diff --git a/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json b/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json index 8123c6c6e49..500b91300af 100644 --- a/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json +++ b/CVE-2016/CVE-2016-98xx/CVE-2016-9840.json @@ -2,8 +2,8 @@ "id": "CVE-2016-9840", "sourceIdentifier": "security@opentext.com", "published": "2017-05-23T04:29:01.667", - "lastModified": "2024-11-21T03:01:50.920", - "vulnStatus": "Modified", + "lastModified": "2025-03-28T15:17:06.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -77,6 +77,22 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:boost:boost:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.78.0", + "matchCriteriaId": "BA820824-3002-49BD-9093-3848F0B74E28" + } + ] + } + ] + }, { "nodes": [ { @@ -147,8 +163,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", - "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" } ] } @@ -366,243 +382,433 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2016/12/05/21", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/95131", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securitytracker.com/id/1039427", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1220", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1221", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1222", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:2999", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3046", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3047", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3453", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/201701-56", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-54", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208112", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208113", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208115", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208144", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4246-1/", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4292-1/", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2016/12/05/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/95131", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securitytracker.com/id/1039427", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1220", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1221", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1222", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:2999", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3046", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3047", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:3453", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/201701-56", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-54", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208112", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208113", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208115", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT208144", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4246-1/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4292-1/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json index 358b8c38c7d..eda3dec82fc 100644 --- a/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25032.json @@ -2,8 +2,8 @@ "id": "CVE-2018-25032", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-25T09:15:08.187", - "lastModified": "2024-11-21T04:03:24.080", - "vulnStatus": "Modified", + "lastModified": "2025-03-28T15:16:29.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -77,6 +77,22 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "1.13.4", + "matchCriteriaId": "57E74758-D6C1-4C5F-B471-D4028BAEF97C" + } + ] + } + ] + }, { "nodes": [ { @@ -848,27 +864,45 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202210-42", @@ -1052,27 +1086,45 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202210-42", diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json index 77620194b45..cee81e083a7 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19751.json @@ -2,7 +2,7 @@ "id": "CVE-2019-19751", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.323", - "lastModified": "2024-11-21T04:35:19.033", + "lastModified": "2025-03-28T16:15:18.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "easyMINE antes del 5 de diciembre de 2019 se env\u00eda con claves de host SSH integradas en la imagen de instalaci\u00f3n, lo que permite ataques de intermediario y hace que la identificaci\u00f3n de todos los nodos IPv4 p\u00fablicos sea trivial con Shodan.io." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json b/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json index 63fa3dde584..eb83c2262e9 100644 --- a/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json +++ b/CVE-2020/CVE-2020-87xx/CVE-2020-8745.json @@ -2,8 +2,8 @@ "id": "CVE-2020-8745", "sourceIdentifier": "secure@intel.com", "published": "2020-11-12T18:15:17.300", - "lastModified": "2024-11-21T05:39:22.207", - "vulnStatus": "Modified", + "lastModified": "2025-03-28T15:19:45.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -328,8 +328,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", - "versionEndExcluding": "27.01.05", - "matchCriteriaId": "D3CD5B0A-D4B1-41D2-8709-D49D927982FA" + "versionEndExcluding": "21.01.15", + "matchCriteriaId": "5AECF7C4-3FF7-4663-A49C-9DB91BA5C28E" } ] }, diff --git a/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json b/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json index e66d093dabc..770b65f92af 100644 --- a/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json +++ b/CVE-2021/CVE-2021-219xx/CVE-2021-21973.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21973", "sourceIdentifier": "security@vmware.com", "published": "2021-02-24T17:15:15.923", - "lastModified": "2025-02-04T20:15:39.867", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:31:11.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json b/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json index f4a32ec2dcc..0999e17dfb9 100644 --- a/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json +++ b/CVE-2021/CVE-2021-37xx/CVE-2021-3773.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3773", "sourceIdentifier": "secalert@redhat.com", "published": "2022-02-16T19:15:08.763", - "lastModified": "2024-11-21T06:22:23.553", + "lastModified": "2025-03-28T15:15:41.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -209,6 +209,10 @@ "url": "https://citizenlab.ca/2024/07/vulnerabilities-in-vpns-paper-presented-at-the-privacy-enhancing-technologies-symposium-2024/", "source": "af854a3a-2127-422b-91ae-364da2661108" }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0004/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json index d3590a73e3a..18ebebb3aef 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46873.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46873", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-29T23:15:08.703", - "lastModified": "2024-11-21T06:34:49.717", + "lastModified": "2025-03-28T16:15:20.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json b/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json index 5fbe173bbfc..5067fdfb89f 100644 --- a/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json +++ b/CVE-2022/CVE-2022-233xx/CVE-2022-23334.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23334", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T16:15:08.797", - "lastModified": "2024-11-21T06:48:25.500", + "lastModified": "2025-03-28T16:15:20.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ @@ -111,6 +141,13 @@ "tags": [ "Broken Link" ] + }, + { + "url": "https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json index 8bb3ba080d1..8b65b2ae0d8 100644 --- a/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38329.json @@ -2,13 +2,13 @@ "id": "CVE-2022-38329", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-13T21:15:09.537", - "lastModified": "2025-03-21T15:15:37.740", + "lastModified": "2025-03-28T15:15:42.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A CSRF vulnerability in Shopxian CMS 3.0.0 could allow an unauthenticated, remote attacker to craft a malicious link, potentially causing the administrator to perform unintended actions on an affected system. The vulnerability could allow attackers to delete the specified column via index.php/contents-admin_cat-finderdel-model-ContentsCat.html?id=17." + "value": "A CSRF vulnerability in Shopxian CMS 3.0.0 could allow an unauthenticated, remote attacker to craft a malicious link, potentially causing the administrator to perform unintended actions on an affected system. The vulnerability could allow attackers to modify or delete specific content through crafted requests, potentially leading to data loss and system integrity issues." }, { "lang": "es", diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json index 6e5d05d3638..b2d0a9266bb 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3990.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3990", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-02-01T07:15:10.737", - "lastModified": "2024-11-21T07:20:41.250", + "lastModified": "2025-03-28T15:15:42.193", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json index c57cf3df066..9a5bbf426d0 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4139.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4139", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-27T18:15:15.740", - "lastModified": "2024-11-21T07:34:39.103", + "lastModified": "2025-03-28T16:15:25.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json index 1c1d0213685..9b2e8e64e3f 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4285", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-27T18:15:15.977", - "lastModified": "2024-11-21T07:34:56.517", + "lastModified": "2025-03-28T16:15:25.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json index 4daa8852bf5..f8a1754b820 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4335.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4335", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-27T18:15:16.183", - "lastModified": "2024-11-21T07:35:04.653", + "lastModified": "2025-03-28T15:15:42.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json index 8d4873eeafa..8259e49005c 100644 --- a/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json +++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44298.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44298", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T14:15:11.153", - "lastModified": "2024-11-21T07:27:51.463", + "lastModified": "2025-03-28T15:15:42.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json index 246791a9726..cfd52efa876 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44717.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44717", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T14:15:11.293", - "lastModified": "2024-11-21T07:28:21.630", + "lastModified": "2025-03-28T16:15:21.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json index 37112e664de..437758d0a33 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44718.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44718", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T14:15:11.347", - "lastModified": "2024-11-21T07:28:21.773", + "lastModified": "2025-03-28T16:15:21.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json index 1fbcd5d3f14..9d12452703c 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45179.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45179", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T16:15:49.173", - "lastModified": "2024-11-21T07:28:54.830", + "lastModified": "2025-03-28T16:15:21.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json index d1b51668568..9cbb91006bd 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45897.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45897", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-31T00:15:09.963", - "lastModified": "2024-11-21T07:29:55.280", + "lastModified": "2025-03-28T16:15:21.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json index 6163d30738c..f237ffdd75f 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46087.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46087", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T15:15:09.750", - "lastModified": "2024-11-21T07:30:06.580", + "lastModified": "2025-03-28T16:15:21.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json index dd908de9ebb..b16004fe363 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46356.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46356", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-01-30T08:15:07.957", - "lastModified": "2024-11-21T07:30:27.190", + "lastModified": "2025-03-28T16:15:21.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json index 4028d5132b2..277761ac800 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46357.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46357", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-01-30T08:15:08.087", - "lastModified": "2024-11-21T07:30:27.317", + "lastModified": "2025-03-28T16:15:22.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json index 78a13c6ca2f..d18e1e20466 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46358.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46358", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-01-30T08:15:08.143", - "lastModified": "2024-11-21T07:30:27.440", + "lastModified": "2025-03-28T16:15:22.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json index 37113ae6f95..331362f7a60 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46359.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46359", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-01-30T08:15:08.200", - "lastModified": "2024-11-21T07:30:27.543", + "lastModified": "2025-03-28T16:15:22.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json index da5a30e3fc5..c2bee63256a 100644 --- a/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json +++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46968.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46968", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T22:15:08.853", - "lastModified": "2024-11-21T07:31:21.537", + "lastModified": "2025-03-28T16:15:22.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json index 0670a6da4d8..49c271566cf 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47632.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47632", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:09.303", - "lastModified": "2024-11-21T07:32:17.317", + "lastModified": "2025-03-28T16:15:22.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json index 586ea30d0c5..88d273b8a28 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4794.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4794", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:12.553", - "lastModified": "2024-11-21T07:35:57.293", + "lastModified": "2025-03-28T15:15:43.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json index b9a7edf478b..5af71b52dbe 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48006.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48006", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T22:15:12.463", - "lastModified": "2024-11-21T07:32:41.027", + "lastModified": "2025-03-28T16:15:22.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json index bb649c39807..43a42ef8c65 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48067.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48067", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:09.763", - "lastModified": "2024-11-21T07:32:46.853", + "lastModified": "2025-03-28T16:15:23.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json index 6ac83db75e2..fa35e0c1d21 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48069.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48069", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:09.977", - "lastModified": "2024-11-21T07:32:47.057", + "lastModified": "2025-03-28T16:15:23.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json index 14a43b738e9..a9f827120de 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48070.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48070", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:10.147", - "lastModified": "2024-11-21T07:32:47.277", + "lastModified": "2025-03-28T16:15:23.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json index 4beb48b590c..57a6c72dab9 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48071.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48071", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:10.343", - "lastModified": "2024-11-21T07:32:47.483", + "lastModified": "2025-03-28T16:15:23.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json index 319902a7412..22944ec1f13 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48072.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48072", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:10.537", - "lastModified": "2024-11-21T07:32:47.680", + "lastModified": "2025-03-28T16:15:23.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json index e4f2ba1b5e2..bd18e8e27af 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48073.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48073", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T15:15:10.673", - "lastModified": "2024-11-21T07:32:47.900", + "lastModified": "2025-03-28T16:15:24.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json index 471cba5a10f..e9c5acad1c4 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48107.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48107", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T21:15:10.813", - "lastModified": "2024-11-21T07:32:50.230", + "lastModified": "2025-03-28T16:15:24.193", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json index 8ca62d5283d..0fd146f69b9 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48108.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48108", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T21:15:10.953", - "lastModified": "2024-11-21T07:32:50.467", + "lastModified": "2025-03-28T16:15:24.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json index 4fc695983dd..be5009d2896 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48116.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48116", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T20:15:14.753", - "lastModified": "2024-11-21T07:32:52.407", + "lastModified": "2025-03-28T16:15:24.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json index fc8191e61b8..e2a083bf973 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48118", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T20:15:14.867", - "lastModified": "2024-11-21T07:32:52.550", + "lastModified": "2025-03-28T16:15:24.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json index 5a0c060502f..8618eb5d5c4 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48175.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48175", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T23:15:11.393", - "lastModified": "2024-11-21T07:32:55.190", + "lastModified": "2025-03-28T15:15:42.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json index 101807ea4da..e54647bec7e 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48176.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48176", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-31T00:15:10.327", - "lastModified": "2024-11-21T07:32:55.340", + "lastModified": "2025-03-28T15:15:42.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json index 51c727a92b8..481538e81fe 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49753.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49753", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:40.227", - "lastModified": "2025-03-27T17:15:40.227", + "lastModified": "2025-03-28T16:15:24.887", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: Fix double increment of client_count in dma_chan_get()\n\nThe first time dma_chan_get() is called for a channel the channel\nclient_count is incorrectly incremented twice for public channels,\nfirst in balance_ref_count(), and again prior to returning. This\nresults in an incorrect client count which will lead to the\nchannel resources not being freed when they should be. A simple\n test of repeated module load and unload of async_tx on a Dell\n Power Edge R7425 also shows this resulting in a kref underflow\n warning.\n\n[ 124.329662] async_tx: api initialized (async)\n[ 129.000627] async_tx: api initialized (async)\n[ 130.047839] ------------[ cut here ]------------\n[ 130.052472] refcount_t: underflow; use-after-free.\n[ 130.057279] WARNING: CPU: 3 PID: 19364 at lib/refcount.c:28\nrefcount_warn_saturate+0xba/0x110\n[ 130.065811] Modules linked in: async_tx(-) rfkill intel_rapl_msr\nintel_rapl_common amd64_edac edac_mce_amd ipmi_ssif kvm_amd dcdbas kvm\nmgag200 drm_shmem_helper acpi_ipmi irqbypass drm_kms_helper ipmi_si\nsyscopyarea sysfillrect rapl pcspkr ipmi_devintf sysimgblt fb_sys_fops\nk10temp i2c_piix4 ipmi_msghandler acpi_power_meter acpi_cpufreq vfat\nfat drm fuse xfs libcrc32c sd_mod t10_pi sg ahci crct10dif_pclmul\nlibahci crc32_pclmul crc32c_intel ghash_clmulni_intel igb megaraid_sas\ni40e libata i2c_algo_bit ccp sp5100_tco dca dm_mirror dm_region_hash\ndm_log dm_mod [last unloaded: async_tx]\n[ 130.117361] CPU: 3 PID: 19364 Comm: modprobe Kdump: loaded Not\ntainted 5.14.0-185.el9.x86_64 #1\n[ 130.126091] Hardware name: Dell Inc. PowerEdge R7425/02MJ3T, BIOS\n1.18.0 01/17/2022\n[ 130.133806] RIP: 0010:refcount_warn_saturate+0xba/0x110\n[ 130.139041] Code: 01 01 e8 6d bd 55 00 0f 0b e9 72 9d 8a 00 80 3d\n26 18 9c 01 00 75 85 48 c7 c7 f8 a3 03 9d c6 05 16 18 9c 01 01 e8 4a\nbd 55 00 <0f> 0b e9 4f 9d 8a 00 80 3d 01 18 9c 01 00 0f 85 5e ff ff ff\n48 c7\n[ 130.157807] RSP: 0018:ffffbf98898afe68 EFLAGS: 00010286\n[ 130.163036] RAX: 0000000000000000 RBX: ffff9da06028e598 RCX: 0000000000000000\n[ 130.170172] RDX: ffff9daf9de26480 RSI: ffff9daf9de198a0 RDI: ffff9daf9de198a0\n[ 130.177316] RBP: ffff9da7cddf3970 R08: 0000000000000000 R09: 00000000ffff7fff\n[ 130.184459] R10: ffffbf98898afd00 R11: ffffffff9d9e8c28 R12: ffff9da7cddf1970\n[ 130.191596] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 130.198739] FS: 00007f646435c740(0000) GS:ffff9daf9de00000(0000)\nknlGS:0000000000000000\n[ 130.206832] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 130.212586] CR2: 00007f6463b214f0 CR3: 00000008ab98c000 CR4: 00000000003506e0\n[ 130.219729] Call Trace:\n[ 130.222192] \n[ 130.224305] dma_chan_put+0x10d/0x110\n[ 130.227988] dmaengine_put+0x7a/0xa0\n[ 130.231575] __do_sys_delete_module.constprop.0+0x178/0x280\n[ 130.237157] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[ 130.242652] do_syscall_64+0x5c/0x90\n[ 130.246240] ? exc_page_fault+0x62/0x150\n[ 130.250178] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 130.255243] RIP: 0033:0x7f6463a3f5ab\n[ 130.258830] Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48\n83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00\n00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89\n01 48\n[ 130.277591] RSP: 002b:00007fff22f972c8 EFLAGS: 00000206 ORIG_RAX:\n00000000000000b0\n[ 130.285164] RAX: ffffffffffffffda RBX: 000055b6786edd40 RCX: 00007f6463a3f5ab\n[ 130.292303] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 000055b6786edda8\n[ 130.299443] RBP: 000055b6786edd40 R08: 0000000000000000 R09: 0000000000000000\n[ 130.306584] R10: 00007f6463b9eac0 R11: 0000000000000206 R12: 000055b6786edda8\n[ 130.313731] R13: 0000000000000000 R14: 000055b6786edda8 R15: 00007fff22f995f8\n[ 130.320875] \n[ 130.323081] ---[ end trace eff7156d56b5cf25 ]---\n\ncat /sys/class/dma/dma0chan*/in_use would get the wrong result.