:45:46.410000
CVE-2025-29137,0,0,720ba11d924de175b1bf67482cc142061a1b9799fd3947bba36e81cdb29bc0c0,2025-03-19T21:15:41.063000
@@ -286786,7 +286801,7 @@ CVE-2025-29226,0,0,598431993e1dea28d2a41edf1a133ff19583a46461026345d090d7abff0d6
CVE-2025-29227,0,0,15031612a342f1663453dfb027586c6db2ea2f4e163dcc47110f16a263fdb927,2025-03-21T19:15:46.310000
CVE-2025-29230,0,0,82fd9baf0d57bfe253b1907c4d74fadd09e960a1c557455f486f92c59e6e235a,2025-03-21T18:15:38.943000
CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000
-CVE-2025-29306,0,0,e1023615173b6d92ee43b1044c0a9ac09bc1586c199274f23eafc952a95e5ccf,2025-03-27T19:15:49.290000
+CVE-2025-29306,0,1,4f87f1ebaf7c5b741fadee1edf2e451c434982cd60f837c58193f7ed402bad84,2025-03-28T16:15:29.790000
CVE-2025-29310,0,0,5968624cc4eac663d93be6b2916e12611652e7aaf63c8a9dec75d1bf422a4ce5,2025-03-27T16:45:46.410000
CVE-2025-29311,0,0,161950615d0127c3236db6118583f44a1a788e99b252d828a62135dca0485d9d,2025-03-27T16:45:46.410000
CVE-2025-29312,0,0,ce414325add69c05fcd36bd91b11e6c0ba3aecbf3624ac26ac84c6a1a5a8fea8,2025-03-27T16:45:46.410000
@@ -286818,18 +286833,18 @@ CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b2
CVE-2025-29431,0,0,31720ec0bc8cba4659c1c2d3999cf0913efe8183aa46190b4c6f3ec8b4bb5bc1,2025-03-19T19:15:50.223000
CVE-2025-29483,0,0,1c4dfd2a92ae2ca576ed75da199ffe16123bea30fcc4252e1e6d3267ab61b70c,2025-03-27T19:15:49.380000
CVE-2025-29484,0,0,1bb36b7e889238e32c77bbf1cc0cbeefbc7ec16e65b841e22b84a9a74bef45f0,2025-03-27T16:45:12.210000
-CVE-2025-29485,0,0,de1a86369d082156c421a3233bf3d853b9b73c385a63f0f12155fdcc620be3cf,2025-03-27T16:45:12.210000
-CVE-2025-29486,0,0,b4ca882bf3d4e82aabe25b1ce07ad473b478483d0b500ef2eb50d269623c7e3b,2025-03-27T16:45:12.210000
-CVE-2025-29487,0,0,4f461c675a6a660687c03d3aa7e0fba76af65ea3fb392d2945747bcc747d73be,2025-03-27T16:45:12.210000
-CVE-2025-29488,0,0,6d7ca18964f3ffc4691c000bcebf150e0a5dba4f986bdbb6866d132450afcfcf,2025-03-27T16:45:12.210000
-CVE-2025-29489,0,0,e37ba4a786954d6b97b93249a31a9cbcb28296593dcc7185fa864c7842feea89,2025-03-27T16:45:12.210000
-CVE-2025-29490,0,0,14c31ddebec1a9c1d34abb9b83e3a99901f6579f3b70fd4831843e7a78733e6e,2025-03-27T16:45:12.210000
+CVE-2025-29485,0,1,a90eb4b6c5b21729d86eccd7437a691aeb2a77a7d210351930dbb4a5241de983,2025-03-28T15:15:48.190000
+CVE-2025-29486,0,1,1b3df15e286c8f27c384e8318b565c7647b0a4cfc1c1cd099edc64bf2c6ff74a,2025-03-28T15:15:48.343000
+CVE-2025-29487,0,1,29d4692e859b266290f3ecf47d9a215e6a5cda0a2496ca35008ff62bfd56b8ec,2025-03-28T15:15:48.517000
+CVE-2025-29488,0,1,676354dc442725cc84646407473f7ec622e20118f9911304ed7c1e03a4d3dd62,2025-03-28T15:15:48.677000
+CVE-2025-29489,0,1,c542b0081736f299e3eddc2b10a74e1957379d530c199cc8784590485d3a3612,2025-03-28T15:15:48.843000
+CVE-2025-29490,0,1,239c2ee908d51ad454be4fcc8198d71a5b81e7afb0ced47a96d8814d228ce782,2025-03-28T15:15:49.003000
CVE-2025-29491,0,0,a8ca5ba20032238cecdecb3f597c4593a5afc4806411516f094f73370000dd77,2025-03-27T16:45:12.210000
-CVE-2025-29492,0,0,4094592a4caf64a7a40c6ecddc7cb2bce9a5afdc48f1ed076766211047b5c685,2025-03-27T16:45:12.210000
+CVE-2025-29492,0,1,e81103bf9904a487e48c06929c3a67a543f1e370bb047da816ab0e7790559c26,2025-03-28T15:15:49.160000
CVE-2025-29493,0,0,08a1ab78ec268d739fc1098610e90551a6ad9856cad1af6fff58580c3121e59a,2025-03-27T16:45:12.210000
CVE-2025-29494,0,0,69c8b5e5f693646824ed50741c5ecb70250608ac60c24fbe19dce1ae89d87b16,2025-03-27T16:45:12.210000
CVE-2025-29496,0,0,678ecacecabab25ca8d8a8ac9007e1aa5ec03d73a9037186d88b893590d2e6f9,2025-03-27T16:45:12.210000
-CVE-2025-29497,0,0,947b209706f2a759d81f436e9621775ee35057d394656120063432143fb85767,2025-03-27T16:45:12.210000
+CVE-2025-29497,0,1,e326377f67368daac8dc4e6847d23b1fb255475e030a6e57d99cfca3fa44a44c,2025-03-28T15:15:49.313000
CVE-2025-29635,0,0,777467e4305cb03534788245920edd5bae11b2ba20b7be470dbace3c9dda6025,2025-03-27T16:45:46.410000
CVE-2025-29640,0,0,684661940e38e3fbc4f2676adca19fd07a4b95839bb039ae44b7731f40899f4a,2025-03-24T18:15:23.613000
CVE-2025-29641,0,0,da834c0947f85989328576ecb3102fddbcebc6673f6bdf9795762806f49bd137,2025-03-24T18:15:23.773000