\n2\n2\n2\n\nTest-by: Jie Hai " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/142d644fd2cc059ffa042fbfb68e766433ef3afd", diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json index 750b8b0339a..becce0d41bf 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49755.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49755", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:40.640", - "lastModified": "2025-03-27T17:15:40.640", + "lastModified": "2025-03-28T16:15:25.057", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait\n\nWhile performing fast composition switch, there is a possibility that the\nprocess of ffs_ep0_write/ffs_ep0_read get into a race condition\ndue to ep0req being freed up from functionfs_unbind.\n\nConsider the scenario that the ffs_ep0_write calls the ffs_ep0_queue_wait\nby taking a lock &ffs->ev.waitq.lock. However, the functionfs_unbind isn't\nbounded so it can go ahead and mark the ep0req to NULL, and since there\nis no NULL check in ffs_ep0_queue_wait we will end up in use-after-free.\n\nFix this by making a serialized execution between the two functions using\na mutex_lock(ffs->mutex)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6a19da111057f69214b97c62fb0ac59023970850", diff --git a/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json b/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json index f2093f5111b..2bbe31cfab1 100644 --- a/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json +++ b/CVE-2022/CVE-2022-497xx/CVE-2022-49761.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49761", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:41.407", - "lastModified": "2025-03-27T17:15:41.407", + "lastModified": "2025-03-28T16:15:25.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: always report error in run_one_delayed_ref()\n\nCurrently we have a btrfs_debug() for run_one_delayed_ref() failure, but\nif end users hit such problem, there will be no chance that\nbtrfs_debug() is enabled. This can lead to very little useful info for\ndebugging.\n\nThis patch will:\n\n- Add extra info for error reporting\n Including:\n * logical bytenr\n * num_bytes\n * type\n * action\n * ref_mod\n\n- Replace the btrfs_debug() with btrfs_err()\n\n- Move the error reporting into run_one_delayed_ref()\n This is to avoid use-after-free, the @node can be freed in the caller.\n\nThis error should only be triggered at most once.\n\nAs if run_one_delayed_ref() failed, we trigger the error message, then\ncausing the call chain to error out:\n\nbtrfs_run_delayed_refs()\n`- btrfs_run_delayed_refs()\n `- btrfs_run_delayed_refs_for_head()\n `- run_one_delayed_ref()\n\nAnd we will abort the current transaction in btrfs_run_delayed_refs().\nIf we have to run delayed refs for the abort transaction,\nrun_one_delayed_ref() will just cleanup the refs and do nothing, thus no\nnew error messages would be output." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/18bd1c9c02e64a3567f90c83c2c8b855531c8098", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json index eff0a043548..b32a8e2b0f5 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0569.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0569", "sourceIdentifier": "security@huntr.dev", "published": "2023-01-29T17:15:08.633", - "lastModified": "2024-11-21T07:37:25.190", + "lastModified": "2025-03-28T16:15:26.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -123,6 +123,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://huntr.com/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json index 1581b33ca99..a7b2069c424 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22324.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22324", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-30T07:15:09.767", - "lastModified": "2024-11-21T07:44:31.870", + "lastModified": "2025-03-28T15:15:43.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json index 043107b67d4..63e0105ba3a 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22333.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22333", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-30T07:15:10.227", - "lastModified": "2024-11-21T07:44:34.950", + "lastModified": "2025-03-28T16:15:26.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json b/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json index dbe2f95f5fb..f720b3ca3d3 100644 --- a/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json +++ b/CVE-2023/CVE-2023-231xx/CVE-2023-23151.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23151", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-26T21:18:13.607", - "lastModified": "2024-11-21T07:45:54.170", + "lastModified": "2025-03-28T15:15:43.443", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json index bc29acb5f90..26c1fdbfd30 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24065.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24065", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-29T22:15:09.047", - "lastModified": "2024-11-21T07:47:21.830", + "lastModified": "2025-03-28T16:15:26.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json index 46b47dd3c33..aeb9cf39e0a 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24531.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24531", "sourceIdentifier": "security@golang.org", "published": "2024-07-02T20:15:05.270", - "lastModified": "2024-11-21T07:48:04.190", + "lastModified": "2025-03-28T15:15:43.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -79,6 +79,10 @@ { "url": "https://pkg.go.dev/vuln/GO-2024-2962", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json index 95b31d7e5db..4f3f713ec29 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24612.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24612", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T03:15:09.557", - "lastModified": "2024-11-21T07:48:14.320", + "lastModified": "2025-03-28T16:15:26.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json index 4ae1f3773d9..3ee3eef039c 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24622.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24622", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T05:15:10.307", - "lastModified": "2024-11-21T07:48:15.090", + "lastModified": "2025-03-28T15:15:43.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json index 9eed004b64c..3efb383b6ad 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24623.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24623", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-30T05:15:10.373", - "lastModified": "2024-11-21T07:48:15.237", + "lastModified": "2025-03-28T15:15:43.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json index 54a8856b9de..994b60bc28f 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24830.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24830", "sourceIdentifier": "security@apache.org", "published": "2023-01-30T17:15:09.987", - "lastModified": "2024-11-21T07:48:28.877", + "lastModified": "2025-03-28T15:15:44.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json index b39c6a58b4d..dbeabcec963 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52931.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52931", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:42.800", - "lastModified": "2025-03-27T17:15:42.800", + "lastModified": "2025-03-28T16:15:27.013", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Avoid potential vm use-after-free\n\nAdding the vm to the vm_xa table makes it visible to userspace, which\ncould try to race with us to close the vm. So we need to take our extra\nreference before putting it in the table.\n\n(cherry picked from commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d", diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json index 80bd7ecab51..e40d455e63d 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52935.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52935", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:43.330", - "lastModified": "2025-03-27T17:15:43.330", + "lastModified": "2025-03-28T16:15:27.180", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/khugepaged: fix ->anon_vma race\n\nIf an ->anon_vma is attached to the VMA, collapse_and_free_pmd() requires\nit to be locked.\n\nPage table traversal is allowed under any one of the mmap lock, the\nanon_vma lock (if the VMA is associated with an anon_vma), and the\nmapping lock (if the VMA is associated with a mapping); and so to be\nable to remove page tables, we must hold all three of them. \nretract_page_tables() bails out if an ->anon_vma is attached, but does\nthis check before holding the mmap lock (as the comment above the check\nexplains).\n\nIf we racily merged an existing ->anon_vma (shared with a child\nprocess) from a neighboring VMA, subsequent rmap traversals on pages\nbelonging to the child will be able to see the page tables that we are\nconcurrently removing while assuming that nothing else can access them.\n\nRepeat the ->anon_vma check once we hold the mmap lock to ensure that\nthere really is no concurrent page table access.\n\nHitting this bug causes a lockdep warning in collapse_and_free_pmd(),\nin the line \"lockdep_assert_held_write(&vma->anon_vma->root->rwsem)\". \nIt can also lead to use-after-free access." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/023f47a8250c6bdb4aebe744db4bf7f73414028b", diff --git a/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json b/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json index a1ffb1e1e51..39e830f91dc 100644 --- a/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json +++ b/CVE-2023/CVE-2023-530xx/CVE-2023-53003.json @@ -2,7 +2,7 @@ "id": "CVE-2023-53003", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T17:15:49.170", - "lastModified": "2025-03-27T17:15:49.170", + "lastModified": "2025-03-28T16:15:27.340", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info\n\nThe memory for llcc_driv_data is allocated by the LLCC driver. But when\nit is passed as the private driver info to the EDAC core, it will get freed\nduring the qcom_edac driver release. So when the qcom_edac driver gets probed\nagain, it will try to use the freed data leading to the use-after-free bug.\n\nHence, do not pass llcc_driv_data as pvt_info but rather reference it\nusing the platform_data pointer in the qcom_edac driver." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/66e10d5f399629ef7877304d9ba2b35d0474e7eb", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json index 789e21bdc89..55e52420c62 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0041", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:51.253", - "lastModified": "2024-12-16T14:47:50.477", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-28T16:15:27.517", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json index 5d71287ca96..0dfb64a2b50 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0904.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0904", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-06T06:15:06.937", - "lastModified": "2024-11-21T08:47:40.290", + "lastModified": "2025-03-28T16:15:27.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Fancy Product Designer de WordPress anterior a 6.1.81 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en la configuraci\u00f3n de multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json index 49855ed1c4a..8db7a4354c5 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1067", "sourceIdentifier": "arm-security@arm.com", "published": "2024-05-03T14:15:10.813", - "lastModified": "2025-03-27T15:15:48.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:24:03.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,65 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r48p0", + "matchCriteriaId": "1671B7FC-A8FB-491B-A7E2-822DD2C1C442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r48p0", + "matchCriteriaId": "0B344028-CCEB-4934-8651-383C681AA347" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r48p0", + "matchCriteriaId": "AA1C069D-1CFA-443E-A0C7-EBF97223F770" + } + ] + } + ] } ], "references": [ { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json index e3c66b73414..a0538f4d508 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11621", "sourceIdentifier": "security@devolutions.net", "published": "2025-02-10T14:15:29.490", - "lastModified": "2025-02-10T16:15:36.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:20:47.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,67 @@ "value": "CWE-295" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "2024.3.2.9", + "matchCriteriaId": "CDD63147-B8F0-4E3A-B918-4E48099C59C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "2024.3.4.0", + "matchCriteriaId": "28CF225A-4283-4E40-8C8E-A96F876FBC0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:android:*:*", + "versionEndExcluding": "2024.3.4.2", + "matchCriteriaId": "BFF11BD1-8E0E-4C36-BE92-1021A528A52E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "2024.3.10.3", + "matchCriteriaId": "3CCF282D-0E3B-4AD1-8327-550CA6E3F3A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager_powershell:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.7", + "matchCriteriaId": "7A58AC78-3998-411F-8935-EE6AE0C13E55" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0001/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json index ef03b08bceb..778a688d29d 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11670", "sourceIdentifier": "security@devolutions.net", "published": "2024-11-25T15:15:05.557", - "lastModified": "2024-11-25T16:15:12.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:03.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,50 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndIncluding": "2024.3.10.0", + "matchCriteriaId": "58D38621-06C0-4360-BE8C-87B538EACFE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndIncluding": "2024.3.10.0", + "matchCriteriaId": "D92F47DE-04CB-4CA8-83AC-1B84661419BB" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0015", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory", + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json index bfb380c5d39..819ec1ccc6c 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11671.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11671", "sourceIdentifier": "security@devolutions.net", "published": "2024-11-25T15:15:07.040", - "lastModified": "2024-11-25T17:15:11.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:57.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,49 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.3.18.0", + "matchCriteriaId": "1AA7A62B-3DCF-432D-8ED8-9B52DE2E68B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.3.18.0", + "matchCriteriaId": "6C258D8A-A9D0-4A10-80B3-79CE491B8344" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0016", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json index 102f49bced2..2f6dda4e63b 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11672", "sourceIdentifier": "security@devolutions.net", "published": "2024-11-25T15:15:07.180", - "lastModified": "2024-11-25T17:15:12.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:52.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,49 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.3.10.0", + "matchCriteriaId": "53809D50-22E9-48E9-99A7-11B4E8FAC8AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.3.10.0", + "matchCriteriaId": "34028922-82CE-4A14-9492-DBB4FC8D49EF" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0016", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json index 8f5d5810809..6e6d0d5c0b8 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12148", "sourceIdentifier": "security@devolutions.net", "published": "2024-12-04T18:15:12.003", - "lastModified": "2024-12-05T19:15:07.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:20.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.7.0", + "matchCriteriaId": "4C28C033-192A-442A-858D-FCB64949E8F2" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0017", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json index 2ea941c61f7..108547971d9 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12149", "sourceIdentifier": "security@devolutions.net", "published": "2024-12-04T18:15:12.350", - "lastModified": "2024-12-05T19:15:07.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:47.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,49 @@ "value": "CWE-732" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.3.20.0", + "matchCriteriaId": "1BD9E9B5-563A-42D6-9EE1-69EF8C8E92C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.3.20.0", + "matchCriteriaId": "23586AA8-B192-420B-91EE-DBC5792A1A70" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0017", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json index a5cbbe2dfb2..029af4d64c5 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12151.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12151", "sourceIdentifier": "security@devolutions.net", "published": "2024-12-04T18:15:12.850", - "lastModified": "2024-12-05T19:15:07.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:18.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-732" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.9.0", + "matchCriteriaId": "DA97BDA3-41D4-4AE1-854B-BFF4D5FADF27" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0017", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json index 31a6dfa8024..802d264044a 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12196", "sourceIdentifier": "security@devolutions.net", "published": "2024-12-04T18:15:13.173", - "lastModified": "2024-12-04T21:15:21.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:14.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.8.0", + "matchCriteriaId": "B7EA3081-29D8-42F0-9C0D-5936F60E3108" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0017", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json index 2bf5e6d96b1..fc8c35c55ce 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12969", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T23:15:05.600", - "lastModified": "2024-12-27T17:15:07.993", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:59:21.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_SQLi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289334", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289334", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469031", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_SQLi.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json index c085524ede2..0bc735fdb7a 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12976", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T02:15:06.063", - "lastModified": "2024-12-27T19:15:08.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:46:04.210", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0D7CB92F-609E-4807-A613-7AA413460314" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/nexus-wkx/CVE/blob/main/SQL_Injection_in_Hospital_Management_System.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289352", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289352", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469072", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/nexus-wkx/CVE/blob/main/SQL_Injection_in_Hospital_Management_System.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json index f33c5d61693..67fefe60b85 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12983", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T07:15:11.180", - "lastModified": "2024-12-27T16:15:23.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:44:14.160", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0D7CB92F-609E-4807-A613-7AA413460314" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469215", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_XSS.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json index f6b09fa5581..d550d5c8644 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13497", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T05:15:45.713", - "lastModified": "2025-03-15T05:15:45.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T15:22:59.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,20 +69,57 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tripetto:tripetto:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.0.10", + "matchCriteriaId": "881B126F-8C5E-4D36-A358-9957A90BC27D" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tripetto/trunk/lib/attachments.php#L46", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3251202%40tripetto%2Ftrunk&old=3231968%40tripetto%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbbe006c-1afc-4c8b-a9f3-ffb21cdabb54?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json index e0edb2e8483..08684190b8f 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13771.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13771", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-14T12:15:13.693", - "lastModified": "2025-03-27T01:27:47.273", + "lastModified": "2025-03-28T16:18:52.857", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:uxper:civi:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.1.4", - "matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2" + "matchCriteriaId": "FF63574D-F8E6-4F90-8397-9E27E3E7239A" } ] } diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json index 5cb5ec7c82a..5e16bf56333 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13772.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13772", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-14T12:15:13.907", - "lastModified": "2025-03-27T01:22:24.920", + "lastModified": "2025-03-28T16:19:00.850", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:uxper:civi:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.1.4", - "matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2" + "matchCriteriaId": "FF63574D-F8E6-4F90-8397-9E27E3E7239A" } ] } diff --git a/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json b/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json index d7ed56f45ab..faff28bcd43 100644 --- a/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json +++ b/CVE-2024/CVE-2024-139xx/CVE-2024-13939.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13939", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-03-28T03:15:15.720", - "lastModified": "2025-03-28T03:15:15.720", + "lastModified": "2025-03-28T15:15:44.340", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.\n\nAs stated in the documentation: \"If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents).\"\n\nThis is similar to\u00a0CVE-2020-36829" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json index 10ed1e9e8ed..82b3293a9ea 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1588.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1588", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-08T05:15:07.710", - "lastModified": "2025-03-27T16:15:21.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:18:52.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pressified:sendpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.23.11.6", + "matchCriteriaId": "067F2805-85F7-4309-A837-9BA03C1BDE8E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json index f3df14b37a0..1968a861259 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1764", "sourceIdentifier": "security@devolutions.net", "published": "2024-03-05T22:15:46.947", - "lastModified": "2024-12-04T16:15:24.527", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:19.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.3.16.0", + "matchCriteriaId": "A94A8DBC-41A8-42B9-8DC9-7FA298A076DF" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json index fbf271124e3..fa07ad70031 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1900.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1900", "sourceIdentifier": "security@devolutions.net", "published": "2024-03-05T22:15:47.060", - "lastModified": "2024-11-21T08:51:33.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:15.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023.3.16.0", + "matchCriteriaId": "960AC5BA-C623-415A-967E-E6E8E5F3A17C" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json index 414979e451c..b318d49dc5a 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1901", "sourceIdentifier": "security@devolutions.net", "published": "2024-03-05T22:15:47.103", - "lastModified": "2024-11-21T08:51:33.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:10.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023.3.16.0", + "matchCriteriaId": "960AC5BA-C623-415A-967E-E6E8E5F3A17C" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0002", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json index bda97d6fde0..63c4628f988 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20672.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20672", "sourceIdentifier": "secure@microsoft.com", "published": "2024-01-09T18:15:50.243", - "lastModified": "2024-11-21T08:52:53.400", + "lastModified": "2025-03-28T15:15:44.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -103,6 +103,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0006/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json index db1955ac27a..23781da4b3d 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26574", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T12:15:08.167", - "lastModified": "2024-11-21T09:02:34.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:01:24.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wondershare:filmora:13.0.51:*:*:*:*:*:*:*", + "matchCriteriaId": "FC306161-FB6B-4B00-9F8B-19EA3E1131FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://filmora.wondershare.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Alaatk/CVE-2024-26574/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://filmora.wondershare.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Alaatk/CVE-2024-26574/tree/main", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json index d715aeb9c65..65a9ca14254 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26641.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26641", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:11.193", - "lastModified": "2025-03-10T16:59:54.610", + "lastModified": "2025-03-28T16:17:08.557", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -232,8 +232,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "DEAA16D1-1E27-4128-BA14-5A0C59340EAA" + "criteria": "cpe:2.3:o:netapp:fas9500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C087FDD-57EF-48A4-BE07-DE04FFEDDAAD" } ] }, @@ -243,8 +243,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:netapp:a9500:*:*:*:*:*:*:*:*", - "matchCriteriaId": "002F31D0-96E3-495F-8F86-7C9190F20248" + "criteria": "cpe:2.3:h:netapp:fas9500:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F966AE6C-149E-4690-9CE0-60D2FB47A096" } ] } diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json index 7d71aa2b363..a5a9daa2429 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27622.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27622", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T14:15:49.030", - "lastModified": "2024-11-21T09:04:48.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:05:54.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,26 +55,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*", + "matchCriteriaId": "BB09A515-0F41-407D-AD7B-908F4341358A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.21:*:*:*:*:*:*:*", + "matchCriteriaId": "55BFD129-4009-4D56-B161-EA6135366AC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/capture0x/CMSMadeSimple/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://github.com/capture0x/CMSMadeSimple/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/pwning-cmsms-via-user-defined-tags-for-fun-and-learning-cve-2024-27622-27623", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json index 0de0d8764bf..fdc6266f8c7 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27623.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27623", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T14:15:49.117", - "lastModified": "2024-11-21T09:04:49.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:07:47.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*", + "matchCriteriaId": "BB09A515-0F41-407D-AD7B-908F4341358A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/capture0x/CMSMadeSimple2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/capture0x/CMSMadeSimple2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/pwning-cmsms-via-user-defined-tags-for-fun-and-learning-cve-2024-27622-27623", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json index e00b13e337a..8e3a0e29dde 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27625", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T14:15:49.160", - "lastModified": "2024-11-21T09:04:49.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:07:53.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.19:*:*:*:*:*:*:*", + "matchCriteriaId": "BB09A515-0F41-407D-AD7B-908F4341358A" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json index 67bd5680e37..a8728cbe496 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29275", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T05:15:47.583", - "lastModified": "2024-11-21T09:07:54.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:51:45.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/seacms-net/CMS/issues/15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/seacms-net/CMS/issues/15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json index 0a3d1e735d8..e5ae0935252 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29469.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29469", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T21:15:32.267", - "lastModified": "2024-11-21T09:08:03.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:45:49.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zhyd:oneblog:2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "1921A08D-927A-4839-8A7D-0DFE32560056" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json index 8c2479940ba..f3353da9507 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29470", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T21:15:32.323", - "lastModified": "2024-11-21T09:08:03.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:48:37.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zhyd:oneblog:2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "1921A08D-927A-4839-8A7D-0DFE32560056" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json index b2a9216161c..2426f3d9d7a 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29474", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T21:15:32.523", - "lastModified": "2024-11-21T09:08:04.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:48:47.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zhyd:oneblog:2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "1921A08D-927A-4839-8A7D-0DFE32560056" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json index 56359732f6b..16310538307 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2918", "sourceIdentifier": "security@devolutions.net", "published": "2024-04-09T19:15:38.370", - "lastModified": "2024-11-21T09:10:50.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:20:56.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.11.0", + "matchCriteriaId": "D3589B6C-8479-4575-BB85-12A7F35AFDCC" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0006", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0006", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json index ffeaf3709f0..3eae808822b 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2921", "sourceIdentifier": "security@devolutions.net", "published": "2024-03-26T16:15:14.173", - "lastModified": "2024-11-21T09:10:50.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:04.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.8.0", + "matchCriteriaId": "0E78FB63-33B2-499B-9BB1-DE3EE1767E01" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0005", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0005", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json index e68b7544ce3..b537925667d 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30565", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T08:15:07.153", - "lastModified": "2024-11-21T09:12:11.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:52:54.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/SeaCMS_v.12.9.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/SeaCMS_v.12.9.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json index 59985495705..b9f53e35618 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31666", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T18:15:07.887", - "lastModified": "2025-03-26T21:15:22.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:00:36.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flusity:flusity:2.33:*:*:*:*:*:*:*", + "matchCriteriaId": "1B6B6ED7-B93A-4853-9D83-40BCD781342C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hapa3/cms/blob/main/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hapa3/cms/blob/main/1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json index 9cc9ee2d67e..caaf55e3bc7 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3545", "sourceIdentifier": "security@devolutions.net", "published": "2024-04-09T19:15:41.380", - "lastModified": "2024-11-21T09:29:50.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:20:52.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.9.0", + "matchCriteriaId": "2C6B1BE5-9C13-4FB3-9FD9-5C07895EB64A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.1.21.0", + "matchCriteriaId": "A0A4A4C4-D82F-482A-BD3B-C81751B7B7AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.1.21.0", + "matchCriteriaId": "7B36BC3F-784D-4AC7-9224-6CD59EC6AC6F" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0006", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0006", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json new file mode 100644 index 00000000000..64b57ccad61 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39311.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-39311", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-28T15:15:44.647", + "lastModified": "2025-03-28T16:15:27.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Publify is a self hosted Web publishing platform on Rails. Prior to version 10.0.1 of Publify, corresponding to versions prior to 10.0.2 of the `publify_core` rubygem, publisher on a `publify` application is able to perform a cross-site scripting (XSS) attack on an administrator using the redirect functionality. The exploitation of this XSS vulnerability requires the administrator to click a malicious link. An attack could attempt to hide their payload by using HTML, or other encodings, as to not make it obvious to an administrator that this is a malicious link. A publisher may attempt to use this vulnerability to escalate their privileges and become an administrator. Version 10.0.1 of Publify and version 10.0.2 of the `publify_core` rubygem fix the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/publify/publify/security/advisories/GHSA-8fm5-gg2f-f66q", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json index 3e1de28169f..0b298159df4 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42598", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T16:15:11.727", - "lastModified": "2024-08-22T18:15:10.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:53:29.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E86E61D7-442D-43D0-845F-B7858A4F2B4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/fushuling/cve/blob/master/CVE-2024-42598.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gitee.com/fushuling/cve/blob/master/SeaCMS%20V13%20admin_editplayer.php%20code%20injection.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json index d25f208dff1..55a33ebbb4c 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43484", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.633", - "lastModified": "2024-10-21T17:35:44.460", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-28T15:15:44.823", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -631,6 +631,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0007/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json index 60120ea4387..8c6bc05e03b 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4317", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-05-14T15:43:16.473", - "lastModified": "2025-02-12T16:17:31.043", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-28T15:15:45.250", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -123,6 +123,10 @@ "Vendor Advisory" ] }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://www.postgresql.org/support/security/CVE-2024-4317/", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json index 0fa62d03023..d6fe5af5a3a 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4577.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4577", "sourceIdentifier": "security@php.net", "published": "2024-06-09T20:15:09.550", - "lastModified": "2025-03-21T20:18:54.330", + "lastModified": "2025-03-28T15:12:44.513", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -87,6 +87,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -114,6 +115,17 @@ "matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] } ] }, diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json new file mode 100644 index 00000000000..26b27ca1952 --- /dev/null +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48615.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48615", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-28T15:15:45.023", + "lastModified": "2025-03-28T15:15:45.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Null Pointer Dereference vulnerability in libarchive 3.7.6 and earlier when running program bsdtar in function header_pax_extension at rchive_read_support_format_tar.c:1844:8." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/88Sanghy88/crash-test", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/libarchive/libarchive/releases/download/v3.7.6/libarchive-3.7.6.tar.gz", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json index d5d0e409a4c..2d61106d5e8 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4846.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4846", "sourceIdentifier": "security@devolutions.net", "published": "2024-06-25T13:15:50.120", - "lastModified": "2024-11-21T09:43:43.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:26.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.15.0", + "matchCriteriaId": "F5ED1D6E-CB0B-42BD-8580-A3C7F55F5499" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0009", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0009", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json index 5319dfd3e6c..71f62f117ef 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5072.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5072", "sourceIdentifier": "security@devolutions.net", "published": "2024-05-17T16:15:08.300", - "lastModified": "2024-11-21T09:46:54.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:30.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.12.0", + "matchCriteriaId": "E2815D8D-64A2-4765-B1D8-FD2B85F1388A" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0007", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0007", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json new file mode 100644 index 00000000000..85c75cf7db1 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51624.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51624", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:45.393", + "lastModified": "2025-03-28T15:15:45.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos J\u00e1-J\u00e1 Pagamentos for WooCommerce allows Reflected XSS. This issue affects J\u00e1-J\u00e1 Pagamentos for WooCommerce: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-ja-ja-pagamentos-multicaixa-express/vulnerability/wordpress-ja-ja-pagamentos-for-woocommerce-plugin-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json index 25797dbf119..9ece459c891 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53438", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T17:15:10.857", - "lastModified": "2025-02-03T19:15:12.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:39:27.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:churchcrm:churchcrm:5.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C9531F85-4051-48B3-B092-C2E13496FEDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/6988", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/advisories/GHSA-gr5x-8j97-qq23", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json index 3fcb01dfaaf..189e3f5c45b 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54085", "sourceIdentifier": "biossecurity@ami.com", "published": "2025-03-11T14:15:22.893", - "lastModified": "2025-03-11T14:15:22.893", + "lastModified": "2025-03-28T15:15:45.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -77,6 +77,10 @@ { "url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf", "source": "biossecurity@ami.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0003/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json index 1e73c001f1b..0cf5fc19cfe 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54181", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-30T14:15:05.867", - "lastModified": "2024-12-30T14:15:05.867", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:32:40.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:websphere_automation:1.7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "698AA3DD-7377-4B1F-B5C2-93D1A6328A2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7179994", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json new file mode 100644 index 00000000000..69a2681a503 --- /dev/null +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54291.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54291", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:45.663", + "lastModified": "2025-03-28T15:15:45.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound PluginPass allows Manipulating Web Input to File System Calls. This issue affects PluginPass: from n/a through 0.9.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pluginpass-pro-plugintheme-licensing/vulnerability/wordpress-pluginpass-plugin-0-9-10-arbitrary-file-download-delete-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json b/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json new file mode 100644 index 00000000000..bd661bfcc99 --- /dev/null +++ b/CVE-2024/CVE-2024-543xx/CVE-2024-54362.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54362", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:45.827", + "lastModified": "2025-03-28T15:15:45.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal vulnerability in NotFound GetShop ecommerce allows Path Traversal. This issue affects GetShop ecommerce: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/getshop-ecommerce/vulnerability/wordpress-getshop-ecommerce-plugin-1-3-path-traversal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json index 81c6eb4d0dc..811606e155d 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54954", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-10T18:15:29.663", - "lastModified": "2025-02-26T19:15:22.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:49:01.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zhyd:oneblog:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.3.6", + "matchCriteriaId": "3351098F-DF38-4603-B963-CAD3076357E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/kaoniniang2/03658cc78e789b992b378f4951bedfb7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitee.com/yadong.zhang/DBlog/issues/IB6552", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json index daddc77b18c..0571ea04cba 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55100.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55100", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T21:15:08.427", - "lastModified": "2024-12-17T17:15:09.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:25:16.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55100-Online-Nurse-Hiring-System-v1.0-Stored-Cross-Site-Scripting-Vulnerability.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55100-Online-Nurse-Hiring-System-v1.0-Stored-Cross-Site-Scripting-Vulnerability.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json index e847da6a8bb..45a95ee0a4e 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55103.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55103", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T21:15:08.553", - "lastModified": "2024-12-17T18:15:25.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:26:07.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55103-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55103-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json index 1818d18de73..495e0d699bf 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55104", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T21:15:08.670", - "lastModified": "2024-12-17T18:15:25.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:31:25.