@@ -286870,7 +286885,8 @@ CVE-2025-29923,0,0,89bab0cfc368a6ef6eb66f57c2b9e15b441c30032ed6f96b7591687487c7f
CVE-2025-29924,0,0,33ff2ffe448b023fe20ba1aebf83c3931032be11ba9e01550609a234d855b785,2025-03-19T20:15:19.873000
CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4bdc,2025-03-19T20:15:19.987000
CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000
-CVE-2025-29927,0,0,326931490ffe364c6a5bf57ee56c72d130519e69a3e9f76987d9e7afa4b7cc3f,2025-03-23T22:15:13.217000
+CVE-2025-29927,0,1,49e3b1fc7c81fe1198308a06e6e60ce9a5b39547427dcb2d29573308c768b45c,2025-03-28T15:15:49.470000
+CVE-2025-29928,1,1,ebdd8da37c1a6c0e8a7b7c3f48194d57772db75755ce9af767f7cc6981a21f42,2025-03-28T15:15:49.587000
CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000
CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000
CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000
@@ -286890,7 +286906,7 @@ CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c1
CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000
CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000
CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000
-CVE-2025-30093,0,0,121b8925c56c9b2babddec51424e1a66dd8b32b15f254aeeeeaab40cbb5fc7a3,2025-03-27T19:15:49.677000
+CVE-2025-30093,0,1,82d1ae5af8a54ad73b5f613fe0a531ff84c3e1bf6913004ed80488115a169d31,2025-03-28T16:15:30.733000
CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000
CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000
CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000
@@ -286929,6 +286945,7 @@ CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39
CVE-2025-30204,0,0,b1fa78b55f063476d0284edd7879b33da275b35192b8e844de9525f5d85299bd,2025-03-21T22:15:26.420000
CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000
CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000
+CVE-2025-30211,1,1,0258d28f73f9ed36e99cfa924563d34a135876bc82b84b892b2524e412e79ac1,2025-03-28T15:15:50.863000
CVE-2025-30212,0,0,972410e2716e8f2e53ffd488d4d423564ff98176b3c1d36a04eac762d7cbcb18,2025-03-27T16:45:46.410000
CVE-2025-30213,0,0,9bc622ae8e82b32e191467dd2fc76643485ad29790111a6b5bc5c8f5ed285211,2025-03-27T16:45:46.410000
CVE-2025-30214,0,0,18b0a8e5b0aa52930309829b5c50a4314f3b9445c89b2192f63b40d54ef90591,2025-03-27T16:45:46.410000
@@ -286966,6 +286983,8 @@ CVE-2025-30364,0,0,4b4940d6e80ca4623ac6e07b442fa34d2a2e5145a055b7fec311f87ad7ea2
CVE-2025-30365,0,0,0fb6ad8b9cc1386c7c7a199337e2288c094cca4c0b764a4aa22a6d4630d8da57,2025-03-27T19:15:50.297000
CVE-2025-30366,0,0,e9a3d99ed82d95574110d0e12c95e3535524dfda831f7e1f11e16e0930a733dd,2025-03-27T19:15:50.427000
CVE-2025-30367,0,0,8f521c65fc5c6a4f459b61da6b32b8b65de98a3a2ad3f6a40dd09a099e12f187,2025-03-27T19:15:50.537000
+CVE-2025-30371,1,1,8dc4d8c1d0bd87053b801d6b16fb901bc3dbd25d2de1fd9ce0257602ddfa0c74,2025-03-28T15:15:51.090000
+CVE-2025-30372,1,1,7c023e358dc7161da52e82fbbb2bc2e953f46d72df45f4fe07ac1284d6066f70,2025-03-28T16:15:30.950000
CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000
CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000
CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000
@@ -287170,6 +287189,7 @@ CVE-2025-30921,0,0,0f49c6a76231945cfa45ff97ac30f85385ce79f7b853b4f89aa238944aeb0
CVE-2025-30922,0,0,9ff4dd0946f44b4c7c54a61d5993f66f06f3cb56f15e96b4e5bc278cdcc10d45,2025-03-27T16:45:12.210000
CVE-2025-30923,0,0,4337439665787ddec21f95bc117262f2db948b09c40c497dd22aee51e7ef404f,2025-03-27T16:45:12.210000
CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa4c3,2025-03-27T16:45:12.210000
+CVE-2025-31010,1,1,31498ccdd07db6f7d27f2349b983f4b4be3be2dbe1ad2b1546c3ac773939b274,2025-03-28T15:15:51.367000
CVE-2025-31031,0,0,360863ecb71afb67efd4d379f6b1c5b283b29564bb09f7fc4134e2e3067f2d6b,2025-03-27T23:15:35.850000
CVE-2025-31073,0,0,7cf1e90fe970527146c17b4af0ba7b62d42e4f1b27572eefc3a359e973f1fd01,2025-03-28T10:15:16.253000
CVE-2025-31075,0,0,8965c2af5d900a1c0742b24db6f20f74f7dcc4028f642ff88d07617b499b0c55,2025-03-28T10:15:16.430000