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55104-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/kuzgunaka/test1/blob/main/CVE-2024-55104-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json index e8a278876e0..fcf3f44363f 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55232", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T22:15:07.297", - "lastModified": "2024-12-26T20:15:22.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:21:59.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_notes_sharing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "088DBBD2-4F1A-4AB7-A05C-B29801C7210F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55232.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json index 94fa5b89a01..3d353b75013 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55461", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T23:15:17.350", - "lastModified": "2024-12-31T20:16:07.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:55:56.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "13.0", + "matchCriteriaId": "DDA09845-84CA-4C7D-82C9-FA3C113FBD15" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/FengFu01/sea/issues/IB8S1N", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://gitee.com/FengFu01/sea/issues/IB8S1N", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json index f18c3918074..4b5ae3f2ed9 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56171.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56171", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-18T22:15:12.797", - "lastModified": "2025-02-18T23:15:09.413", + "lastModified": "2025-03-28T15:15:46.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828", "source": "cve@mitre.org" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0010/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json index 9a1cb69742e..d841c2e5475 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6055", "sourceIdentifier": "security@devolutions.net", "published": "2024-06-17T13:15:53.697", - "lastModified": "2024-11-21T09:48:51.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:23:27.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.2.8.0", + "matchCriteriaId": "9247C19E-9E89-4461-9AE9-42B88673695A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.2.8.0", + "matchCriteriaId": "7C30D082-C93E-4F6D-85F2-A6384F879063" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0008", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0008", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json index 249efb5eeaf..96be6badee1 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6057", "sourceIdentifier": "security@devolutions.net", "published": "2024-06-17T13:15:53.800", - "lastModified": "2024-11-21T09:48:51.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:23:36.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.1.32.0", + "matchCriteriaId": "21E7A6A4-F1FE-4909-97E0-06276301127E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.1.32.0", + "matchCriteriaId": "036BC9F3-DD31-4F1D-AED1-D50828FD0E56" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0008", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0008", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json index 04a917c96bd..856273cba33 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6354", "sourceIdentifier": "security@devolutions.net", "published": "2024-06-26T17:15:27.497", - "lastModified": "2025-03-13T19:15:49.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:19:33.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.2.12.0", + "matchCriteriaId": "FBA312E3-411A-439F-BD23-8C8B22A5BE0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.2.12.0", + "matchCriteriaId": "2CD07B0A-8CB9-4FAF-A330-58533C04D56B" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0010", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0010", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json index 763c5a2caaa..1cea6fadc26 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6492.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6492", "sourceIdentifier": "security@devolutions.net", "published": "2024-07-16T19:15:13.567", - "lastModified": "2024-11-21T09:49:44.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:07.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.2.15.0", + "matchCriteriaId": "5E75DB23-4F3C-4D19-AA97-9D6219095839" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.2.15.0", + "matchCriteriaId": "F124F443-8055-4A8F-9F48-DEB4772805D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0012", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://devolutions.net/security/advisories/DEVO-2024-0012", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json index 245d246efad..d1a0bd6708e 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8176.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8176", "sourceIdentifier": "secalert@redhat.com", "published": "2025-03-14T09:15:14.157", - "lastModified": "2025-03-17T17:15:36.167", + "lastModified": "2025-03-28T15:15:46.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -88,6 +88,10 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2024-8176", "source": "af854a3a-2127-422b-91ae-364da2661108" }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0009/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://ubuntu.com/security/CVE-2024-8176", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json index 8abf53605a1..40322ebd43a 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1193.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1193", "sourceIdentifier": "security@devolutions.net", "published": "2025-02-10T14:15:30.107", - "lastModified": "2025-02-10T18:15:34.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:20:35.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,49 @@ "value": "CWE-295" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.3.20.0", + "matchCriteriaId": "1BD9E9B5-563A-42D6-9EE1-69EF8C8E92C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.3.20.0", + "matchCriteriaId": "23586AA8-B192-420B-91EE-DBC5792A1A70" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0001/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json index 2cc00305221..fbf4cdaf60d 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1231.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1231", "sourceIdentifier": "security@devolutions.net", "published": "2025-02-11T14:15:31.130", - "lastModified": "2025-02-11T15:15:20.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:09.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.11.0", + "matchCriteriaId": "6113998D-2E6C-4B73-A7AD-713F546D495E" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0002/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json index d9e51c33b28..ecb926dba09 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1635.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1635", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-13T13:15:46.820", - "lastModified": "2025-03-18T17:15:45.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:20:27.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,49 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.3.31.0", + "matchCriteriaId": "0C146019-3232-4413-BB31-AC876E37BFE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.3.31.0", + "matchCriteriaId": "183673B7-2357-4FA7-98E7-32F986B65BC3" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0004/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json index b8f283da8be..afce7f99e2d 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1636.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1636", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-13T13:15:46.970", - "lastModified": "2025-03-18T17:15:45.263", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:20:21.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,49 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*", + "versionEndExcluding": "2024.3.31.0", + "matchCriteriaId": "0C146019-3232-4413-BB31-AC876E37BFE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*", + "versionEndExcluding": "2024.3.31.0", + "matchCriteriaId": "183673B7-2357-4FA7-98E7-32F986B65BC3" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0004/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json index 2e25414af53..fade4e55624 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1762.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1762", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-28T06:15:32.770", - "lastModified": "2025-03-28T06:15:32.770", + "lastModified": "2025-03-28T15:15:46.297", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,38 @@ "value": "The Event Tickets with Ticket Scanner WordPress plugin before 2.5.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json index a43b76c32da..b63c711885e 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1771.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1771", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T05:15:47.253", - "lastModified": "2025-03-15T05:15:47.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T15:05:47.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-98" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.9", + "matchCriteriaId": "7109F257-C617-40B4-8187-FF273299E9B8" + } + ] + } + ] } ], "references": [ { "url": "https://travelerwp.com/traveler-changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/da3e3d6c-7643-4f22-aa88-2c4ce80aed1f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json index a146b1c983e..a5502985798 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1773.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1773", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T05:15:47.403", - "lastModified": "2025-03-15T05:15:47.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T15:02:33.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.9", + "matchCriteriaId": "7109F257-C617-40B4-8187-FF273299E9B8" + } + ] + } + ] } ], "references": [ { "url": "https://travelerwp.com/traveler-changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c9dae7-d811-4b59-94c1-71a83652a14d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json index c2f0e31228c..b4111f4dd97 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2003.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2003", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-05T19:15:39.630", - "lastModified": "2025-03-05T20:16:06.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:53.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.13.0", + "matchCriteriaId": "29BEC91D-145B-4A8E-8279-15BFFB76DC51" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0003/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json index 92f09c470d4..0ff2327a3e1 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21855.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21855", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-12T10:15:18.320", - "lastModified": "2025-03-13T21:18:17.013", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-28T16:15:28.047", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json index dc3948373bc..8786a4224d9 100644 --- a/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21879.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21879", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-03-27T15:15:55.790", - "lastModified": "2025-03-27T16:45:12.210", + "lastModified": "2025-03-28T16:15:28.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free on inode when scanning root during em shrinking\n\nAt btrfs_scan_root() we are accessing the inode's root (and fs_info) in a\ncall to btrfs_fs_closing() after we have scheduled the inode for a delayed\niput, and that can result in a use-after-free on the inode in case the\ncleaner kthread does the iput before we dereference the inode in the call\nto btrfs_fs_closing().\n\nFix this by using the fs_info stored already in a local variable instead\nof doing inode->root->fs_info." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/59f37036bb7ab3d554c24abc856aabca01126414", diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json index b117d737744..a3332fff261 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2164.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2164", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T04:15:22.260", - "lastModified": "2025-03-15T04:15:22.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T16:07:07.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,24 +69,64 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixelstats:pixelstats:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.8.2", + "matchCriteriaId": "AAE6034C-F19F-4C1B-BC71-4B85E7148E72" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pixelstats/tags/0.8.2/pixelstats.php#L331", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pixelstats/tags/0.8.2/pixelstats.php#L664", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/pixelstats/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8683bc00-1136-42c4-a256-84b2cac1d575?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json new file mode 100644 index 00000000000..9eeaad863b2 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22356.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22356", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:46.490", + "lastModified": "2025-03-28T15:15:46.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stencies Stencies allows Reflected XSS. This issue affects Stencies: from n/a through 0.58." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stencies/vulnerability/wordpress-stencies-plugin-0-58-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json new file mode 100644 index 00000000000..94b8b780a82 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22360.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22360", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:46.653", + "lastModified": "2025-03-28T15:15:46.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Azure offload allows Reflected XSS. This issue affects WP Azure offload: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-azure-offload/vulnerability/wordpress-wp-azure-offload-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json new file mode 100644 index 00000000000..0080268dd61 --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22501.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22501", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:46.790", + "lastModified": "2025-03-28T15:15:46.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Improve My City Improve My City allows Reflected XSS. This issue affects Improve My City: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/improve-my-city/vulnerability/wordpress-improve-my-city-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json new file mode 100644 index 00000000000..ab9ce3246c0 --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22523.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22523", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:46.930", + "lastModified": "2025-03-28T15:15:46.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Schedule allows Blind SQL Injection. This issue affects Schedule: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/schedule/vulnerability/wordpress-schedule-plugin-1-0-0-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json new file mode 100644 index 00000000000..52ecf879ae8 --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22526", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:47.067", + "lastModified": "2025-03-28T15:15:47.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in NotFound PHP/MySQL CPU performance statistics allows Object Injection. This issue affects PHP/MySQL CPU performance statistics: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mywebtonet-performancestats/vulnerability/wordpress-php-mysql-cpu-performance-statistics-plugin-1-2-1-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json new file mode 100644 index 00000000000..6e8ce32cb1c --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22566.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22566", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:47.210", + "lastModified": "2025-03-28T15:15:47.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ULTIMATE VIDEO GALLERY allows Reflected XSS. This issue affects ULTIMATE VIDEO GALLERY: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-gallery/vulnerability/wordpress-ultimate-video-gallery-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json b/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json new file mode 100644 index 00000000000..895e6a8a0e0 --- /dev/null +++ b/CVE-2025/CVE-2025-225xx/CVE-2025-22575.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22575", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:47.350", + "lastModified": "2025-03-28T15:15:47.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in extendyourweb SUPER RESPONSIVE SLIDER allows Reflected XSS. This issue affects SUPER RESPONSIVE SLIDER: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/super-slider/vulnerability/wordpress-super-responsive-slider-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json new file mode 100644 index 00000000000..20ec3d44533 --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22767.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22767", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:47.490", + "lastModified": "2025-03-28T15:15:47.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in globalpayments GlobalPayments WooCommerce allows Reflected XSS. This issue affects GlobalPayments WooCommerce: from n/a through 1.13.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/global-payments-woocommerce/vulnerability/wordpress-globalpayments-woocommerce-plugin-1-12-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json index a67fb6a756e..0f0c4669914 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2267.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2267", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-15T04:15:22.443", - "lastModified": "2025-03-15T04:15:22.443", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-28T15:41:57.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -49,20 +69,57 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp01ru:wp01:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6.2", + "matchCriteriaId": "C550DB10-29F2-4FF6-9EB2-127B9A3CDBCD" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp01/trunk/inc/class-wp01.php#L109", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/wp01/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/900d09e8-ded5-49b9-81bf-ddfc85d3cf2b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json index 5e9e4c4c2bf..c44c697e34c 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2277.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2277", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-13T13:15:58.320", - "lastModified": "2025-03-18T17:15:47.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:22:58.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.1.3.0", + "matchCriteriaId": "E072F027-1277-44E1-B0C1-FD45FADC4F41" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0004/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json index b35bef4a1d8..90b3c8e91a2 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2278.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2278", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-13T13:15:58.430", - "lastModified": "2025-03-18T17:15:47.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:23:02.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025.1.3.0", + "matchCriteriaId": "E072F027-1277-44E1-B0C1-FD45FADC4F41" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0004/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json index 19317430b6a..c8b5cf2c29f 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2280", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-13T13:15:58.533", - "lastModified": "2025-03-19T14:15:39.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:23:07.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.6.0", + "matchCriteriaId": "AD744D7E-26C3-41F0-9C75-439406648A6D" + } + ] + } + ] } ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2025-0004/", - "source": "security@devolutions.net" + "source": "security@devolutions.net", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json index ffb4556162c..643bf481b28 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25686.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25686", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T16:15:29.987", - "lastModified": "2025-03-27T16:45:12.210", + "lastModified": "2025-03-28T16:15:28.993", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "semcms <=5.0 is vulnerable to SQL Injection in SEMCMS_Fuction.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/J1095/fkapfxx", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json index e6a5cdf4907..0bab4473f0e 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25799", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.870", - "lastModified": "2025-03-06T18:15:42.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:59:59.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F" + } + ] + } + ] + } + ], "references": [ { "url": "http://seacms.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.seacms.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json index e8b0a7bb003..d6accce2c4c 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25800.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25800", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.993", - "lastModified": "2025-02-26T16:15:17.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:59:53.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F" + } + ] + } + ] + } + ], "references": [ { "url": "http://seacms.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf-2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.seacms.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json index ccf280785f7..c0dd591ae3f 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25802", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:28.127", - "lastModified": "2025-03-06T18:15:42.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:59:38.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F" + } + ] + } + ] + } + ], "references": [ { "url": "http://seacms.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.seacms.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json index 4ec5715bcf5..2349409719b 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25813", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:28.250", - "lastModified": "2025-03-06T18:15:43.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T16:59:27.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F" + } + ] + } + ] + } + ], "references": [ { "url": "http://seacms.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-5.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.seacms.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json index 02d1ce05878..3f5121ec495 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26265.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26265", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T16:15:30.117", - "lastModified": "2025-03-27T16:45:12.210", + "lastModified": "2025-03-28T15:15:47.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A segmentation fault in openairinterface5g v2.1.0 allows attackers to cause a Denial of Service (DoS) via a crafted UE Context Modification response." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://anonymous.4open.science/r/Mobicom-ARCANE-36B7/README.md", diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json new file mode 100644 index 00000000000..c762086d111 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2713.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2713", + "sourceIdentifier": "cve-coordination@google.com", + "published": "2025-03-28T16:15:30.043", + "lastModified": "2025-03-28T16:15:30.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/google/gvisor/commit/586c38d70081b13b2ed494cef48e99b93956843e", + "source": "cve-coordination@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json b/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json index d93a1adc79d..09c83a0a675 100644 --- a/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json +++ b/CVE-2025/CVE-2025-282xx/CVE-2025-28253.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28253", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T23:15:34.867", - "lastModified": "2025-03-27T23:15:34.867", + "lastModified": "2025-03-28T16:15:29.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Cross-Site Scripting (XSS) vulnerability in MainWP MainWP Dashboard v5.3.4 exists in class/class-mainwp-post-handler.php, where unsanitized user input from $_POST['sites'], $_POST['clients'], and $_POST['search'] is passed into the MainWP_User::render_table function. Despite using sanitize_text_field and wp_unslash, the values are not adequately protected against HTML or script injection. This flaw could allow an attacker to inject malicious scripts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/edwin-0990/CVE_ID/tree/main/CVE-2025-28253", diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json index 71317b2f9c3..64d6eefab9a 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2857.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2857", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-27T14:15:55.720", - "lastModified": "2025-03-27T20:15:28.440", + "lastModified": "2025-03-28T16:15:30.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. \nThe original vulnerability was being exploited in the wild. \n*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1956398", diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json index c8d13b028f1..1829686f0bf 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29072.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29072", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T16:15:30.903", - "lastModified": "2025-03-27T16:45:12.210", + "lastModified": "2025-03-28T16:15:29.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the \"cairo-lang-starknet-classes\" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314", diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json index 27f8ea31527..6d5963e7916 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29306.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29306", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T19:15:49.290", - "lastModified": "2025-03-27T19:15:49.290", + "lastModified": "2025-03-28T16:15:29.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/somatrasss/CVE-2025-29306", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json index 0a29c17ae3a..dee7db32ec6 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29485.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29485", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:15:59.867", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:48.190", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a segmentation fault via the decompileRETURN function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz4.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json index 46b09acb89a..1a6b3ea8940 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29486.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29486", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:15:59.983", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:48.343", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_PLACEOBJECT3 function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz3.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json index e8849c8e15b..82c8078a670 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29487.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29487", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:16:00.093", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:48.517", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An out-of-memory error in the parseABC_STRING_INFO function of libming v0.4.8 allows attackers to cause a Denial of Service (DoS) due to allocator exhaustion." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz6.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json index db1b6502dc4..0d95c7c4278 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29488.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29488", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:16:00.207", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:48.677", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_INITACTION function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz5.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json index 778b16cdc82..4abf94c87cd 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29489.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29489", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:16:00.313", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:48.843", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHLINESTYLES function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz7.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json index 9c3566c77fe..06cde57123c 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29490.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29490", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:16:00.437", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:49.003", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a segmentation fault via the decompileCALLMETHOD function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SWF file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz8.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json index 9fbfe5e4f71..7698779708b 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29492.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29492", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:16:00.653", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:49.160", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a segmentation fault via the decompileSETVARIABLE function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz9.readme", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json index c27d3730670..4df78b2ef0a 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29497.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29497", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T15:16:01.103", - "lastModified": "2025-03-27T16:45:12.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-28T15:15:49.313", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/goodmow/PoC/blob/main/libming/libming-fuzz15.readme", diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json index 204ef54d9ef..b44bd57b0c2 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29927.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29927", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-21T15:15:42.660", - "lastModified": "2025-03-23T22:15:13.217", - "vulnStatus": "Received", + "lastModified": "2025-03-28T15:15:49.470", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 14.2.25 and 15.2.3." + }, + { + "lang": "es", + "value": "Next.js es un framework de React para crear aplicaciones web full-stack. En versiones anteriores a la 14.2.25 y la 15.2.3, era posible omitir las comprobaciones de autorizaci\u00f3n dentro de una aplicaci\u00f3n Next.js si esta se realizaba en middleware. Si no es posible aplicar una versi\u00f3n segura, se recomienda evitar que las solicitudes de usuarios externos que contengan el encabezado \"x-middleware-subrequest\" lleguen a la aplicaci\u00f3n Next.js. Esta vulnerabilidad se corrigi\u00f3 en las versiones 14.2.25 y 15.2.3." } ], "metrics": { @@ -59,6 +63,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/03/23/4", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250328-0002/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json new file mode 100644 index 00000000000..c1c0946a4eb --- /dev/null +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29928.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-29928", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-28T15:15:49.587", + "lastModified": "2025-03-28T15:15:49.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goauthentik/authentik/commit/71294b7deb6eb5726a782de83b957eaf25fc4cf6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/goauthentik/authentik/security/advisories/GHSA-p6p8-f853-9g2p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json new file mode 100644 index 00000000000..549a88fb544 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2912.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2912", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-28T16:15:30.540", + "lastModified": "2025-03-28T16:15:30.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in HDF5 up to 1.14.6. It has been declared as problematic. Affected by this vulnerability is the function H5O_msg_flush of the file src/H5Omessage.c. The manipulation of the argument oh leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HDFGroup/hdf5/issues/5370", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.301885", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.301885", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.519966", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json index 3f0b00aa913..a610399985d 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30093.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30093", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-27T19:15:49.677", - "lastModified": "2025-03-27T19:15:49.677", + "lastModified": "2025-03-28T16:15:30.733", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html", diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json new file mode 100644 index 00000000000..004a0d4aa10 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30211.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30211", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-28T15:15:50.863", + "lastModified": "2025-03-28T15:15:50.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient processing of the error data. As a result, large amount of memory will be allocated for processing malicious data. Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the issue. Some workarounds are available. One may set option `parallel_login` to `false` and/or reduce the `max_sessions` option." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/erlang/otp/security/advisories/GHSA-vvr3-fjhh-cfwc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json new file mode 100644 index 00000000000..1e21d401352 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30371.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-30371", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-28T15:15:51.090", + "lastModified": "2025-03-28T15:15:51.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed in v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8. Migrating to Metabase Cloud or redeploying Metabase in a dedicated subnet with strict outbound port controls is an available workaround." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/metabase/metabase/security/advisories/GHSA-8xf9-9jc8-qp98", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json new file mode 100644 index 00000000000..3b439decf06 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30372.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-30372", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-28T15:15:51.227", + "lastModified": "2025-03-28T16:15:30.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json new file mode 100644 index 00000000000..6eb1541247e --- /dev/null +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31010.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31010", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-03-28T15:15:51.367", + "lastModified": "2025-03-28T15:15:51.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Cross Site Request Forgery. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simply-rets/vulnerability/wordpress-simplyrets-real-estate-idx-plugin-3-0-3-csrf-to-multiple-admin-actions-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9c979692665..5e6ebffd18d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-28T15:00:20.535463+00:00 +2025-03-28T17:00:21.191410+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-28T14:52:00.437000+00:00 +2025-03-28T16:59:59.810000+00:00 ``` ### Last Data Feed Release @@ -33,65 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -287239 +287259 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `20` -- [CVE-2024-11504](CVE-2024/CVE-2024-115xx/CVE-2024-11504.json) (`2025-03-28T13:15:39.663`) -- [CVE-2024-7407](CVE-2024/CVE-2024-74xx/CVE-2024-7407.json) (`2025-03-28T13:15:40.760`) -- [CVE-2025-0986](CVE-2025/CVE-2025-09xx/CVE-2025-0986.json) (`2025-03-28T14:15:19.357`) -- [CVE-2025-1781](CVE-2025/CVE-2025-17xx/CVE-2025-1781.json) (`2025-03-28T14:15:19.687`) -- [CVE-2025-28219](CVE-2025/CVE-2025-282xx/CVE-2025-28219.json) (`2025-03-28T14:15:20.253`) -- [CVE-2025-28220](CVE-2025/CVE-2025-282xx/CVE-2025-28220.json) (`2025-03-28T14:15:20.377`) -- [CVE-2025-28221](CVE-2025/CVE-2025-282xx/CVE-2025-28221.json) (`2025-03-28T14:15:20.483`) -- [CVE-2025-2858](CVE-2025/CVE-2025-28xx/CVE-2025-2858.json) (`2025-03-28T14:15:20.650`) -- [CVE-2025-2859](CVE-2025/CVE-2025-28xx/CVE-2025-2859.json) (`2025-03-28T14:15:20.810`) -- [CVE-2025-2860](CVE-2025/CVE-2025-28xx/CVE-2025-2860.json) (`2025-03-28T14:15:20.967`) -- [CVE-2025-2861](CVE-2025/CVE-2025-28xx/CVE-2025-2861.json) (`2025-03-28T14:15:21.113`) -- [CVE-2025-2862](CVE-2025/CVE-2025-28xx/CVE-2025-2862.json) (`2025-03-28T14:15:21.257`) -- [CVE-2025-2863](CVE-2025/CVE-2025-28xx/CVE-2025-2863.json) (`2025-03-28T14:15:21.410`) -- [CVE-2025-2864](CVE-2025/CVE-2025-28xx/CVE-2025-2864.json) (`2025-03-28T14:15:21.570`) -- [CVE-2025-2865](CVE-2025/CVE-2025-28xx/CVE-2025-2865.json) (`2025-03-28T14:15:21.727`) -- [CVE-2025-2877](CVE-2025/CVE-2025-28xx/CVE-2025-2877.json) (`2025-03-28T14:15:21.877`) -- [CVE-2025-2901](CVE-2025/CVE-2025-29xx/CVE-2025-2901.json) (`2025-03-28T14:15:22.020`) -- [CVE-2025-2908](CVE-2025/CVE-2025-29xx/CVE-2025-2908.json) (`2025-03-28T13:15:41.217`) -- [CVE-2025-2909](CVE-2025/CVE-2025-29xx/CVE-2025-2909.json) (`2025-03-28T13:15:41.387`) -- [CVE-2025-2910](CVE-2025/CVE-2025-29xx/CVE-2025-2910.json) (`2025-03-28T13:15:41.533`) -- [CVE-2025-2911](CVE-2025/CVE-2025-29xx/CVE-2025-2911.json) (`2025-03-28T13:15:41.673`) +- [CVE-2024-39311](CVE-2024/CVE-2024-393xx/CVE-2024-39311.json) (`2025-03-28T15:15:44.647`) +- [CVE-2024-48615](CVE-2024/CVE-2024-486xx/CVE-2024-48615.json) (`2025-03-28T15:15:45.023`) +- [CVE-2024-51624](CVE-2024/CVE-2024-516xx/CVE-2024-51624.json) (`2025-03-28T15:15:45.393`) +- [CVE-2024-54291](CVE-2024/CVE-2024-542xx/CVE-2024-54291.json) (`2025-03-28T15:15:45.663`) +- [CVE-2024-54362](CVE-2024/CVE-2024-543xx/CVE-2024-54362.json) (`2025-03-28T15:15:45.827`) +- [CVE-2025-22356](CVE-2025/CVE-2025-223xx/CVE-2025-22356.json) (`2025-03-28T15:15:46.490`) +- [CVE-2025-22360](CVE-2025/CVE-2025-223xx/CVE-2025-22360.json) (`2025-03-28T15:15:46.653`) +- [CVE-2025-22501](CVE-2025/CVE-2025-225xx/CVE-2025-22501.json) (`2025-03-28T15:15:46.790`) +- [CVE-2025-22523](CVE-2025/CVE-2025-225xx/CVE-2025-22523.json) (`2025-03-28T15:15:46.930`) +- [CVE-2025-22526](CVE-2025/CVE-2025-225xx/CVE-2025-22526.json) (`2025-03-28T15:15:47.067`) +- [CVE-2025-22566](CVE-2025/CVE-2025-225xx/CVE-2025-22566.json) (`2025-03-28T15:15:47.210`) +- [CVE-2025-22575](CVE-2025/CVE-2025-225xx/CVE-2025-22575.json) (`2025-03-28T15:15:47.350`) +- [CVE-2025-22767](CVE-2025/CVE-2025-227xx/CVE-2025-22767.json) (`2025-03-28T15:15:47.490`) +- [CVE-2025-2713](CVE-2025/CVE-2025-27xx/CVE-2025-2713.json) (`2025-03-28T16:15:30.043`) +- [CVE-2025-2912](CVE-2025/CVE-2025-29xx/CVE-2025-2912.json) (`2025-03-28T16:15:30.540`) +- [CVE-2025-29928](CVE-2025/CVE-2025-299xx/CVE-2025-29928.json) (`2025-03-28T15:15:49.587`) +- [CVE-2025-30211](CVE-2025/CVE-2025-302xx/CVE-2025-30211.json) (`2025-03-28T15:15:50.863`) +- [CVE-2025-30371](CVE-2025/CVE-2025-303xx/CVE-2025-30371.json) (`2025-03-28T15:15:51.090`) +- [CVE-2025-30372](CVE-2025/CVE-2025-303xx/CVE-2025-30372.json) (`2025-03-28T15:15:51.227`) +- [CVE-2025-31010](CVE-2025/CVE-2025-310xx/CVE-2025-31010.json) (`2025-03-28T15:15:51.367`) ### CVEs modified in the last Commit -Recently modified CVEs: `60` +Recently modified CVEs: `148` -- [CVE-2024-28572](CVE-2024/CVE-2024-285xx/CVE-2024-28572.json) (`2025-03-28T14:48:51.143`) -- [CVE-2024-28573](CVE-2024/CVE-2024-285xx/CVE-2024-28573.json) (`2025-03-28T14:48:47.437`) -- [CVE-2024-28574](CVE-2024/CVE-2024-285xx/CVE-2024-28574.json) (`2025-03-28T14:48:43.373`) -- [CVE-2024-28575](CVE-2024/CVE-2024-285xx/CVE-2024-28575.json) (`2025-03-28T14:48:40.390`) -- [CVE-2024-28576](CVE-2024/CVE-2024-285xx/CVE-2024-28576.json) (`2025-03-28T14:48:37.483`) -- [CVE-2024-28577](CVE-2024/CVE-2024-285xx/CVE-2024-28577.json) (`2025-03-28T14:48:33.360`) -- [CVE-2024-28578](CVE-2024/CVE-2024-285xx/CVE-2024-28578.json) (`2025-03-28T14:48:28.610`) -- [CVE-2024-28579](CVE-2024/CVE-2024-285xx/CVE-2024-28579.json) (`2025-03-28T14:48:24.560`) -- [CVE-2024-28580](CVE-2024/CVE-2024-285xx/CVE-2024-28580.json) (`2025-03-28T14:48:19.057`) -- [CVE-2024-28581](CVE-2024/CVE-2024-285xx/CVE-2024-28581.json) (`2025-03-28T14:48:15.920`) -- [CVE-2024-28582](CVE-2024/CVE-2024-285xx/CVE-2024-28582.json) (`2025-03-28T14:48:12.423`) -- [CVE-2024-28583](CVE-2024/CVE-2024-285xx/CVE-2024-28583.json) (`2025-03-28T14:48:08.290`) -- [CVE-2024-28584](CVE-2024/CVE-2024-285xx/CVE-2024-28584.json) (`2025-03-28T14:47:52.610`) -- [CVE-2024-44276](CVE-2024/CVE-2024-442xx/CVE-2024-44276.json) (`2025-03-28T14:09:35.787`) -- [CVE-2025-0189](CVE-2025/CVE-2025-01xx/CVE-2025-0189.json) (`2025-03-28T14:31:37.077`) -- [CVE-2025-0190](CVE-2025/CVE-2025-01xx/CVE-2025-0190.json) (`2025-03-28T14:28:25.273`) -- [CVE-2025-0281](CVE-2025/CVE-2025-02xx/CVE-2025-0281.json) (`2025-03-28T14:22:53.790`) -- [CVE-2025-0312](CVE-2025/CVE-2025-03xx/CVE-2025-0312.json) (`2025-03-28T14:11:12.457`) -- [CVE-2025-1653](CVE-2025/CVE-2025-16xx/CVE-2025-1653.json) (`2025-03-28T13:17:33.270`) -- [CVE-2025-20124](CVE-2025/CVE-2025-201xx/CVE-2025-20124.json) (`2025-03-28T13:22:42.077`) -- [CVE-2025-20125](CVE-2025/CVE-2025-201xx/CVE-2025-20125.json) (`2025-03-28T13:37:16.650`) -- [CVE-2025-20204](CVE-2025/CVE-2025-202xx/CVE-2025-20204.json) (`2025-03-28T13:42:57.807`) -- [CVE-2025-20205](CVE-2025/CVE-2025-202xx/CVE-2025-20205.json) (`2025-03-28T13:46:02.393`) -- [CVE-2025-21117](CVE-2025/CVE-2025-211xx/CVE-2025-21117.json) (`2025-03-28T13:24:51.620`) -- [CVE-2025-2854](CVE-2025/CVE-2025-28xx/CVE-2025-2854.json) (`2025-03-28T13:15:40.923`) +- [CVE-2025-21879](CVE-2025/CVE-2025-218xx/CVE-2025-21879.json) (`2025-03-28T16:15:28.220`) +- [CVE-2025-2267](CVE-2025/CVE-2025-22xx/CVE-2025-2267.json) (`2025-03-28T15:41:57.253`) +- [CVE-2025-2277](CVE-2025/CVE-2025-22xx/CVE-2025-2277.json) (`2025-03-28T16:22:58.023`) +- [CVE-2025-2278](CVE-2025/CVE-2025-22xx/CVE-2025-2278.json) (`2025-03-28T16:23:02.837`) +- [CVE-2025-2280](CVE-2025/CVE-2025-22xx/CVE-2025-2280.json) (`2025-03-28T16:23:07.340`) +- [CVE-2025-25686](CVE-2025/CVE-2025-256xx/CVE-2025-25686.json) (`2025-03-28T16:15:28.993`) +- [CVE-2025-25799](CVE-2025/CVE-2025-257xx/CVE-2025-25799.json) (`2025-03-28T16:59:59.810`) +- [CVE-2025-25800](CVE-2025/CVE-2025-258xx/CVE-2025-25800.json) (`2025-03-28T16:59:53.310`) +- [CVE-2025-25802](CVE-2025/CVE-2025-258xx/CVE-2025-25802.json) (`2025-03-28T16:59:38.873`) +- [CVE-2025-25813](CVE-2025/CVE-2025-258xx/CVE-2025-25813.json) (`2025-03-28T16:59:27.230`) +- [CVE-2025-26265](CVE-2025/CVE-2025-262xx/CVE-2025-26265.json) (`2025-03-28T15:15:47.830`) +- [CVE-2025-28253](CVE-2025/CVE-2025-282xx/CVE-2025-28253.json) (`2025-03-28T16:15:29.490`) +- [CVE-2025-2857](CVE-2025/CVE-2025-28xx/CVE-2025-2857.json) (`2025-03-28T16:15:30.180`) +- [CVE-2025-29072](CVE-2025/CVE-2025-290xx/CVE-2025-29072.json) (`2025-03-28T16:15:29.640`) +- [CVE-2025-29306](CVE-2025/CVE-2025-293xx/CVE-2025-29306.json) (`2025-03-28T16:15:29.790`) +- [CVE-2025-29485](CVE-2025/CVE-2025-294xx/CVE-2025-29485.json) (`2025-03-28T15:15:48.190`) +- [CVE-2025-29486](CVE-2025/CVE-2025-294xx/CVE-2025-29486.json) (`2025-03-28T15:15:48.343`) +- [CVE-2025-29487](CVE-2025/CVE-2025-294xx/CVE-2025-29487.json) (`2025-03-28T15:15:48.517`) +- [CVE-2025-29488](CVE-2025/CVE-2025-294xx/CVE-2025-29488.json) (`2025-03-28T15:15:48.677`) +- [CVE-2025-29489](CVE-2025/CVE-2025-294xx/CVE-2025-29489.json) (`2025-03-28T15:15:48.843`) +- [CVE-2025-29490](CVE-2025/CVE-2025-294xx/CVE-2025-29490.json) (`2025-03-28T15:15:49.003`) +- [CVE-2025-29492](CVE-2025/CVE-2025-294xx/CVE-2025-29492.json) (`2025-03-28T15:15:49.160`) +- [CVE-2025-29497](CVE-2025/CVE-2025-294xx/CVE-2025-29497.json) (`2025-03-28T15:15:49.313`) +- [CVE-2025-29927](CVE-2025/CVE-2025-299xx/CVE-2025-29927.json) (`2025-03-28T15:15:49.470`) +- [CVE-2025-30093](CVE-2025/CVE-2025-300xx/CVE-2025-30093.json) (`2025-03-28T16:15:30.733`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2dfe2fb5306..ac243a84241 100644 --- a/_state.csv +++ b/_state.csv @@ -92630,7 +92630,7 @@ CVE-2016-9836,0,0,8ba1c7fd9bfada920620934531cb9a163daf497da9b2eb5d6dd15ac971a1e8 CVE-2016-9837,0,0,171581a99282639171f3a68288f4c03f2492c11216579eb31842ccbbbc6edcfb,2024-11-21T03:01:50.500000 CVE-2016-9838,0,0,eb918df238b6ca99c995648bcc0ca0ea32a0a2978229358f38b97c24377365b7,2024-11-21T03:01:50.640000 CVE-2016-9839,0,0,efaba7b9180eb4b0d6cb8017d7acce2cd4b717cdf7d8be7aba5576d8467c3ab7,2024-11-21T03:01:50.783000 -CVE-2016-9840,0,0,8e8a20c6f409dddd3dc24d2d2305973321db284b9648774a64605087c1ed2144,2024-11-21T03:01:50.920000 +CVE-2016-9840,0,1,d5a1f31378ecb8a78fca7ec6375f269f469d6d0beabc88d1a1b23e1d52769fec,2025-03-28T15:17:06.330000 CVE-2016-9841,0,0,4e44250b54ad7e627cb782577c17713a4100845e6b861bceae363a4a9c6dd6e7,2024-11-21T03:01:51.147000 CVE-2016-9842,0,0,863091431acb64821d9b5770e2449bb87d8c937ca60eb137b530f259ac4bd632,2024-11-21T03:01:51.370000 CVE-2016-9843,0,0,d964855839e9a4d21c3c5397d2c13994a88bfd3fd9b6039cdb5f72b07f1f1a7a,2024-11-21T03:01:51.617000 @@ -121364,7 +121364,7 @@ CVE-2018-25029,0,0,d2b8991b8e678b304186a900d5f867ba7ced0357724ddbec89e209e94abb7 CVE-2018-2503,0,0,8e3ea32ebf1107ec294784a4411fd031e5067d7418ba03c338a6b8fd54d04658,2024-11-21T04:03:55.670000 CVE-2018-25030,0,0,91fc31904ac220f9e574bda8bb75a83e7e1398ce9ca4217ef98d104f6e4a6ff3,2024-11-21T04:03:23.710000 CVE-2018-25031,0,0,87238c3a098f9bca53bacd526bca863a87ee84aa804764603612267a38e6f7b5,2024-11-21T04:03:23.847000 -CVE-2018-25032,0,0,503f4aedb7490a3874f48edb8fe9079fad549e990224f234a7590298ebf6981b,2024-11-21T04:03:24.080000 +CVE-2018-25032,0,1,f08f2265936256e5c17baf99d85a519a575b4b9053d4005c971a056a050823a9,2025-03-28T15:16:29.617000 CVE-2018-25033,0,0,f0b81a6dcdddedc02b01d6b73a4bc374f532ef9ae8e591fa3f31c0d0bac3fd9b,2024-11-21T04:03:24.340000 CVE-2018-25034,0,0,3864ff11e28b6897e54613d3bf75062ea796e861bd67ed0ce0128be7bbbf2b19,2024-11-21T04:03:24.487000 CVE-2018-25035,0,0,182ee13b75ff96081bc3930eff99b4f8556b0c8c291104dbae454f5d723961db,2024-11-21T04:03:24.627000 @@ -136906,7 +136906,7 @@ CVE-2019-19747,0,0,611057112dbadf75d7b4163604d3b75c131e7617ba9d398e9a201c6393e2f CVE-2019-19748,0,0,003d66c6089b9a24d32cd4a1651b8f57fde00fc0f47e0b8791d4cb6569311d3c,2024-11-21T04:35:18.653000 CVE-2019-1975,0,0,24c06b4868d756718188257376a9efe8aeacd0b60748ac6f7eaeca88b3f1ec41,2024-11-21T04:37:48.460000 CVE-2019-19750,0,0,55a285013e24bc651d991c05b211bc25bf9cbd0a58577751d4f6cec8eb6b7df2,2024-11-21T04:35:18.803000 -CVE-2019-19751,0,0,56d4c79bc14b390375789894ec926aed91956a60aa03c945c02b7f21a448ccfe,2024-11-21T04:35:19.033000 +CVE-2019-19751,0,1,4abda8e077122d50e336b4baafe7f6fd8d58f1e5dca5deeabce9220dd2af01d8,2025-03-28T16:15:18.823000 CVE-2019-19752,0,0,e5560cddcfdac752a2a752adddb8d4c402a647b0cb8745dff77b37996d14e2c1,2025-03-25T19:15:38.880000 CVE-2019-19753,0,0,992a8e42ce11043cfca0476128b1fac67d6827bce8fb6084f30f7203b4269759,2024-11-21T04:35:19.337000 CVE-2019-19754,0,0,4715ebcbfb06b86b5d5998419429b297561e7e1b400974d496a230abc486450b,2024-11-21T04:35:19.550000 @@ -163833,7 +163833,7 @@ CVE-2020-8741,0,0,c3e8a17e5a28c22051635661f79c1eb774fee731fcaa356a8f15cfc41ce819 CVE-2020-8742,0,0,6fe052284dcf8d7278e78ec037c375f26d454a033a5b8b7c418f06c6eea71c03,2024-11-21T05:39:21.850000 CVE-2020-8743,0,0,12cb869feaaf256ff682ec5d899c060770bccc31b37d09fe81da7f95f0c8e3a8,2024-11-21T05:39:22.003000 CVE-2020-8744,0,0,8e6e28c8ec88ab246e76bef6ffa97dcefd978f3f9b24cef2c835d4bab3c288b7,2024-11-21T05:39:22.100000 -CVE-2020-8745,0,0,7614664449bf2851987ed63b14ec507d8bc5c372004fa1f74023c2c6b3948b98,2024-11-21T05:39:22.207000 +CVE-2020-8745,0,1,3d02524bf806e1912b62ba3802576b48e47a77d4ecd69e1ee74ff43f0722e162,2025-03-28T15:19:45.743000 CVE-2020-8746,0,0,bcc0e568ce284b7be4a7c8433f761e3c507bd27a7b10d0c802085706355b59e4,2024-11-21T05:39:22.340000 CVE-2020-8747,0,0,e6e59b96f41ac4369ef758c480abd327ce423d704e3d9cba354d6cf737da8343,2024-11-21T05:39:22.437000 CVE-2020-8748,0,0,7f4cb7238b6c9056ffe5d25e649e9aecf97b1fd3a6181d081358be492434f365,2023-11-07T03:26:44.650000 @@ -168554,7 +168554,7 @@ CVE-2021-2197,0,0,3f3db597d4914db83f4ab28169f5f58121ce7bcca935decda34671de30a061 CVE-2021-21970,0,0,e50b82f20c897311b554d7d59260102f13c4cd1b557720ea6f916eec21ce6df7,2024-11-21T05:49:20.640000 CVE-2021-21971,0,0,a15f1643a0f04bb936cefae8f6967a0fc877c6217c175a92d1206b9f1c8fdd98,2024-11-21T05:49:20.760000 CVE-2021-21972,0,0,b57c893da4ffcca06a65da114b9ad2b198306b125accfcb2157b074d4baad2cb,2025-02-04T16:15:32.760000 -CVE-2021-21973,0,0,86cba847f56a39a420482d37e0bfbcbf8412c1ed008e94517988ade22915020a,2025-02-04T20:15:39.867000 +CVE-2021-21973,0,1,dc60dd50f629470605ed1de262a2ccbdb1b9ba731ed909b3db2071237540e597,2025-03-28T16:31:11.093000 CVE-2021-21974,0,0,3de0ff3f51a876bb964c76490a717a7a534efb367618e09e797a5112d8532ed2,2024-11-21T05:49:21.173000 CVE-2021-21975,0,0,7b39f2d4c8b5da98f18e2bc67f290d53ca75075826fabc6f2f7b004160c3fc58,2025-03-12T20:57:43.230000 CVE-2021-21976,0,0,923480596973a58660d6900e0f43c7887211c204cf1867dcd9b388637ff06cac,2024-11-21T05:49:21.460000 @@ -180465,7 +180465,7 @@ CVE-2021-37726,0,0,c827e91a735b7f3440ce297ffdd8fe249cb6dafa37932e2a5cdf2e2ff6b63 CVE-2021-37727,0,0,16914471fac9502f82e14a7be52ce433b1572171f98c40d0581cf2316d79c56e,2024-11-21T06:15:48.923000 CVE-2021-37728,0,0,667f6eccb007c6784b7007bd52fe0edcc204d215df8ca0b162ffb226469c4983,2024-11-21T06:15:49.073000 CVE-2021-37729,0,0,7590423d4d14893b6841c403db08d35c40d9ab2c637d91b9f9590db0f0231e99,2024-11-21T06:15:49.230000 -CVE-2021-3773,0,0,55e032b8ab7340873145f989a8f1ceb41d41aed3577cbbb8a664afffea4d3aad,2024-11-21T06:22:23.553000 +CVE-2021-3773,0,1,8c9d2dea548badcd4a8eb44505a5ba1afb12d4b832912ab41a03feeb847dfe99,2025-03-28T15:15:41.413000 CVE-2021-37730,0,0,ba8bdf69d7adc33fb1ff23d2e11be3b888e691088e530a578b70d0302abd3f79,2024-11-21T06:15:49.387000 CVE-2021-37731,0,0,98accbaa732048de3a0c7bae9ed1a128c5eada6e006689ad66e9f9678c9508b8,2024-11-21T06:15:49.533000 CVE-2021-37732,0,0,c61f3f34a79058ea6dbdb5af2769075b0c40a9d05e631e4388abeec496f9d22b,2024-11-21T06:15:49.697000 @@ -187172,7 +187172,7 @@ CVE-2021-46867,0,0,8ad83a8d226e4f8898ee1ce5bae4c42a6b3940bdcf36d2fee3012ddc586d1 CVE-2021-46868,0,0,f0ef3dd45f64ad741bb81b50cf78f63c19bd438fd32124d2f17de81f953a66b0,2024-11-21T06:34:49.257000 CVE-2021-46871,0,0,05c2919904c965d0b69570703d46258f27345788e02af9d544a23baf7cc1224f,2024-11-21T06:34:49.383000 CVE-2021-46872,0,0,fd01e6b4d7cf956efd9d67ee9685007e549687974e41eefa9b4ee93344bfe2ff,2024-11-21T06:34:49.547000 -CVE-2021-46873,0,0,bd696af11164da0889d93481e3bf2473217e799ee3de555882260a6e2f73ec72,2024-11-21T06:34:49.717000 +CVE-2021-46873,0,1,ba74a23d6eb978514833a40b7527a8652ccc16dbd3b1c464beccaaf964481a35,2025-03-28T16:15:20.180000 CVE-2021-46875,0,0,cd128e15ae16beb3eef5e9c0528dea9bb7a3bcbe28dc60234951f81ea8a515de,2025-03-04T22:15:35.267000 CVE-2021-46876,0,0,6a2e22af11aa26335bbedce387ed63ddf6418c87ae229e885cf311471999ca35,2025-03-05T17:15:11.137000 CVE-2021-46877,0,0,d38d83f8552fd712480fd15b31c69fae523b8d5890dcdafac1ebd8aa441c7eef,2025-02-26T19:15:12.823000 @@ -193025,7 +193025,7 @@ CVE-2022-2333,0,0,c28f4adbd39916a4b5a4fa6b69959d293504f2181c2e2df50bdbe107ec839b CVE-2022-23330,0,0,f1a2baca69a7d892acb795edd6d59f053f26b4bfc39406223a8047fb72de1696,2024-11-21T06:48:25.050000 CVE-2022-23331,0,0,e436e07cdfebf0b21120eaf370e1466d97dbd7a2e078567168eee52b54a68ec2,2024-11-21T06:48:25.190000 CVE-2022-23332,0,0,03f48ba1075ca63cd84eddf9b5926c9e60fc8454deb95aba1ab57d79c44ba0a3,2024-11-21T06:48:25.340000 -CVE-2022-23334,0,0,d24ee4ad3fb33dc90aabf7a6a59d41fcea772359f6d96b9e72562ee3ec887750,2024-11-21T06:48:25.500000 +CVE-2022-23334,0,1,29aa41590f7745fa4ce70461104808ea0892ae440bfad7c3c95622cbb2b15d87,2025-03-28T16:15:20.363000 CVE-2022-23335,0,0,385a313ed3a88829a41c8666b0419afd784e939a25585c135946e5e0da58a9ad,2024-11-21T06:48:25.657000 CVE-2022-23336,0,0,07bfc679027bede08283a99a85d4e6a8b4895d94f4a9f3a16403548c3f82432c,2024-11-21T06:48:25.797000 CVE-2022-23337,0,0,5ed212662dbc98870ce1b4176d2f58eb0a849d67decded6fa282f33aafc7ac73,2024-11-21T06:48:25.967000 @@ -205280,7 +205280,7 @@ CVE-2022-38322,0,0,b570471af3ac3da045db7127371f2f749811c7638f1312d2f0b9ea2e13584 CVE-2022-38323,0,0,a59aa796c66304243a913448227bd84dfae16a322d88dfa5c15f131a7b9c60b7,2024-11-21T07:16:15.833000 CVE-2022-38325,0,0,f05814fdb2faeaa1a16993e9c3e4d8b593360da26da02c45383df8aed9d115bf,2024-11-21T07:16:16.047000 CVE-2022-38326,0,0,ddd7a593ab446359e0263613bd7bd24a513ca227d55a19a786e72d6d4ab9aeb2,2024-11-21T07:16:16.237000 -CVE-2022-38329,0,0,1bc5b6868a2205047bf95568b651ba7d09323d77754e70403b72abcc37738b32,2025-03-21T15:15:37.740000 +CVE-2022-38329,0,1,7491b23f4dbb0183807cd13c54f1a1794cfea6daa2f509e1c06ab6ca6a57c788,2025-03-28T15:15:42.063000 CVE-2022-3833,0,0,974c54d94de219b584179b8997883fe36eb0c7a696a69be9c7f81e0683694a52,2024-11-21T07:20:19.763000 CVE-2022-38333,0,0,56d7bfd5982c43db05a55606c661f8e0c65aff61b2fbcf70156d5f71c00f433c,2024-11-21T07:16:16.637000 CVE-2022-38334,0,0,860dd9433bcbaf1585f6c36716391fc7a1ca2a042ef681020b899ecb163d199d,2024-11-21T07:16:16.843000 @@ -206354,7 +206354,7 @@ CVE-2022-39896,0,0,f2b2f6fa9285ceee3c8fc3eedb77e594e670cf55b8d80a49a33ff57e1e1a1 CVE-2022-39897,0,0,c640466bc40d2725199d6cbe2be90ee3322553c099b36902264c3551a574d1a7,2024-11-21T07:18:29.090000 CVE-2022-39898,0,0,0c00b2b1422e6be3bdb105d1de53ea020a8f1a87b8ec2005ad97c103926c5608,2024-11-21T07:18:29.217000 CVE-2022-39899,0,0,ae6241901716922a9c7a49431debba806ef233a40ef4f20ac6c4849e260de5df,2024-11-21T07:18:29.347000 -CVE-2022-3990,0,0,dd3b2c785cbade5699bffc6483fd14a73fdce41f2dbe4b507dd273920a4ef46f,2024-11-21T07:20:41.250000 +CVE-2022-3990,0,1,6ac2975ee7dacdc5e4e87cb32f13d8d050bbec4f15a82026ccb83118eb5bb59b,2025-03-28T15:15:42.193000 CVE-2022-39900,0,0,ab57420324273113e770c846496e439d771ac44e623a031f9bdec4ac0df70a8c,2024-11-21T07:18:29.463000 CVE-2022-39901,0,0,2f5e6f42f6565605f62903b2d3b4c7cb5832756827b9c159280cfd6be2a90b22,2024-11-21T07:18:29.580000 CVE-2022-39902,0,0,7975b63131f03dde6809ca547363e6d12014fc0580a0a2e5fbfbfa05728b8cb5,2024-11-21T07:18:29.683000 @@ -207581,7 +207581,7 @@ CVE-2022-41384,0,0,f20ed5f7c5effd3d17278e9aefeebc2df0d48ecbad5a05e32719efcf915b7 CVE-2022-41385,0,0,4b250f460b985ee03e059d65336e2299cf2d749d21ed22d9f550339b10911a7c,2024-11-21T07:23:08.067000 CVE-2022-41386,0,0,a6d007d2507ff8469fb9b475c100f581120184d85666c2c61778c702c23662af,2024-11-21T07:23:08.197000 CVE-2022-41387,0,0,f5147b07143b1d3004961f7c421dda36faf3cdde7b212696b6a732f5bc239418,2024-11-21T07:23:08.327000 -CVE-2022-4139,0,0,ad72c0890adcccb54fe95b5a7679e13f049c42c0e9af7dbbf3458295eb11a7e7,2024-11-21T07:34:39.103000 +CVE-2022-4139,0,1,70bd0c4438e0d42816803bf10c2cda7fd805cb562599c934f3e9758b48394496,2025-03-28T16:15:25.407000 CVE-2022-41390,0,0,56282c1b0d50d5dbe9d9a0b2cffa175b8f3ee590c5d0a11cd16e1a827766a512,2024-11-21T07:23:08.463000 CVE-2022-41391,0,0,d32d0bc5c5503b3baf71b6f7bb7b6ecb80cfe87a48540259065e2b4987be9a93,2024-11-21T07:23:08.590000 CVE-2022-41392,0,0,70dde2ed73a2ca1acb62d97f1037a10d759d68feeff01292c17a88ef4c4582cb,2024-11-21T07:23:08.720000 @@ -208751,7 +208751,7 @@ CVE-2022-42846,0,0,23a4b3ff65377be41618e7251eefb34f40a357350151585288c3c249f6e36 CVE-2022-42847,0,0,607e77b127ac5e5d9754b39a8662f6fa23aef36828985ef1800e14b7011ac49f,2024-11-21T07:25:28.043000 CVE-2022-42848,0,0,64fd155aa7781eb93be60b428e5d1165d8b5a0a9740b094b8ed20ed437902f4b,2024-11-21T07:25:28.167000 CVE-2022-42849,0,0,59c0d9f4399d4a7c081e42d0d01b87f0d1be82073de2938f8a8c1002786b5b16,2024-11-21T07:25:28.307000 -CVE-2022-4285,0,0,aa6a5368d13555eb5cbda4eeceb3d0435453a712fde053004e07228173a35c69,2024-11-21T07:34:56.517000 +CVE-2022-4285,0,1,34fff095036fad6b6606d71b5ec5931ba2fd14a2053f30c5babab331677e9891,2025-03-28T16:15:25.633000 CVE-2022-42850,0,0,7aef950cb3a2596867592a14bdf7711a734bf3e084e2d589327777caabc15a4c,2024-11-21T07:25:28.443000 CVE-2022-42851,0,0,ed4c455dd251ed9411c809cce38393db40eb47c39637cc7c8486bd2d56ead56a,2024-11-21T07:25:28.577000 CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b474616531622e,2024-11-21T07:25:28.717000 @@ -209101,7 +209101,7 @@ CVE-2022-4334,0,0,4a37dee2ebbbbca61bfc2e12bc694d49b75fc95115e1acd3f2a5da45247e9d CVE-2022-43340,0,0,5db857e0193b1b777f9c5fe586e64ca593781dd141374d371b29acc52a8dd48f,2024-11-21T07:26:18.300000 CVE-2022-43342,0,0,4dc9364dc49314a30ddcdce7ba52cf6cf3d36313b2e10c4eb0e4575c5e896fd6,2024-11-21T07:26:18.460000 CVE-2022-43343,0,0,160e5591155cbce5d8ead8c9b21219717a4c9394cf8fe6af691fdafeff85695d,2024-11-21T07:26:18.627000 -CVE-2022-4335,0,0,dfc8f94a57c5aa547b14a641e4ea1bcfc47c0fbc8e1ccc6f7f234961811732a4,2024-11-21T07:35:04.653000 +CVE-2022-4335,0,1,ba636c67f94d81abb522fc6fcb38741449cc737db34323300f45361f041ef89c,2025-03-28T15:15:42.973000 CVE-2022-43350,0,0,107bd99cb182c98e0b5ed410f1fc9ecaa26ba06a4afcec937a420692dedb7681,2024-11-21T07:26:18.780000 CVE-2022-43351,0,0,b3c3d192a7d15302fcbe416fc06be1b4cbcc193829e5c645ba84e55b2f7be795,2024-11-21T07:26:18.930000 CVE-2022-43352,0,0,8c22797582398d5bce1f15f40f2642b8197db2369ed82668b6a4b1747a7169cc,2024-11-21T07:26:19.100000 @@ -209846,7 +209846,7 @@ CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b03 CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000 CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000 CVE-2022-44297,0,0,a3cb205e93360d21ed0dcbf9c57c5ee9ea0e7844bfec49955da95864fde45416,2024-11-21T07:27:51.320000 -CVE-2022-44298,0,0,ec40d8ca89e2c941ec62c503d492ea166483cf6da327840a2c086399e977444e,2024-11-21T07:27:51.463000 +CVE-2022-44298,0,1,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000 CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000 CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000 CVE-2022-4431,0,0,a997979e77848dc720009496f56aa1bc847b4cf922636fc1e59621262ba1a1f7,2024-11-21T07:35:14.930000 @@ -210136,10 +210136,10 @@ CVE-2022-4471,0,0,15cc2501e5bc6518ea69d268a3b2667e64233e17b4802626ef5527eb650cc6 CVE-2022-44710,0,0,ad9f08e12c0fb5351a2179f6a61747fced7d535659cc0b15f734dbcaaf510a07,2024-11-21T07:28:21.250000 CVE-2022-44713,0,0,a733592feaf7fca1a67d4e144d0a7996e96a6a1f34eadd0a295eb2afece0d67e,2024-11-21T07:28:21.370000 CVE-2022-44715,0,0,5b241799ae6b884fe57141f2d8c41ed6fa02914a646428e290f97256578fe01d,2024-11-21T07:28:21.493000 -CVE-2022-44717,0,0,370b019989f037e96a2c2262b0f3225e0b3668c0e0eb0527ab6534489888b4cf,2024-11-21T07:28:21.630000 -CVE-2022-44718,0,0,c025de4fda89deb0c067b8ab3aea8e39e154a2f234fe3d24caaab84771ed0768,2024-11-21T07:28:21.773000 +CVE-2022-44717,0,1,fcc44a1f406f06bb2056e63a2c3c9b5d3cb55f8cb03838c43ee02480f5036902,2025-03-28T16:15:21.010000 +CVE-2022-44718,0,1,c7201319af1cb5005818428be1e02751c3e8ac6257316e80b6d0ff51af7236d2,2025-03-28T16:15:21.190000 CVE-2022-44719,0,0,95f36d24d2c2f52c1dda61947950688f864c0a30d123ed3b6f30e7b10efb6d32,2024-11-21T07:28:21.920000 -CVE-2022-4472,0,1,b29e148154b8d93946c2fa2b80f2586b95f0fb1c529e9a6fe708b58805235ad4,2025-03-28T14:15:18.053000 +CVE-2022-4472,0,0,b29e148154b8d93946c2fa2b80f2586b95f0fb1c529e9a6fe708b58805235ad4,2025-03-28T14:15:18.053000 CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311beff67,2024-11-21T07:28:22.087000 CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000 CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000 @@ -210260,7 +210260,7 @@ CVE-2022-44955,0,0,e6b0c638389d060355a0f3905e6dd762d666f9040db16167319772a36a253 CVE-2022-44956,0,0,d1b70adfdab776c1c5c0b014d9feac2cad77496972cb9a7a631c2121e94f64d3,2024-11-21T07:28:35.273000 CVE-2022-44957,0,0,fe0e43a3c399e52a8e98ea2a394a187e7e1da0eea6ef55796b0674d6e8d37057,2024-11-21T07:28:35.423000 CVE-2022-44959,0,0,afe42cf127e64338dbf62adbd3682575b6ae471a5c7331b91c6e58ec6af6d692,2024-11-21T07:28:35.567000 -CVE-2022-4496,0,1,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5c1,2025-03-28T14:15:18.247000 +CVE-2022-4496,0,0,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5c1,2025-03-28T14:15:18.247000 CVE-2022-44960,0,0,5c57a054c5232484ba125138b2e5ab52b6bc141f4e49d5a562f6cefb060d96f3,2024-11-21T07:28:35.707000 CVE-2022-44961,0,0,dc0026edf8d696785d4ad8685d73d54e682943337771cc165b834e50c32149f7,2024-11-21T07:28:35.863000 CVE-2022-44962,0,0,e872b1aec92c00d7b59fb3535b11b1ddc2890769fa87f1d1b3c5799210cb1ca3,2024-11-21T07:28:36.020000 @@ -210416,7 +210416,7 @@ CVE-2022-45175,0,0,30a61c8362a73e1541914725c54ffc87135818cfb078974970c7cf9fb5590 CVE-2022-45176,0,0,9fe4c437141397bc2895c3aa0c38bdb79c57450544da1ad7876237c2f815874a,2024-11-21T07:28:54.233000 CVE-2022-45177,0,0,77debef2be9055c7d8e38970cac080d3d6ba0ad3866eb2c1c5f9a6718ceb03a6,2024-11-21T07:28:54.463000 CVE-2022-45178,0,0,6a401299ae1bcd591dc61611b8534391e266efa087de37de33e2a76ab2789ef2,2025-02-07T20:15:32.493000 -CVE-2022-45179,0,0,58e3e288b77c46141c148cffe2cad39ba33ce87f738a27c27babe949d753b696,2024-11-21T07:28:54.830000 +CVE-2022-45179,0,1,16ece4e8c927b8061aa4d1b433ff7f3a765586cb5c2ed51939778c6a2916b884,2025-03-28T16:15:21.360000 CVE-2022-45180,0,0,9f620c4a664e3e793609c73bc097f6ede0c71acddff0176caa3a2a131c9de3c2,2025-02-07T21:15:10.633000 CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000 CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000 @@ -210934,7 +210934,7 @@ CVE-2022-45893,0,0,cc28543c74c21692ae65e94f4eea922c710ffc2b8fc5f1cbd168cd4f78d52 CVE-2022-45894,0,0,7e79c70ca57ac35fb5f5c2136ed71fa4207d68e94574986bd856b7bbaf922cb0,2024-11-21T07:29:54.857000 CVE-2022-45895,0,0,3bc1f058bd6ec4aa0f4a1dd18ff39b3427bd78a51062410d77a3230858be5757,2024-11-21T07:29:54.993000 CVE-2022-45896,0,0,9fd827559105c4a7f955449cb8e47f3ca887d56261af8ddf374327bd081d5e59,2024-11-21T07:29:55.137000 -CVE-2022-45897,0,0,16c917af12185b39e6fb7f1c28073877c91084cfb5d1b5fb970fe5118a32256f,2024-11-21T07:29:55.280000 +CVE-2022-45897,0,1,b2b882ad2f3896bcc19112e03b04415f9e60136eda918633612298a12443690b,2025-03-28T16:15:21.550000 CVE-2022-4590,0,0,5cd48cb7edb0e9432330b5fa366b9c77cd5bd8c0b506539909ebf45436502e07,2024-11-21T07:35:33.203000 CVE-2022-45907,0,0,6e9d516b5e43b2e1627e6ec56aa6c854a29ec1ba3d18358c344f60495559e266,2024-11-21T07:29:55.427000 CVE-2022-45908,0,0,f66bf3c57fd89a02e6324f98e8c7564501d3fba0621e27512aa88dc8ba707e3b,2024-11-21T07:29:55.573000 @@ -211022,7 +211022,7 @@ CVE-2022-46076,0,0,2b119d1b9f44cdfe9d10a31f87575568f9131b5fd98fae292e4ff9f12aa82 CVE-2022-4608,0,0,be843af6d4396743b51db58c72f2505739c01d27b14e0bce118248260ba2d980,2024-11-21T07:35:35.383000 CVE-2022-46080,0,0,68b2b59d09c84516563c3e52ea8ae348c5f72254930a31286339a3a247d9946b,2024-11-21T07:30:06.260000 CVE-2022-46081,0,0,8e27a6a05f54b38f7bc644f5917dc3bad23b46b85a0b29c2cb6a829c10deba7d,2024-11-21T07:30:06.430000 -CVE-2022-46087,0,0,a739745513abaf7f2211850e9542f59106ca6aca5c242a056a8e32098bc80a91,2024-11-21T07:30:06.580000 +CVE-2022-46087,0,1,8a83eb70fb96cdcc4325022904e873ef83281a17756d37d045af2dd4cd910110,2025-03-28T16:15:21.727000 CVE-2022-46088,0,0,fbec400ca51475ba9421a27e08dc711219d99cd09b17d81ab0a9e79792af5963,2025-01-08T18:53:10.857000 CVE-2022-46089,0,0,f19d133bf817c152dc8d9fb5b26b88d76b7110e1c6b600d64f973b4f5a22fb0a,2024-11-21T07:30:07.007000 CVE-2022-4609,0,0,ef6b610a9ab8c4c8cd37a74de4ddd025ba4ec8b5e1e4a1d2ed469fc695c8ae18,2024-11-21T07:35:35.517000 @@ -211254,10 +211254,10 @@ CVE-2022-46352,0,0,00a13155dc5b8ed7b035aa6118159b19d015bd5bbf2970a852fb90f56d755 CVE-2022-46353,0,0,fa817b94ddb190f2f70356e68449128669d0ac6f4734acfa383e1e6cac4ada12,2024-11-21T07:30:26.800000 CVE-2022-46354,0,0,b54e101d98bcc7bdf3369d8e22b533068f967b06511fa3684503bc3291cd0106,2024-11-21T07:30:26.940000 CVE-2022-46355,0,0,305a6a49c47ba6f068e02b03054bb94be666adcbdda42b6f54058d176f63c547,2024-11-21T07:30:27.060000 -CVE-2022-46356,0,0,47d4157e9ddca8e998236534a5386aedc980e3ac45d7e10a2de1ceb15bed17b6,2024-11-21T07:30:27.190000 -CVE-2022-46357,0,0,1199571d73b069c8a397b229ec41ff3adab01a3024cfb151a4adc4046823c825,2024-11-21T07:30:27.317000 -CVE-2022-46358,0,0,3207b80aca3f622184aa8f84e0f2179226e5fb68f75d098d7c685f2088ce1a9e,2024-11-21T07:30:27.440000 -CVE-2022-46359,0,0,4a4ff94774bc64ded5816e90ae0c5cfc0372da1092125a27583479607b2cfa36,2024-11-21T07:30:27.543000 +CVE-2022-46356,0,1,17ca9ad9399acc0a981ea70d03ac8944e2e5914be2c741108861286b4fe17cd2,2025-03-28T16:15:21.900000 +CVE-2022-46357,0,1,7a513a0d79208916fc0a2b920e5168ea7a1b12910c6484334fe4a011f8aeb3a8,2025-03-28T16:15:22.077000 +CVE-2022-46358,0,1,7514a28206684427404b865b5de71c9ba4e7415c25842706199e499397de5437,2025-03-28T16:15:22.247000 +CVE-2022-46359,0,1,7ac9438195587de5deff727fa278ba53c3fc732d2777d85361d36e310b96e966,2025-03-28T16:15:22.413000 CVE-2022-4636,0,0,62b2b9a320d3f7c1b1e6d8c5b7aeab8c8de6365fed0e24bb64bd90fcb920bb46,2024-11-21T07:35:38.497000 CVE-2022-46360,0,0,6a38c899775b07183a85ad93e30f1c636b2d9ff7efcbab2596638f5b481c7440,2024-11-21T07:30:27.653000 CVE-2022-46361,0,0,8123416efbf539917e595ae1846ae046080e1a9d1d86d394dc85bef02bcb6e74,2024-11-21T07:30:27.763000 @@ -211342,7 +211342,7 @@ CVE-2022-46485,0,0,c0c6dff55283dfb771f1a5b37a71bcda6eb783b9616964cb839caae868642 CVE-2022-46486,0,0,273bdea328c05f53d2935ee8b7a4d92db36b6cf750418b0fcbf9c9ac94631bba,2024-11-21T07:30:37.913000 CVE-2022-46487,0,0,65fe5e22876afc2cb9c6b96f2f17c89cd6669debe9e703f15386e0a779e67884,2024-11-21T07:30:38.080000 CVE-2022-46489,0,0,7e5278eabce0e4178abbc2321c3e1cb938d848560691becda1a2dd3dbb795ffc,2024-11-21T07:30:38.257000 -CVE-2022-4649,0,1,4397e99c546f206fb5608e5d52d00f6a11918bbe5a94a37f22c72384e078b82d,2025-03-28T14:15:18.420000 +CVE-2022-4649,0,0,4397e99c546f206fb5608e5d52d00f6a11918bbe5a94a37f22c72384e078b82d,2025-03-28T14:15:18.420000 CVE-2022-46490,0,0,0aba57b3e2c6acedfab8943eea7d30e9d0d314e0e1ad14ca907ef24ac2a1aeb4,2024-11-21T07:30:38.400000 CVE-2022-46491,0,0,1935572f3715f36fc93538c008dc76c9b9fcc6be4c0c502750bd2d8154d14b6b,2024-11-21T07:30:38.557000 CVE-2022-46492,0,0,ea33259e380519928079c589c50e4fd70a12dd967d5e0ef95d74810d65324acf,2024-11-21T07:30:38.693000 @@ -211370,7 +211370,7 @@ CVE-2022-46536,0,0,ba5b7d5056f87a59e895d74fb72cc3d15f19f4be6f0ad992b5fba775595bc CVE-2022-46537,0,0,12906b63d2f5ad59fda29ada33f3d31b7a7c5331fff3bd5aa033e84dc3f38b67,2024-11-21T07:30:41.460000 CVE-2022-46538,0,0,d9bc61ef0e5ef0fa6f8492952fe761045187c8f765eaebfc4f01b4f3011fd250,2024-11-21T07:30:41.603000 CVE-2022-46539,0,0,fbb842b44c65b836721a9ca80d64c29a6175b84f4a452e4905d88976fa78e76e,2024-11-21T07:30:41.753000 -CVE-2022-4654,0,1,a11ae60e7a08e302805d9954c19f704fabaa96a1b3e3cb64005becb7d6259b17,2025-03-28T14:15:18.587000 +CVE-2022-4654,0,0,a11ae60e7a08e302805d9954c19f704fabaa96a1b3e3cb64005becb7d6259b17,2025-03-28T14:15:18.587000 CVE-2022-46540,0,0,371160f698a610d84ddca173575f46caef28646a1f08e43352262b6cad9c9354,2024-11-21T07:30:41.893000 CVE-2022-46541,0,0,42d88c6d87824269997cb6db2986e2590b1873121ed705f61857a8ae4a496132,2024-11-21T07:30:42.043000 CVE-2022-46542,0,0,12f57bc9080a641356a575564eaec43bb7c38161002f8b8efec9ad7b6d66cc25,2024-11-21T07:30:42.187000 @@ -211712,7 +211712,7 @@ CVE-2022-4696,0,0,d18a6555347b2450931b7a4499108c5f3c4aef62c5e374495c248bc437d3d9 CVE-2022-46965,0,0,4e2cf60cfa574761bac515bacf7768a3ec05fd5353442e98aba963404ab9629a,2025-03-27T14:15:20.163000 CVE-2022-46966,0,0,070bf64185beec1d346f1eb3fcc535a9f501d6d7759507c69e62ea1dfb763c47,2024-11-21T07:31:21.080000 CVE-2022-46967,0,0,7b5e0d7e72e3dba5d588a35fb64ffdf40088372a48d9222c2905273c82086be6,2024-11-21T07:31:21.360000 -CVE-2022-46968,0,0,c503254a3e5c4d42a758af6f17024297295ac5fa736be3573aab667842fa96ca,2024-11-21T07:31:21.537000 +CVE-2022-46968,0,1,0208b36a8bfd03989c26bf3b2cceaca71901f6441bc3e8e9efb8b016ba393792,2025-03-28T16:15:22.580000 CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000 CVE-2022-46973,0,0,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000 CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000 @@ -212177,7 +212177,7 @@ CVE-2022-47629,0,0,ecd587ec973943e78b94b658ce47376bf9dccfda6eb7942d23e1cd5bfa072 CVE-2022-4763,0,0,f67e1ecec8465b4c46dbc7803de4f297df5b3c3e70f59073f894bc3151f9fb1a,2025-03-27T16:15:18.020000 CVE-2022-47630,0,0,3f799235267917659e0db4783bfc8e5510700abf1ffc1463d6e21f2f28959844,2024-11-27T20:03:20.203000 CVE-2022-47631,0,0,b9d0fb147402cddedadc19767080d5a10938d5f7d217604866c1aab222ec952d,2024-11-21T07:32:17.147000 -CVE-2022-47632,0,0,ca6a6aaa940bf5236a134ca32f93c2d6730d787a52fdf59337fbd0136a75a42c,2024-11-21T07:32:17.317000 +CVE-2022-47632,0,1,39d2ec5c8084f35f5b3abff570fa9e08c0a9f0d365e70d611530301e0be74e67,2025-03-28T16:15:22.753000 CVE-2022-47633,0,0,818d067312defd637fcefb490e6552884ddf07000464b4885013dc15f47906fa,2024-11-21T07:32:17.477000 CVE-2022-47634,0,0,1eb5f4755f6705f4bf83845e716a60f55e55b25793646e17d98b3f85caae68ab,2024-11-21T07:32:17.643000 CVE-2022-47635,0,0,61824f2f5e370f575496016f2579c66430d06e60e156153206a133a5be20b065,2024-11-21T07:32:17.797000 @@ -212301,7 +212301,7 @@ CVE-2022-47936,0,0,6e97adbc077ec3b9402c2a5aaf3ed3a5320385cb500437f3dc354b28ce60a CVE-2022-47937,0,0,538aa7918ded3b5ee10f14520b5b529dde7873a05464016f6d2d3dffbd31a4b6,2024-11-21T07:32:34.847000 CVE-2022-47938,0,0,6389c1b5c121b383d5f7cbe230e889f82fddd1762b25f480f7da52613b44b6ca,2024-11-21T07:32:35.223000 CVE-2022-47939,0,0,57858ffa209fc211ebcee12fc6be5d4d31d662c16e9e4df23ce6732a609d2ad5,2024-11-21T07:32:35.527000 -CVE-2022-4794,0,0,52edd28b17636275b54fca2982e4847be8cca20da284cc3cbc70e58499755cf6,2024-11-21T07:35:57.293000 +CVE-2022-4794,0,1,6e3a44d5ceb655df805126aaab55edbc5a82cab5062efc191610ecb48b22afea,2025-03-28T15:15:43.120000 CVE-2022-47940,0,0,0415c1caf3a79389a5d562c21410d35a138d04792f85abdd3cffe1b9a49da496,2024-11-21T07:32:35.773000 CVE-2022-47941,0,0,84fafe0c88abaef64f8fcec45aff68710d547f9377bd525c134dba046b225c2e,2024-11-21T07:32:36.077000 CVE-2022-47942,0,0,ccdfa5939f84209ad8ae0807591190e976a5ec2ede1c58d505ff099556519549,2024-11-21T07:32:36.300000 @@ -212330,7 +212330,7 @@ CVE-2022-47986,0,0,843d5ab8b25f573fefdf3ea3251218937ed9a6b804784337485155c24e031 CVE-2022-4799,0,0,d8adfba9212661d399d68907e6055576a29a9f48a62d0b6607b21376a8851106,2024-11-21T07:35:57.860000 CVE-2022-47990,0,0,18cb2a978fa8aa0898f2795e6159d13b42c436a17e524d1b78789fc11e58d48d,2024-11-21T07:32:40.867000 CVE-2022-4800,0,0,ba106e13c41c51cfd7b012fca8bf8c05e15d3017934fe4a86355a316d8cb5b7a,2024-11-21T07:35:57.980000 -CVE-2022-48006,0,0,b1a614bb1d5f8a06ae7e6b41a2a9307846c5a756dd9e3c8688f03489e52f529e,2024-11-21T07:32:41.027000 +CVE-2022-48006,0,1,7fe5ba74cc4cbd0ab86cb009befa99c90a20b98b3c2be4c9f3ca81b230050c09,2025-03-28T16:15:22.977000 CVE-2022-48007,0,0,e495582aaae7b4766b16834815d36a3627deec2f02974040c16f82644f043fc9,2024-11-21T07:32:41.230000 CVE-2022-48008,0,0,3c25e5166ffd68ae50646f26caec73e953e310de1ab7a7ab2c3b43c22b068bee,2024-11-21T07:32:41.477000 CVE-2022-4801,0,0,30d9ce15e02d45e233c179bccbab98eb085349e3250f3fbb46a65f2af5b5ac21,2024-11-21T07:35:58.100000 @@ -212352,13 +212352,13 @@ CVE-2022-48063,0,0,6a10cbec286dcf265b027d5e39908826236c5f7040f8b0bccabdc7a7794d6 CVE-2022-48064,0,0,d9352d490528939400414dea624debdec62ce595bdf2bb7f2d4840288055336e,2024-11-21T07:32:46.073000 CVE-2022-48065,0,0,1a3f387e53f3e6836a02be2c0727f86d89342556fd80eca323dd8aa147167eb2,2024-11-21T07:32:46.350000 CVE-2022-48066,0,0,68d282aa79662263908e21b818c51f22afe596add0642ac3d60f16dbb91b9fc7,2024-11-21T07:32:46.623000 -CVE-2022-48067,0,0,20d31ad66bc98dbad6ce47df4492d980d3940665d6c79ebac17f8e6b4768c8c9,2024-11-21T07:32:46.853000 -CVE-2022-48069,0,0,a82f2f370bb538a3e79c8d6cb6c10a0beeae3353637693947b4ff9560aecf40c,2024-11-21T07:32:47.057000 +CVE-2022-48067,0,1,062d782323fc69a20286371113de88f2acdab4ba681ecdabe26333ecd023521a,2025-03-28T16:15:23.153000 +CVE-2022-48069,0,1,64cd37eccd3a384f0ee4b387e9af04654da0ac71212783a40aafbdabe1673763,2025-03-28T16:15:23.337000 CVE-2022-4807,0,0,5fec0ec5de9ff238d1270246f3ab5fb4be56f69a84033aeb95d9a117b23c57fd,2024-11-21T07:35:58.830000 -CVE-2022-48070,0,0,bb7c63c58a758abb8601b08147622753edc859f0be6b16708d42fab798498b62,2024-11-21T07:32:47.277000 -CVE-2022-48071,0,0,956adade7bfb4bda5227c7e3f4fa18bad5fb91a52865614194155df935ed17a9,2024-11-21T07:32:47.483000 -CVE-2022-48072,0,0,77eb2d389fd5e608973a8b149907edd407984d6ee5ed8f74e9d5ae1cbdeb33b6,2024-11-21T07:32:47.680000 -CVE-2022-48073,0,0,2da07f93b7e02d5a7ab19580ce5f8b95b04fa4925f621f6fe3f0a7f22a353850,2024-11-21T07:32:47.900000 +CVE-2022-48070,0,1,20b2fe2c1b222aa24bcb13400745e7af6b4cb5afa29b34b8bbc0fdb19dd2c06d,2025-03-28T16:15:23.500000 +CVE-2022-48071,0,1,22082845bd792c4f5ce9fb6af28e9b6a507cdf0f3dd948ac5bba02cf2b3a3a33,2025-03-28T16:15:23.667000 +CVE-2022-48072,0,1,9951fc4093f273cd9fe05cbaed2fefee977f93a3082122088499759638b0016f,2025-03-28T16:15:23.823000 +CVE-2022-48073,0,1,ee7fe69a65d69ece9dae2c4ac47e4af9d5dd83ebf3a926d29b9136e0fd172278,2025-03-28T16:15:24 CVE-2022-48074,0,0,024026d814c3e458543ee840b0f04b6d988181a00a1c0f49c6e6fcd1f0831515,2024-11-21T07:32:48.110000 CVE-2022-48077,0,0,e114f4d91897dd7440946986bfe77b643704e523f1b6d351a7a2208587764703,2025-03-24T18:15:16.627000 CVE-2022-48078,0,0,22d7c6914cbd00e0bc8e2e4753728522e64fe21d5bd018c6a965c59dec18f17e,2025-03-26T20:15:16.797000 @@ -212372,16 +212372,16 @@ CVE-2022-48091,0,0,b284afd19802a63bb8a53744e2ccdd70bfeba3b8f828ace797a61d23c6354 CVE-2022-48093,0,0,f74f831d2241c43384ba1352e75bc8341a5601808163fb9fe6ed660f58498e92,2025-03-27T15:15:40.437000 CVE-2022-48094,0,0,f0dcf4ce9ff7d3ac834355d7e42ab51d6554828a3dc9b1f8624e04546ce54718,2025-03-27T15:15:40.617000 CVE-2022-4810,0,0,25162b24bf11dc0190512c5405cee16d314c523643e157ba40ee82b21459eb05,2024-11-21T07:35:59.190000 -CVE-2022-48107,0,0,ea86b4df2888c77620f092846cd1660fa21ca354f29faf5cf44596d14ec923af,2024-11-21T07:32:50.230000 -CVE-2022-48108,0,0,8d4f3b9b9efdf48cd29c33c16382d7f14321ac3ec536a714fd38fcbac269811b,2024-11-21T07:32:50.467000 +CVE-2022-48107,0,1,b7fd3a4c2faec39b862ebf1ce6a2319e695b93d8232a53c2cb161d4569668e1d,2025-03-28T16:15:24.193000 +CVE-2022-48108,0,1,b2e6c406616ed2daa604e477e21d91c5abf1e65d5a7a0dd7435dde4a3ca2f92f,2025-03-28T16:15:24.373000 CVE-2022-4811,0,0,c9ad55ad708c43d2e552a2a5cff5f2a41a15cb1ba0ee8006d753aaa8ca172523,2024-11-21T07:35:59.310000 CVE-2022-48110,0,0,4dfdc9bedc7c08ff14ba89cadd1d23d2de867d284056a453d36181031a922c24,2025-03-24T13:15:24.493000 CVE-2022-48111,0,0,6d90f28a337f6a00ea5e92197007edfb483aacede200ab8d61a3d9120f75dc78,2025-02-27T20:15:34.833000 CVE-2022-48113,0,0,774582892b0f857d49807b3b578d023486a5654872981d4d3b62f70345d62a01,2025-03-26T20:15:17.343000 CVE-2022-48114,0,0,59681c6f492dc2dc300b4482a4cfc9897883744188b741dd0035b1b7db528f4a,2025-03-26T20:15:17.510000 CVE-2022-48115,0,0,02d8358a7e7fb3290acfaa6cc9cfc976422606aefeb2f7a592225bc527fcfbb2,2025-03-18T16:15:14.220000 -CVE-2022-48116,0,0,d439e25a633190dba6b6a3f4ee512e50765c42f419fa5db7ae37cbd17c724599,2024-11-21T07:32:52.407000 -CVE-2022-48118,0,0,92c370b1269482a57aea9032555c816c443357bc9aca17b621cb8f86d88910ab,2024-11-21T07:32:52.550000 +CVE-2022-48116,0,1,5531d086d8c9a6559120206e26b3045018dcb7e30f6800995a3f2942de1851bd,2025-03-28T16:15:24.543000 +CVE-2022-48118,0,1,ab79f2d060b611c83a9de63bed2167faa3772ba82fe27682502bdeb97669b234,2025-03-28T16:15:24.710000 CVE-2022-4812,0,0,bbc94f47a7be1702b566e9efac3866803787a08ad1ab3c5f1c6664a83118af5f,2024-11-21T07:35:59.437000 CVE-2022-48120,0,0,2eb4bf6f3b23febe77dbff553f00efd32d0ba60c40fa8808e865b76470dee4b5,2024-11-21T07:32:52.703000 CVE-2022-48121,0,0,c502330d2c963632f98cd6db35dfa0a25700a5a765cd32ec58770fbd955e2ffb,2024-11-21T07:32:52.847000 @@ -212407,8 +212407,8 @@ CVE-2022-48165,0,0,afb678811a8f8b895285bd5354ae0c3c28189104ded28e3e98d5174faa0ac CVE-2022-48166,0,0,37fe04a355378703a4bc73a39a30cadfbd3325bb4f2bcedcc836867a8de05f6c,2025-03-25T20:15:16.370000 CVE-2022-4817,0,0,f0e15d2c836cdd546ed9d1a4f8bb5eeb7e4b0d94aae1960867b2c42008118c42,2024-11-21T07:36:00.190000 CVE-2022-48174,0,0,ed24bcae7077a6041e46ca4fbfc8590c099d4c58251200e5ceb4edc4cffdc7e0,2025-02-05T18:02:49.267000 -CVE-2022-48175,0,0,6fece746388787891a725bedf1d79c50ba2ce6b9971433a3fe9ebe52c7c3defb,2024-11-21T07:32:55.190000 -CVE-2022-48176,0,0,f9b97f333ed2e0a9d0a9b017dd2531ea920ca2a943855468d38a69dfb2365385,2024-11-21T07:32:55.340000 +CVE-2022-48175,0,1,fd7ba98c93de8d947c4285de7c7d86534333722a75db98d8d2c07153ee201ce2,2025-03-28T15:15:42.600000 +CVE-2022-48176,0,1,1ad627162e55dc2598204dc1df1c79447f4cfb1b23abe6d02c85e0bb2226eda2,2025-03-28T15:15:42.780000 CVE-2022-48177,0,0,95e25759dd088d12027543b96c1c8080df3faec420cf8d676e57941d7d53a75b,2025-02-06T16:15:31.687000 CVE-2022-48178,0,0,f9c4811078153e3368b6488fb606ed2fcd036e09047751e39faa3fd19db6fb3b,2025-02-06T16:15:31.890000 CVE-2022-4818,0,0,8b3c45cd7dbdd501a83bb59b533552d52a9be0650b418b2ad86410c769ef864a,2024-11-21T07:36:00.327000 @@ -214004,15 +214004,15 @@ CVE-2022-4975,0,0,f3499ac468d9abe551aab7c55d7d6df29ba7ff95cc64d5206edf5add6a87fb CVE-2022-49750,0,0,b5351f5374431b404e9c3222fd8c97483724c46ae8eb51f984311a533787f2df,2025-03-27T17:15:39.850000 CVE-2022-49751,0,0,596ad60a5a0a6c3f3a0c590db41aace2fe14a9dbb854d3c42eb8e9b263a7871a,2025-03-27T17:15:39.970000 CVE-2022-49752,0,0,6f2a3b6c5ddd66a89cf0cbf29b0652c2d0f45731c40c4072843c779a3a8521bb,2025-03-27T17:15:40.110000 -CVE-2022-49753,0,0,888e02712ee9002954dc8eeff4781907d47ad75618c77d785982d6f11bfdfd40,2025-03-27T17:15:40.227000 +CVE-2022-49753,0,1,065e4677785758a60eb825c42870fa421dab565784ca6754c1612668e16a3429,2025-03-28T16:15:24.887000 CVE-2022-49754,0,0,84e2c082700e56193c2159b2deb1ce2dda82c6d170da9319309643d0bf699316,2025-03-27T17:15:40.423000 -CVE-2022-49755,0,0,5782a3e1ce4897067444dad35c1d26e2ea70125a3a4b286c01f1958a8b7f0101,2025-03-27T17:15:40.640000 +CVE-2022-49755,0,1,917b0329667527603f08a3810ac9a3d0926f6259fd8b0701e84c6842d5957226,2025-03-28T16:15:25.057000 CVE-2022-49756,0,0,59c72d123cf02955c49721cefb33dbf5c9cb5e99814c60a6e83ad7e0f15b9801,2025-03-27T17:15:40.787000 CVE-2022-49757,0,0,c4329461c876365124c23649a4c17bda50fce2d79714d1faf6b2dbd8fd328d5c,2025-03-27T17:15:40.910000 CVE-2022-49758,0,0,b4e95e21481b05dafe2fce299f9aea3cba410fcac12aebef190fa8e03c158aa9,2025-03-27T17:15:41.043000 CVE-2022-49759,0,0,770a1f3ecd358b23a166d479d0cc2b25b865f447f1dc48efb70fcecf440b3034,2025-03-27T17:15:41.163000 CVE-2022-49760,0,0,12a7668b827a042761065b0235850d5f76c62b99ada45c1e6f10650b1edee41b,2025-03-27T17:15:41.280000 -CVE-2022-49761,0,0,bfb3f6f13a75d61c3c39f70a4d7aea04c8ba28a618ddf12858eb68bfe69903ee,2025-03-27T17:15:41.407000 +CVE-2022-49761,0,1,0591e76b710c208cc44ac3bee37454b61bf2cfad54ad81dd349c2f58d6eb775a,2025-03-28T16:15:25.220000 CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000 CVE-2023-0002,0,0,d4360529168fea353efb6226181fd2ab0e85944e3049df689718cf07491ef7ac,2024-11-21T07:36:22.187000 CVE-2023-0003,0,0,e9130921c34a8d1b2e06e89be0ccfee8f78c6c04b42ac1af0311d8e1a3808a43,2025-02-13T17:15:52.570000 @@ -214562,7 +214562,7 @@ CVE-2023-0565,0,0,ba96ac3ea6fdcd659ec323f909eb0e52a223900842087ba6d54a7ca3ecce60 CVE-2023-0566,0,0,8a2573b36d1a8c27fcd6c1f11e9fcb744a91bd684a5f7d033f5409de79716c16,2024-11-21T07:37:24.813000 CVE-2023-0567,0,0,f0326b6755e824190cec4bb20f939800cee460e3013859da98d2005078f98bf5,2024-11-21T07:37:24.913000 CVE-2023-0568,0,0,b7e89191b061ad4b9e2ecffdee8c1ec6400eae9c92b3332b3162a0e2d1f51d12,2025-02-13T17:15:55.913000 -CVE-2023-0569,0,0,2cd6c898eaf00192a0df2be58d004f6a6fc0d52b63377e2eda973404fa5c1ee0,2024-11-21T07:37:25.190000 +CVE-2023-0569,0,1,480eb363b34e1688a53b19f15231082cb405f94a2d7db76e4eba6afdf04586c1,2025-03-28T16:15:26.270000 CVE-2023-0570,0,0,d72798e431b993105708f452d019030a0d2f985bd53d4fa7a0ec1ddd8793349d,2024-11-21T07:37:25.290000 CVE-2023-0571,0,0,957d0d83e871133ba89a5943ca136ec0012851324b04e3f199c64dfcde65ff8f,2024-11-21T07:37:25.403000 CVE-2023-0572,0,0,2a5c90598a63f0657596a749f64328b5470a3b3966692640587fe9ee2314a143,2024-11-21T07:37:25.510000 @@ -217997,7 +217997,7 @@ CVE-2023-22320,0,0,1490e1a0bc30f60ed3cf477f5e002d0271f868f08c13d6423b385e47dddba CVE-2023-22321,0,0,b6b427a124fd3635c61cf3ca11dd7049df41ff1111d08752a99f6deded7d9037,2024-11-21T07:44:31.517000 CVE-2023-22322,0,0,73e6da4b2e93cf5dafd49a0d7d2fe8f5e94d1245561177b15224f176531f8ca1,2025-03-27T21:15:41.690000 CVE-2023-22323,0,0,07c49ab1fca51a9ec6367b94f86b19d2bc9fffc54259f852693eb5bde5e66b72,2024-11-21T07:44:31.740000 -CVE-2023-22324,0,0,30d8117079140c7a1ae9f0e15bdf38893847f6feca6dcf6b3c8c75528c833c41,2024-11-21T07:44:31.870000 +CVE-2023-22324,0,1,c309d900a5871f7c29aa76a0fb990053339f0d0566d82f46c395a0ba2e494022,2025-03-28T15:15:43.277000 CVE-2023-22325,0,0,c137aef31be38ff81d8119e0632a1dc6f32b6d01fd9edca7544c48a1859fb730,2024-11-21T07:44:31.983000 CVE-2023-22326,0,0,11086e586575f5b9fed9df9894c61be7b8de2057f7348b128d6effa23345c31c,2024-11-21T07:44:32.110000 CVE-2023-22327,0,0,67f8a812725595239e2c4bcba8d48b32601ecd79a17d25a0349b80dcdce74f5d,2024-11-21T07:44:32.240000 @@ -218005,8 +218005,8 @@ CVE-2023-22329,0,0,f87a257a3f491ed4d593d771327413fcc27bcb682b9124de27e798796cef2 CVE-2023-2233,0,0,03f299c1d59d076f3123647077160e666b5ecb77282bd585e0ab47f916f62f95,2024-11-21T07:58:12.350000 CVE-2023-22330,0,0,2f72b562c10a58f1bde1370f048bf90c89a94766f9eeedb9676c2eca440dc010,2024-11-21T07:44:34.537000 CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404e77,2024-11-21T07:44:34.737000 -CVE-2023-22332,0,1,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000 -CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000 +CVE-2023-22332,0,0,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000 +CVE-2023-22333,0,1,e9b53e4821c1f5a5970f79e76ba8497a486f49a590930e00df3c607a1dfcba45,2025-03-28T16:15:26.470000 CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000 CVE-2023-22335,0,0,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000 CVE-2023-22336,0,0,f4a7cab6a1ad5814eee212d8dee5da87605af397c1ab560ff48f1b473d5cec8e,2024-11-21T07:44:35.247000 @@ -218660,7 +218660,7 @@ CVE-2023-23145,0,0,945ee191806993ce912abc0c0e77f5ab33f397920a733faa109f95d0c60f0 CVE-2023-23149,0,0,e1ddcd177deb43872b4c27ba355b3038a5d22c503a22db96a62bc5a2e215630c,2025-02-20T20:15:44.923000 CVE-2023-2315,0,0,703c619703c4fce365a6868586db5687509dcceb0fd605dc4600ff1def4a36fe,2024-11-21T07:58:22.310000 CVE-2023-23150,0,0,c3fed49dada791ee0e14dd83171734bc482f05db3917cf64a965cede2313dda1,2025-02-26T21:15:15.600000 -CVE-2023-23151,0,0,2b6ba5f4ad28fe8403b219f96f69c3a286502f418ad0e95646df6910f09d278d,2024-11-21T07:45:54.170000 +CVE-2023-23151,0,1,25cb73bb5dc29dabdcf5ae1c049a18b93af2269cf0d155a1cf517f0785762526,2025-03-28T15:15:43.443000 CVE-2023-23155,0,0,5e459e69628daf4a366e27ac052ae67a9c0c7883cb2fcbe29feac0d0ecfc8d9f,2024-11-21T07:45:54.303000 CVE-2023-23156,0,0,4736570a618e724fd5a0e2bc6cbb8092ac7a6ba00cb16906f0b406a108d65e74,2024-11-21T07:45:54.450000 CVE-2023-23157,0,0,6e6ab6da503db55d21eae312756b4eabac7bb59dbc44453fb0f28dcbbd0f6ca6,2024-11-21T07:45:54.590000 @@ -219430,7 +219430,7 @@ CVE-2023-24060,0,0,9f22102b3cecfd70cc788c7c9875e7a1141618884af2c27424251feefdf06 CVE-2023-24062,0,0,d2f5a93bf7dc1e49a8b689f32f43e7d262343479e601f04db90b39ed876f6972,2025-03-18T19:15:41.127000 CVE-2023-24063,0,0,91c0bd66efb4c4cc0ced958b18d29cddd5fbad4075264869aafe0b56f9fbcd24,2025-03-27T16:15:18.810000 CVE-2023-24064,0,0,7bdb354760226c2d2e74a93d79fcc6ec58b75f5bfa6556fb6667234425e37981,2024-08-19T19:04:26.627000 -CVE-2023-24065,0,0,cb099ee14dce3065aef0c7c9fe48e200772c06486a273cdfe68fcc3de01a35be,2024-11-21T07:47:21.830000 +CVE-2023-24065,0,1,69cfdf2458973d5b4d47f548667bd3d22b60e54c93653ef4a22c9899251dd6fb,2025-03-28T16:15:26.640000 CVE-2023-24068,0,0,2e516df1b4b1b39772e4e8d62fbb86f0faca45f73328ec51c080d671538a0830,2024-11-21T07:47:21.973000 CVE-2023-24069,0,0,81a8009b0b22b98c947d85c300ecd5c78146ee947647e31f35d100536fd0bfae,2024-11-21T07:47:22.200000 CVE-2023-2407,0,0,705817cabb12168e6445a8c22a885a979c3dcf89a4793f3af82096ac1cf0e4cf,2024-11-21T07:58:33.300000 @@ -219779,7 +219779,7 @@ CVE-2023-24528,0,0,711ea0df27e8bcc05461b62500aa392c0d8c19e065c710d842519b0170116 CVE-2023-24529,0,0,7aae9e7ae1d2e162aa697590599e7d0f425c0544d89a38a572d3b8ef723bda85,2024-11-21T07:48:03.890000 CVE-2023-2453,0,0,b4682b88f88afa2ebdcd456dc9795ff06061b8bff91c0bd4d2c1492887ecb51a,2024-11-21T07:58:38.753000 CVE-2023-24530,0,0,7ef676a634c8aba369f9683a0389e1bdb2255cfb96b6e799493b54b2b4a9416e,2024-11-21T07:48:04.043000 -CVE-2023-24531,0,0,b51c2dd327b8e15296fde49ea9eaeabb04a4dbd8bd91fd75e870ab4f55e86066,2024-11-21T07:48:04.190000 +CVE-2023-24531,0,1,6f60a5856c4729dc6a0d7d0c3f7ab189ffbe883041e194db4d7b9d7069bab294,2025-03-28T15:15:43.630000 CVE-2023-24532,0,0,88581f6b3392e74b951288a160bd414980d6e6f0465084eb25057ace37266e39,2024-11-21T07:48:04.383000 CVE-2023-24533,0,0,6648d1bdd94fa7bb91a5be3a6508c5c3313b2cbdedd755f8162815954988667d,2025-02-28T20:15:40.550000 CVE-2023-24534,0,0,3f190c9bf555ba8a80f7c40ca4f179383ac59048cc10bea8746879b358c59684,2025-02-12T18:15:19.837000 @@ -219860,14 +219860,14 @@ CVE-2023-24607,0,0,fcbccb62200552d55bc67a7a7c9180be7ac6ff617da4be510f254ee9b8252 CVE-2023-24609,0,0,425b5065ce3b98f0e73fcc1c781977c19247bf9d8fd5dcbf726c59468e33bcd3,2024-11-21T07:48:13.983000 CVE-2023-2461,0,0,be1487a1c15780c7bd238ec9dc5e462a75262a5204ae751a0e878b4cc2670d7d,2024-11-21T07:58:39.770000 CVE-2023-24610,0,0,85c4b00e7e542c95198ad6a387b66f29f1faa016bb608ff4e1e0b1ec775e3bdd,2025-03-27T15:15:45.970000 -CVE-2023-24612,0,0,ce37fa75c1fe49a6bbdd390f35fa49a1e9e49f0eaabf47997125799e6d936c76,2024-11-21T07:48:14.320000 +CVE-2023-24612,0,1,43f6416384afd118e9c2a0185d9f46e88fe07b1dc184d4576e91bd07f9669015,2025-03-28T16:15:26.820000 CVE-2023-24613,0,0,5ca1d43e4dd191a92da12be074e0cc6e498233454e6eb1b82569d8817e78b94c,2025-03-26T15:15:47.477000 CVE-2023-24619,0,0,487d3fc851d9a5041f94199c22b870ca0759791795e5c41a282f8e2947cbc2da,2025-03-21T18:15:31.523000 CVE-2023-2462,0,0,2e11f3528ed939f0220efc9a7daacc3f67d605017c175a72293b12bbbc9c06ff,2024-11-21T07:58:39.970000 CVE-2023-24620,0,0,3a3bc66320b549a4417001163bc5252914addae68831682c8e3b9eaa5826fb36,2024-11-21T07:48:14.763000 CVE-2023-24621,0,0,05389959742ec3278497f8c9309bd0abe76641449fdb280196a465b94d7bc800,2024-11-21T07:48:14.927000 -CVE-2023-24622,0,0,c066aa46ee63fbd74f051268e86dde35fde0e6bb5c6c60b992fae7fc835b9267,2024-11-21T07:48:15.090000 -CVE-2023-24623,0,0,33390f24adfdc7a5e62bed25c8eee7ece2e7dd3803d0d8ccb6bcdb0ca591df18,2024-11-21T07:48:15.237000 +CVE-2023-24622,0,1,6d0559ac5740e04bfbf91fe6866876b8f6063c78f5ef5dd08f55482aad8797ff,2025-03-28T15:15:43.787000 +CVE-2023-24623,0,1,39f50cfb55094479b5294f1d5a37d0d02bee4b0ef94805ff96fe72cdf0e337df,2025-03-28T15:15:43.963000 CVE-2023-24625,0,0,031358c3cce9ece3e30c39fd1b6a6435b4b4b6ec9c94eaf2c55f80be98ffa71c,2025-02-21T18:15:14.160000 CVE-2023-24626,0,0,f8c05a82508ace6da42ff99c3373707d59b1b90f2c4e5f8dccbbb2c862bb909b,2025-02-12T17:15:14.380000 CVE-2023-2463,0,0,f46badffb051b802c8d4c418e9ad13db7cd5c54b60cd8c2536b7f64dd0d44ee8,2024-11-21T07:58:40.123000 @@ -219988,7 +219988,7 @@ CVE-2023-24827,0,0,8f730733bac740ffbce69a40aba59d618897ba431266e38c3e5c0bab98ca7 CVE-2023-24828,0,0,43a52d219ab3488fd4b93e5ee1f724e169d8253d925a46e53a8393c11319f057,2024-11-21T07:48:28.647000 CVE-2023-24829,0,0,757ecc198ab5fad96b7d5c2ec9ddffa4cce0e57b8d000f4558a7faa7555bd85a,2025-03-27T18:17:25.100000 CVE-2023-2483,0,0,54a2a6fd22199954be9a4481c481dc39884bf44c2bb0745882c6504df8733a6f,2023-11-07T04:12:45.080000 -CVE-2023-24830,0,0,a2a788303d16b4bbe7066c1d165c4268fa176a7064789e7506e2f679a27e6d1b,2024-11-21T07:48:28.877000 +CVE-2023-24830,0,1,3b41ee51c90b22cc18f00324a95fe9eee6383f8e4b1fe1c8d865afb0405f29b7,2025-03-28T15:15:44.150000 CVE-2023-24831,0,0,d7949a9dd2d43d5627cd41a481e10331ded3e77c2336200ac5129910a4bd8ccf,2024-11-21T07:48:28.990000 CVE-2023-24832,0,0,caf4a483f2cb7c8fcdf75ef85a3c61dff115a7f19facb4a1cb945c56705d42cf,2025-01-21T21:15:09.160000 CVE-2023-24833,0,0,975e396f7c3efc181ab7fb3ab3c5840503ac5a70f5ce18fa48be1249aadb3e19,2025-01-21T21:15:09.350000 @@ -239044,11 +239044,11 @@ CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b CVE-2023-49539,0,0,fa31534f56545ea133b0ffca594c9cec771dfcd7a58fe43a64b5181a65ad6cb7,2024-11-21T08:33:30.410000 CVE-2023-49540,0,0,e1bbeead0d4c47048abd2a39187eb4c0af1ee24fb9641e708f014f21bbd6a369,2024-11-21T08:33:30.643000 CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000 -CVE-2023-49544,0,1,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000 -CVE-2023-49545,0,1,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000 -CVE-2023-49546,0,1,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000 -CVE-2023-49547,0,1,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000 -CVE-2023-49548,0,1,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000 +CVE-2023-49544,0,0,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000 +CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000 +CVE-2023-49546,0,0,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000 +CVE-2023-49547,0,0,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000 +CVE-2023-49548,0,0,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000 CVE-2023-49549,0,0,9a2cebaebaf97239f2bfd9173576257a692bf9d1d5d1560d13729dd131766317,2024-11-21T08:33:32.147000 CVE-2023-49550,0,0,90ae251e67635b7fa54b057d1493ed9eea320b49928086b9b51c17ca0a7c6b29,2024-11-21T08:33:32.297000 CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000 @@ -239373,15 +239373,15 @@ CVE-2023-49963,0,0,716a28f46de42a2e56dd2dbb762be5dc774690d8da0a8361cd05a453c1e45 CVE-2023-49964,0,0,68e81d9007921be61201b4b69446355cbaa46e44d19df4f8532af74e68f85bb0,2024-11-21T08:34:06 CVE-2023-49965,0,0,ef388bac4cc546bedef71999d058081ade12398c6f30adb285e66370d4c444b9,2025-03-27T17:15:41.540000 CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000 -CVE-2023-49968,0,1,97377596cdba5536ff0311c7d520808ab6dc15969b28250280847661805e1558,2025-03-28T14:32:27.133000 -CVE-2023-49969,0,1,b0aa2df24f015e2ec9dd6eaf374adcb2f950caeca313a4a225d569537ebe772a,2025-03-28T14:32:21.523000 +CVE-2023-49968,0,0,97377596cdba5536ff0311c7d520808ab6dc15969b28250280847661805e1558,2025-03-28T14:32:27.133000 +CVE-2023-49969,0,0,b0aa2df24f015e2ec9dd6eaf374adcb2f950caeca313a4a225d569537ebe772a,2025-03-28T14:32:21.523000 CVE-2023-4997,0,0,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000 -CVE-2023-49970,0,1,554f580e23ae19185eca0545f17817222c5a39acf2827ea39ca7f2b008b86908,2025-03-28T14:32:11.623000 +CVE-2023-49970,0,0,554f580e23ae19185eca0545f17817222c5a39acf2827ea39ca7f2b008b86908,2025-03-28T14:32:11.623000 CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000 CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000 -CVE-2023-49974,0,1,348ee359439081d72ce9187bf69627ba1126d6b681312b67518b561274e51026,2025-03-28T14:35:30.683000 -CVE-2023-49976,0,1,7842662c4b0af2daa6730e8628313d9027337d2060a5820d0de30539d035a521,2025-03-28T14:35:34.803000 -CVE-2023-49977,0,1,b7af45a0db923330a861cac6d351021b003f94dac16375865374f3de5ce43d3d,2025-03-28T14:35:38.520000 +CVE-2023-49974,0,0,348ee359439081d72ce9187bf69627ba1126d6b681312b67518b561274e51026,2025-03-28T14:35:30.683000 +CVE-2023-49976,0,0,7842662c4b0af2daa6730e8628313d9027337d2060a5820d0de30539d035a521,2025-03-28T14:35:34.803000 +CVE-2023-49977,0,0,b7af45a0db923330a861cac6d351021b003f94dac16375865374f3de5ce43d3d,2025-03-28T14:35:38.520000 CVE-2023-49978,0,0,fa500e23f48da6df2a860b98eda481781ba05e9f7f13de0b425bad34116a5f73,2025-03-05T18:51:00.240000 CVE-2023-49979,0,0,75f23943a375ce8279e3286ef1840c70cb95a9e90cf00813fe39f1dd23977277,2025-03-05T18:51:45.150000 CVE-2023-4998,0,0,e165eb9587ade3f2685138122c6908d08aa666717671177d785c6c36e56a4e40,2025-02-11T02:15:32.447000 @@ -240145,7 +240145,7 @@ CVE-2023-5126,0,0,9ada6a8f2e9b9491a8fe3f4eeafb2a31d386842291921479a06d9dd8a73add CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130e0,2024-11-21T08:41:06.983000 CVE-2023-51277,0,0,ab81eaea8de114fbc99d2d9587fb99b0e511144ce0a98dd0d340bbd095f06374,2024-11-21T08:37:56.290000 CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000 -CVE-2023-51281,0,1,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000 +CVE-2023-51281,0,0,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000 CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 CVE-2023-51293,0,0,572ed6a446805f6a16a7884a5b142aaa064f4477ce8cda8bdc3dc8fa68963f57,2025-02-20T16:15:34.460000 @@ -241623,11 +241623,11 @@ CVE-2023-52928,0,0,b6d1e170ab6b9a1d89619faad3623a2192246996bcad7b2f08195be8e1a4b CVE-2023-52929,0,0,3d93e8db817e6afc68e68109399530a663cdffb38d7c35b1b3ad0b893f452347,2025-03-27T17:15:42.353000 CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000 CVE-2023-52930,0,0,7791df57d22b8264796ac5cd6d676e2efe506a777a2de3b86ddc88649835c511,2025-03-27T17:15:42.477000 -CVE-2023-52931,0,0,43498402483dcb8b2bfc9de061f1281cf84fed29d25cea98c8a368008e8ce11a,2025-03-27T17:15:42.800000 +CVE-2023-52931,0,1,6023213dfcc17cd36459559c882b1c1dd68264235cf609ea6f406331c5233b1f,2025-03-28T16:15:27.013000 CVE-2023-52932,0,0,31b94b5efee31e07f9d39a5269b242a5b788e4c664f9e596c421716d12e2d2ab,2025-03-27T17:15:42.930000 CVE-2023-52933,0,0,91317a1a8bd8d5a0e442b8d89cbe595ae93bf1c7b67b21ef05d54c7d6dd13b44,2025-03-27T17:15:43.063000 CVE-2023-52934,0,0,622e77329d5435b0653f5a8f560206e3ebf65bab1487f792c983ac25d531952f,2025-03-27T17:15:43.207000 -CVE-2023-52935,0,0,73ff48519ea6e9bd61a239f2a8a23ba2739bd95fbf504d7111a517f1f3cfd111,2025-03-27T17:15:43.330000 +CVE-2023-52935,0,1,2a466ee7194bb32131f14ea1f0dbdd14c6eecc7744ce198416f83b35d6a81e62,2025-03-28T16:15:27.180000 CVE-2023-52936,0,0,95b12fa00acdb5a115949fe570726a54b77f6830147acd6bc729fcaf54329989,2025-03-27T17:15:43.450000 CVE-2023-52937,0,0,46c39849dbb71683675077522bb1fe92fb0b33f30fbc2c37c6a2fb7054679004,2025-03-27T17:15:43.577000 CVE-2023-52938,0,0,2d56eaed33aad4436d5eb3d11a04f84436a7e7fa50bd9869f82a88c05fa41687,2025-03-27T17:15:43.687000 @@ -241688,7 +241688,7 @@ CVE-2023-5300,0,0,eada94012fd708691ea3792cf6b054b3ad0de381a1556cd7e6c92c322c4e2e CVE-2023-53000,0,0,3c0cd761098fd6674115ee83edb37b1a3b1bb72c0393526e8823de7246df939a,2025-03-27T17:15:48.810000 CVE-2023-53001,0,0,069414a508ab78120cec72fb95d3d5d8b666b134713f4f4fff351e686addd6e3,2025-03-27T17:15:48.927000 CVE-2023-53002,0,0,bb67faa3f18f4c01a97d0e82fc6be679831c20c0cbe629fccf8f16c8eda9c942,2025-03-27T17:15:49.050000 -CVE-2023-53003,0,0,8477eadab90bf54147878c2b99d55da4adec83e6fe5dc79a32d95df28700e5d0,2025-03-27T17:15:49.170000 +CVE-2023-53003,0,1,ce4c02d54d4b74d10f889496b149231e6babd57397a676951d4fa860122fca8f,2025-03-28T16:15:27.340000 CVE-2023-53004,0,0,19ff2cf93584b5b6a78da4ded212948a2f6f855fa3fb89568492a1a569fa37bf,2025-03-27T17:15:49.307000 CVE-2023-53005,0,0,7c9d3bf074339f7b3b76e341fdadc901ae6f3875b3f6d7f1c7e1a6767667bdf4,2025-03-27T17:15:49.420000 CVE-2023-53006,0,0,63302919eabc0944262edc4c553b19d39e5f5dc0433392ca6a521f914721f1b8,2025-03-27T17:15:49.543000 @@ -243569,7 +243569,7 @@ CVE-2024-0037,0,0,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05 CVE-2024-0038,0,0,baee8527daa9fa065a043ee87cb5ae43b4d4acd906f6069ea7197faff9b6110c,2024-12-16T19:02:43.323000 CVE-2024-0039,0,0,abfbbbb69ca94190c6c5a5331ed6878ccd6fd34c98f0bf9365113718b0747cb2,2025-03-13T19:15:40.940000 CVE-2024-0040,0,0,482e23ff76f3327407e40e3d508d01e97e22ee3b05630d7571f0b9bc84b62862,2024-12-16T19:16:31.127000 -CVE-2024-0041,0,0,30f391e32967bb0baf25d8a5436bac2e10d105d6b34926d3751c53b398bda865,2024-12-16T14:47:50.477000 +CVE-2024-0041,0,1,300bcc6d1896f6ea043184e372af29b6bca681f501ce10670683044877304be7,2025-03-28T16:15:27.517000 CVE-2024-0042,0,0,7265bcce4e87025566b81559e9a2a904d94427e17ed2d8159b49b70351e50b78,2024-12-17T16:47:02.183000 CVE-2024-0043,0,0,9c5415d367b2b00fbb658ba49909a69019febd5394910268036d8c799fd4ab53,2024-12-17T16:47:21.967000 CVE-2024-0044,0,0,390eee44c5719eb873a39ca1024261a0f80c6eacd2c165a8bb8bd19adf315b80,2025-01-28T20:15:30.207000 @@ -244376,7 +244376,7 @@ CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000 CVE-2024-0902,0,0,e5c0bb07183b8e8ea4fd2c82afa13d6b327e88a61d78f9e115d171da58ecf313,2025-03-26T21:15:21.037000 CVE-2024-0903,0,0,5bd10efc0a81076e6dcfdb52608d45c3ac855afff6ca0448ee1a48050ad1a1bd,2025-02-05T17:42:03.150000 -CVE-2024-0904,0,0,45daa3dbc580b949bca4e58eb311d6c298c2232cb68c307457b71e82318860c0,2024-11-21T08:47:40.290000 +CVE-2024-0904,0,1,f6f2dface0fc99cba17c1738c7ee6dc5f4f1df1af5d8a74cf0fd946b4d0d6eb7,2025-03-28T16:15:27.737000 CVE-2024-0905,0,0,60c2a3fa899fcc1baf7ef2a8fb1eb0ba21e33e967f759165b74dea3036464f8e,2024-11-21T08:47:40.503000 CVE-2024-0906,0,0,b560aa75cc11a08ab9bae11619e6dc3e28ea0827998e95e1f1f5e2b9362fbfc5,2025-03-13T01:22:21.293000 CVE-2024-0907,0,0,80ce163e8f6522eafa09b16e328ae6a26d722bbfd36eb6494359f0687a798e67,2025-01-15T17:20:49.153000 @@ -245118,7 +245118,7 @@ CVE-2024-10666,0,0,49bf1c01a7a40d59a213466d88a395d5e2ef5e66732ceed7fef597c7d0ebb CVE-2024-10667,0,0,678bf083c89c7ad05bf9bdcb575b9b9fdecc02dbedf8c91a13e006db67595539,2024-11-12T13:56:24.513000 CVE-2024-10668,0,0,93cbbf53783e16fa0a9d8a3b30d47fcdc6406d426c60c5d4265b9af3c5cd40c8,2024-11-08T19:01:03.880000 CVE-2024-10669,0,0,fb44b1243a144b1dffb90ec9fe140819e957513cdc69a368b2a19c2a439fcfb4,2024-11-12T13:56:24.513000 -CVE-2024-1067,0,0,23462754aaea9bc16ffcf18a32d74989744681f4619dcc72667b9405c467e563,2025-03-27T15:15:48.533000 +CVE-2024-1067,0,1,170d3ee34baabec8cd796fb4b256e5279d80b07377f017805a48ac07309cfff7,2025-03-28T16:24:03.043000 CVE-2024-10670,0,0,fc4dc2f92f41a32f5830ad7ce6a6ea6300359395964e63c0636a1c1b5312f505,2024-11-28T10:15:04.987000 CVE-2024-10671,0,0,06cf170e7e09d10891696c258d1d2ab3f3b0d3a88e2826c32f8b9ea1ac747db2,2025-02-27T21:39:15.790000 CVE-2024-10672,0,0,038616dbdf9b791477ee35e1c0e0d65b1608f7b4ce47df77f94b07306e965f3c,2024-11-14T18:49:26.733000 @@ -245947,7 +245947,7 @@ CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155 CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000 CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000 CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000 -CVE-2024-11504,1,1,2d88e5e7be479df873d338e951bab20c84937b0425549a8c20401e5aaf19ae80,2025-03-28T13:15:39.663000 +CVE-2024-11504,0,0,2d88e5e7be479df873d338e951bab20c84937b0425549a8c20401e5aaf19ae80,2025-03-28T13:15:39.663000 CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000 CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000 CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000 @@ -246067,7 +246067,7 @@ CVE-2024-11618,0,0,0e3a6f9f43124700db03eb1b663dd8529795046f0f664ad17bec9e799f8ac CVE-2024-11619,0,0,199afb7118552bdb4d05394f3b278f423ca0e36121b2f9801d8d56e20db43382,2024-11-22T21:15:17.500000 CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000 CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000 -CVE-2024-11621,0,0,b329e79916cee7e61bce0b4c4fc0f8c914ac36e6f0c6fffb8c59ef58794213eb,2025-02-10T16:15:36.937000 +CVE-2024-11621,0,1,b716cf6b4803ca216c4e81796276990cde1870fd08da47681aad36842a97ea71,2025-03-28T16:20:47.230000 CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000 CVE-2024-11623,0,0,345d50a6159ad332bf74d1f96fee6efc06141172f84c2187cf001be392bba81a,2025-02-04T14:15:30.480000 CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 @@ -246121,9 +246121,9 @@ CVE-2024-11667,0,0,d49984260edd35324ade252d16fec5f82013df20426b06aae02e4e32d5501 CVE-2024-11668,0,0,951435f777624adb56d5c11f0805bf2011a10a2c13f46ff08847d8ceb122c0cf,2024-12-12T21:42:07.607000 CVE-2024-11669,0,0,ac5ab35209eeafc67a9dc11e753687674b6fd098af988beaa09e6cf26c867fa1,2024-12-12T21:11:00.737000 CVE-2024-1167,0,0,305374f1d68abba26470a704fb70617e13ceb2e36f31540f4607dc864f81e0e0,2024-11-21T08:49:56.880000 -CVE-2024-11670,0,0,de64fe94b2cd253689c66cb91ad0cd7fb28b5eb208230d56c5477bd17ea489cb,2024-11-25T16:15:12.173000 -CVE-2024-11671,0,0,eb17c618d92fcee412dbbeb034b7c16ae8e65659bedd5ba21c4d072fad7e5dca,2024-11-25T17:15:11.930000 -CVE-2024-11672,0,0,bf46558436febe8820ce5316caa86f0ac93f619fe18c6a235420f3102399170a,2024-11-25T17:15:12.110000 +CVE-2024-11670,0,1,6719fcdd75d861dee74534df3d79a8b705a494c116f8eba5975b3fb08eb1d864,2025-03-28T16:22:03.903000 +CVE-2024-11671,0,1,f79cddbef5cf70c954b58f32ce9cb315934ede2b37af192e57815715324c2257,2025-03-28T16:21:57.537000 +CVE-2024-11672,0,1,d34ca615eacd14e52f26bb63375746506f57b350da43521a6ef6d66a75e498dd,2025-03-28T16:21:52.263000 CVE-2024-11673,0,0,0d00d4d39b53a8278b1de3de8092c22108c327ee83acb79cd6542488ef159a5e,2024-12-04T20:10:53.617000 CVE-2024-11674,0,0,b99e67536e775612f00c93fb9f7c72cd8676a407cdf947c51a3b5c576cc735d5,2024-12-04T19:35:52.697000 CVE-2024-11675,0,0,3307440f3fbc1d0020addd10cbdefb08c2908e3f9d73aa5c6b8271db5c084b9c,2024-12-04T20:15:39.110000 @@ -246601,10 +246601,10 @@ CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408 CVE-2024-12144,0,0,5ad374ae161b81c02dd52fa717a7d20838d0374ff8a2c01287b8a69e49581cb1,2025-03-06T14:15:35.297000 CVE-2024-12146,0,0,94e303002d6bd6731794caf755e131a26c106cb9795464278d57fb494be8940d,2025-03-06T15:15:15.137000 CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000 -CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 -CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000 +CVE-2024-12148,0,1,16e949e4c0812a2d78a8443d5ae4b5d79a9a13cdd58307868257c2ae017b92e5,2025-03-28T16:22:20.900000 +CVE-2024-12149,0,1,a83993a4e2ca147f0b32ff65add4dc0ab0b5074a07c8437da6cd01b3bb0a535d,2025-03-28T16:21:47.753000 CVE-2024-1215,0,0,4329416f300d2c475797311e08de13347ae9dc69f951944050207e3d4abf36b5,2024-11-21T08:50:03.560000 -CVE-2024-12151,0,0,958cd3e076f1ea17ca0ad827def723dfad6dc87ee6b3f8172337cf6f1994be20,2024-12-05T19:15:07.773000 +CVE-2024-12151,0,1,e8d13992532d4961aa37d540eb10e8db5aced703c7e96584b766e12d7b5a1d81,2025-03-28T16:22:18.057000 CVE-2024-12152,0,0,5a1d4d7f0aa379bbbfc5c795af6f48efa7d2c7af7b58f75617e710a6121e79b8,2025-01-07T10:15:06.577000 CVE-2024-12153,0,0,ee8fdb07044f47e63da8bef3775a8e8b6e3c5cfbf491a775b0902d77fe82a75e,2025-01-07T05:15:14.927000 CVE-2024-12155,0,0,a9bad28298e0ff298ba13b998a693d2b1a968d7ec52abbb9a976f5fdc4810431,2024-12-06T09:15:08.417000 @@ -246650,7 +246650,7 @@ CVE-2024-12192,0,0,0a29f7559d21fa1227318f7f3dd3f9a93d503d8f394ecef90429464dd2f95 CVE-2024-12193,0,0,7e0eccdf2f5215d62c837f8197a84447bdb2e4fea9aa46ebfa91ed1dfc673a1e,2025-02-10T21:15:16.483000 CVE-2024-12194,0,0,69feab87364cc89565f3dd964ae57489f5b3238977846a656dc7e5c80491236f,2025-01-29T17:15:27.590000 CVE-2024-12195,0,0,42de4954f88d78277d068242b43ff46a49abd4e0966e9a8a6c1cda915a565bb3,2025-02-05T16:50:05.270000 -CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000 +CVE-2024-12196,0,1,a2eeaa964232e90bac8cb947a50e1956c1c9243acbc57644deb089f152d8d7ad,2025-03-28T16:22:14.803000 CVE-2024-12197,0,0,a991ed72580cfd4b38e90f0a4c77bf80911efe3d113b3ef2ac31717c62ea91e3,2025-02-10T21:15:16.587000 CVE-2024-12198,0,0,c209536c0ad6829b7f8711360506c4544aa031e11b77e25c1551e1f35b2f09cd,2025-02-10T21:15:16.683000 CVE-2024-12199,0,0,7276b0adf8d6dd5f8bc47ae2cf0e61c646ca073d344509518492123f3f4bee27,2025-02-10T21:15:16.790000 @@ -246789,7 +246789,7 @@ CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4db CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000 CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000 CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000 -CVE-2024-12336,0,1,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000 +CVE-2024-12336,0,0,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000 CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000 CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000 CVE-2024-12339,0,0,3eb83436990555e2815b093662c73c0abac18956e62294ddc11370b3651631b5,2025-02-19T08:15:13.907000 @@ -247393,12 +247393,12 @@ CVE-2024-12965,0,0,da8c6ab28cc2b34137be07155a862e7bf1f082dc2ba9f4a6760e921794d49 CVE-2024-12966,0,0,c2b788294439f0bd0f3bb8909eb1d3a1c2116e47ff310cc9b143408ca5228aef,2024-12-27T17:15:07.733000 CVE-2024-12967,0,0,5895d3ef9d4ecd62d5689ac4ca7745f936872ccc81d8e05395b0655899467c3b,2024-12-30T15:15:08.143000 CVE-2024-12968,0,0,352f3215ed40719a7a3c8fe635fe1584f3733d062304c5ff3d490633f369371a,2024-12-27T17:15:07.867000 -CVE-2024-12969,0,0,96938b98061df41a07f7d7458298190ea191c6a72f4ab846d1adca80ab0a48d2,2024-12-27T17:15:07.993000 +CVE-2024-12969,0,1,1f11b9374a66d1fb16358186560d12b2caedd2691b31d066e1c4e0c7097ca3c7,2025-03-28T16:59:21.010000 CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 CVE-2024-12971,0,0,c2c5c3fe38e87deb07976a7e25dd1dc1fe90714181112bc7a4543d9c7913a870,2025-03-17T10:15:14.797000 CVE-2024-12975,0,0,d2fcfd8a6ee09a057f1e63cdb3bd18d308081cd2bf8b6a1de24fe3b24c862cd2,2025-03-07T17:15:18.263000 -CVE-2024-12976,0,0,a7896141b08b975c59cc02fb56de4b5b8fb1f07cc8194762ff5a1f544ab3be60,2024-12-27T19:15:08 +CVE-2024-12976,0,1,d338d7730077b4e2e2cb08ffc6b8698552ff9ed3642a985c41ffc4b5f2d8ab94,2025-03-28T16:46:04.210000 CVE-2024-12977,0,0,a3d393b71af82518afafbd1c679660f25331ee3d2ea0704ebcda5ffbe8610a8d,2024-12-27T19:15:08.130000 CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa3fc,2025-02-18T18:51:08.940000 CVE-2024-12979,0,0,ae24db0e4f2a66f4e1de36af93143ab82962ea0c4d3e66e74916a1e08a75a73b,2025-02-18T18:50:22.963000 @@ -247406,7 +247406,7 @@ CVE-2024-1298,0,0,0071f245b4c3dcfe4cd2c1a3c0fb04eecaf156fffcc1dcce4f925fa8cede47 CVE-2024-12980,0,0,6000ffa079d16649502ca9127ef4a551b968e4d7369085deb6f16c832355001b,2025-02-18T18:49:54.517000 CVE-2024-12981,0,0,ffddc97766707b80fc85f7b3ff8a42f8a8881f710bf091525d28a760073377ad,2025-03-05T18:42:42.580000 CVE-2024-12982,0,0,e7fb56a3ab6559658c6d7a80dd35f9732df0dd37c08bc66d7cc5ed7d2da0d409,2024-12-27T16:15:23.540000 -CVE-2024-12983,0,0,f0f1274b31531cd87e4ac88beea7a68c21418dc0cc88382516efb32282ea81e5,2024-12-27T16:15:23.683000 +CVE-2024-12983,0,1,40fdd11d916f5e2224d090f9a6008ba93589e46cd23030a88b2e718a361982b4,2025-03-28T16:44:14.160000 CVE-2024-12984,0,0,2f1f6d47358f5bf062b046e597be4abadb2d2163986aa69703e28be2bc64f2f0,2024-12-27T15:15:11.957000 CVE-2024-12985,0,0,d4a76a2362f1758d86bddad7f928601739b4725522b1084e160f0600dff7746c,2024-12-27T16:15:23.807000 CVE-2024-12986,0,0,7dd3f2d726dcb5a458fc7b91b18601177f669d7d46611c5cd80f422704f659a7,2024-12-30T15:15:08.390000 @@ -247922,7 +247922,7 @@ CVE-2024-13493,0,0,42ff21ae6aacbec92978e0ea28bdc61ddb564d9f2d81f25e9d1e5dfa73ff8 CVE-2024-13494,0,0,bede3e10bcdce16bee9938d3ecfa7092e216537a6cbcb1d2c48a7a5ce0afd5fd,2025-02-28T01:45:06.390000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,ca4235722eb0c1b0c268a8bd76cbfc815627bfc3542c099f00d4dcb1d8de6fe1,2025-03-24T16:15:17.677000 -CVE-2024-13497,0,0,da2b34d3e4d3b61573ec8f37b148644657fc3757f1bd2d1efa920af58f1069b6,2025-03-15T05:15:45.713000 +CVE-2024-13497,0,1,7e5f1faf09475917f5ba6a8212d92ad65e7d109bfb67898560962e2f63abf3e9,2025-03-28T15:22:59.280000 CVE-2024-13498,0,0,b5de2876eaa7badfb1de048e1b1406951067b1c844c8c3988a0993e0d4b2c048,2025-03-12T06:15:21.360000 CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 @@ -248187,8 +248187,8 @@ CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000 CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000 CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000 -CVE-2024-13771,0,0,949738633d703300748648fb69f661517bd96978bb56c94eead1be99afb2462f,2025-03-27T01:27:47.273000 -CVE-2024-13772,0,0,e18724330a936d4d790bad539c0685998ca571e65ae4da14273706ffc70edac4,2025-03-27T01:22:24.920000 +CVE-2024-13771,0,1,78dfb02d91ca05c22b83526f5bd3a521e54cc499bf63c37fe482b93e99d97dd3,2025-03-28T16:18:52.857000 +CVE-2024-13772,0,1,1d5961251148beac7ef936803d48aea86b346d1b5b12d83fc965e64f4e204bde,2025-03-28T16:19:00.850000 CVE-2024-13773,0,0,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000 CVE-2024-13774,0,0,7926f46cbbe245fc4b69a913b305cdf8d086f57fe42cd5293333d393cb9ec93a,2025-03-12T17:01:06.413000 CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000 @@ -248326,7 +248326,7 @@ CVE-2024-13923,0,0,a528ee5b51622639984378ce5c82c5f3996bc4ee38135a9723b678cb2485b CVE-2024-13924,0,0,6771f2a575eb9b234ba437c9c60a2d5807f8aded376287df6e1ca4c3782207e4,2025-03-12T16:23:39.567000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 CVE-2024-13933,0,0,6c1d1592227807572b59c7607e13d58cd1b568936f1ec0b9bb42956c7610a4b0,2025-03-19T12:15:14.003000 -CVE-2024-13939,0,0,9095ab11c8403140c63d606d75e5bbd0f4652ec635cba4d1445fca7f23b40b58,2025-03-28T03:15:15.720000 +CVE-2024-13939,0,1,38d580b9d85dd0c996da33a34ded1f6d0701bf667118050526eef3a9b842f5c1,2025-03-28T15:15:44.340000 CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000 CVE-2024-1395,0,0,ed536711b27a260dcabc83b13b40c152f8095e7ae0057538c9212759790c4e88,2025-03-27T17:07:28.860000 CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000 @@ -248511,7 +248511,7 @@ CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e CVE-2024-1585,0,0,71ae3df5898ed1d800d67a7dfb8fb2405deb4fb1f3280ed74a24204758d911c6,2025-03-05T19:19:46.430000 CVE-2024-1586,0,0,d57c818aba605692857b8a35b32d1b940effc9e4cce5f547504161c2949193b3,2025-03-04T12:36:37.443000 CVE-2024-1587,0,0,a9ac802b0d54a903a0bf85abcc1262ce1879d4e5c364dccacbaa8e6bba3919e3,2025-02-26T19:15:20.073000 -CVE-2024-1588,0,0,e155d43c506fceff5742262863e16ba18d051d3214971949c228605f64495c11,2025-03-27T16:15:21.190000 +CVE-2024-1588,0,1,a1aa523f4dcf5313914b401109afe06ae5b407d4667f0ad12f7a9b5c3e0bdccd,2025-03-28T16:18:52.937000 CVE-2024-1589,0,0,3828cec5ba897ab5ce440048677ac8f1e63575e630c777982dc0f31348db94ab,2025-03-24T17:19:10.643000 CVE-2024-1590,0,0,6d9b04d7b981210b45fa2f9cd9264abc183d984b67f454db5f762b263d057df6,2025-01-28T17:32:02.713000 CVE-2024-1591,0,0,47a6e7f965ad05e89026d1d1c7b51b4fbd3e2a179c0283326c20740ee574740d,2025-02-07T15:07:53.133000 @@ -248673,7 +248673,7 @@ CVE-2024-1760,0,0,f99a8273390511ad1054b3ffd59fbe5d1b1fda332a65d7f44aac5e257eb729 CVE-2024-1761,0,0,696b99dd7b537aa0c1eec44716a7fae7b7ea27081267dea188c31272ed5a2bff,2025-01-21T16:53:47.587000 CVE-2024-1762,0,0,fe2beae86ebf429743526632269b9e47ac722f6147b2c8ea526e0fa203619a09,2025-02-07T17:47:17.933000 CVE-2024-1763,0,0,8012c9da585ee6f917a9409a9833d6a11a3350a300f66a5f7f8d81c0e859cb09,2025-03-20T11:05:42.940000 -CVE-2024-1764,0,0,9af00bc3a2cdec19cf0cc3ce6677a0f4b515b26edef4b60b7c6a5e9330153847,2024-12-04T16:15:24.527000 +CVE-2024-1764,0,1,fb5950e9c2eb3377549da03b033a5389af3ad3394da3193aba65d703dceaadb1,2025-03-28T16:21:19.423000 CVE-2024-1765,0,0,59c91913d171a81fb5475f94729055825298c4825c2c1c89296f006dcdad04bf,2024-11-21T08:51:15.800000 CVE-2024-1766,0,0,26479150659cd3f5df7acd169ad3dd6cdc1c4baea7cebb71839a8afc07aec3fe,2025-03-21T19:16:28.867000 CVE-2024-1767,0,0,baef958abb8d02ce0e77d39e5455301fda321cb3c7dbc1f62e744892ba3db05e,2025-02-04T15:37:30.920000 @@ -248805,8 +248805,8 @@ CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1e CVE-2024-1897,0,0,67d87c13c5ecef27a8c7d05c9fe60fa40e1af48fc634d9ba72f95351d0f4bc02,2024-11-21T08:51:33.080000 CVE-2024-1898,0,0,0c4d43c4434078b331d9877a59f5107e1cb59b494a30bef57836c972a47b5072,2025-03-14T01:15:38.407000 CVE-2024-1899,0,0,40fb5e76195a966ed2f9c2f9f806f40458f96148e21a41dc2acf991f4cece812,2024-11-21T08:51:33.317000 -CVE-2024-1900,0,0,f881fab7684a20d971b8a8aa44c738635846f8721e30624ba500440528156b1c,2024-11-21T08:51:33.443000 -CVE-2024-1901,0,0,7c912c9d925cface47b3667a73bd4854a08825c4b20741b5a200d0c51e0913f0,2024-11-21T08:51:33.640000 +CVE-2024-1900,0,1,d1681c8fc7d747108f96463045705a997eaa303af36b5fd18ab38aeae53b44ef,2025-03-28T16:21:15.220000 +CVE-2024-1901,0,1,ae2fb4d0db49c6bcf89bd1aeb69356a186cfc08c0bf34e22c5fc2117de6eeaf2,2025-03-28T16:21:10.993000 CVE-2024-1902,0,0,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000 CVE-2024-1904,0,0,0cf7723d0c62c6cd3e75c38e78ad1d2cd4227a97de5199b013cae16deb74248f,2025-01-17T19:22:36.853000 CVE-2024-1905,0,0,89e66388bf72309fd4ff9726e625980aab39e8c33d56a042fc26e7a64fb92fc5,2025-03-26T21:15:21.247000 @@ -249411,7 +249411,7 @@ CVE-2024-20669,0,0,e9e909c338c3f6d515442e4d445e3a02212d4fc594d9699a0b3917f3c8d67 CVE-2024-2067,0,0,a8dd550ece8b530902e09df7b88d39ff1486ad5078a91ac1575702e5d89e4adb,2024-12-17T22:01:09.097000 CVE-2024-20670,0,0,585ab2f9f4843a9d7fddbf140b5162ed21e06a237c2d5478d83c0131d7d6314f,2025-01-08T16:39:28.907000 CVE-2024-20671,0,0,05842bec816e55e8fba59dc3be4b73e3fddc9d445a481c66095c6d4ca70ce591,2024-11-29T20:40:08.810000 -CVE-2024-20672,0,0,b42d47318baedd22eca2ae203d33888d0d8e37dc0227cbd8b4ac4691899ee26f,2024-11-21T08:52:53.400000 +CVE-2024-20672,0,1,ceb717e000b6d6a2b0621eb1030ced909ad7aa7a5f8f61d1155c72ec89d251e6,2025-03-28T15:15:44.500000 CVE-2024-20673,0,0,fb73b13062c5207c25f7e883414ec699f189c49690bc7cdc168f811729cd8889,2024-11-21T08:52:53.537000 CVE-2024-20674,0,0,f8ff37061fb270c4cbded711edeb5d64081234a2635d28ed6828a4c60f65c5c9,2024-11-21T08:52:53.683000 CVE-2024-20675,0,0,d93607b8445df9ad9ce9cea41429312530fbb5a444732bf71a2474f624533a9a,2024-11-21T08:52:53.853000 @@ -253974,7 +253974,7 @@ CVE-2024-26559,0,0,77579a317422b2517728ee5978bc7ec2f8eaf2102b599e2c765a82e7b7847 CVE-2024-2656,0,0,0150174a8d94793dc5719eb8a7fb2483210b97f82e6c22dd3e08575727c15d9e,2024-11-21T09:10:13.570000 CVE-2024-26566,0,0,17fcdac1abfd469cf3ffd2a7711c92e40eda453c6c83e0105c8a9c787273b557,2024-11-21T09:02:33.860000 CVE-2024-2657,0,0,0a4026599cc8f564da68adf5d96fb16ac5a93f2d83477b37500b3fcf5ca350a2,2024-11-21T09:10:13.690000 -CVE-2024-26574,0,0,c9911895eba0376ea8a04813b72831a135e34cb8219fef4dc4368d52d0492aa2,2024-11-21T09:02:34.080000 +CVE-2024-26574,0,1,d8484fffe1ac66eaa08d2d0a38d7c9a16ef8ac040214b6d45272c794bd8cae33,2025-03-28T16:01:24.697000 CVE-2024-26577,0,0,b31cfe48a896bbe0069a91709f0e0fcdcc1053cc2c31cf21b6fc4d7e6e447649,2024-11-21T09:02:34.307000 CVE-2024-26578,0,0,b3a8ead68e9b1ae0b466e127a1444d13593e44647cd1512e86348375ea067826,2025-03-20T20:15:31.513000 CVE-2024-26579,0,0,1c35c589175a4e8dc59e6d8cbac9747722f5ae8a50d039abb97019d9ad4bc75a,2025-02-13T18:17:19.517000 @@ -254046,7 +254046,7 @@ CVE-2024-26638,0,0,2a4f3bb20e2caf97372f08747b14f0f756a5e78cfc68f64b38dd4fc85a147 CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000 CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000 CVE-2024-26640,0,0,92616912f090b40ff68ef6c67c1229e9dbb48d65cc55494bdcfa16aef14d191f,2025-03-10T17:01:43.500000 -CVE-2024-26641,0,0,10c28089baedfd2d8b601c97aba159dc1eba346b5a6100553e6f40db239cd422,2025-03-10T16:59:54.610000 +CVE-2024-26641,0,1,6fc98682350855583f4aed86c2b4df02c8720a1347414ecf2096fcabbb4dcd8a,2025-03-28T16:17:08.557000 CVE-2024-26642,0,0,eacd4ff479b39c2b25a02a522a2b3ec84673f2bba8fab6c27cbe88f0970e2322,2025-03-13T21:20:08.647000 CVE-2024-26643,0,0,381435a1915721f5e392cc3aea148501afeee0f5cc10c03df1f341443e25405c,2025-03-13T21:20:19.930000 CVE-2024-26644,0,0,cea9a7e4803c79d4d81c182e1c7e8b487ebc56704470714078d61743c1187477,2025-03-17T15:20:20.027000 @@ -254945,8 +254945,8 @@ CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b79432618 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 CVE-2024-2754,0,0,3c146feabec526a8d57153969ca10ec7861e0891282d7465bc0903e40372f4e2,2025-02-18T16:56:54.550000 -CVE-2024-27558,0,1,5761ec9fdce6ef2e5e63b6775d933b83bee2438c99df0ca7e9c1f4893296dc22,2025-03-28T14:09:20.343000 -CVE-2024-27559,0,1,ae8f360ea3bfb9b14662fbb3b1eacc93b9bb3567ce84bd5abdf4e632b00e9db4,2025-03-28T14:26:01.253000 +CVE-2024-27558,0,0,5761ec9fdce6ef2e5e63b6775d933b83bee2438c99df0ca7e9c1f4893296dc22,2025-03-28T14:09:20.343000 +CVE-2024-27559,0,0,ae8f360ea3bfb9b14662fbb3b1eacc93b9bb3567ce84bd5abdf4e632b00e9db4,2025-03-28T14:26:01.253000 CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000 CVE-2024-27561,0,0,fc16f92d17651bc7c1c4e9050d562b06f5135d4a3f335b425cd240bae1399bcf,2025-01-21T15:08:34.140000 CVE-2024-27563,0,0,5533c243cccd53d02317f51d488d5c114a766a4a03a83659e29f733a18ae8237,2025-01-21T15:08:45.213000 @@ -254976,9 +254976,9 @@ CVE-2024-27613,0,0,fe390c84da4aac8c6d02587e863de3f07e44d807a70688990b49160a9fcd5 CVE-2024-27619,0,0,16934e9e1cea809cb9988000431d38604c3c6a4209c13c6a2741025d227a9a76,2024-11-21T09:04:48.367000 CVE-2024-2762,0,0,d472cc555d8a3de21ab30459fbc5365112c81a098a9ea85d9c354892bec69842,2024-11-21T09:10:27.607000 CVE-2024-27620,0,0,9d93a7995af700d2b5f47649a5a324bcc1220340d6f2f847a3ffbdc29a8325bd,2024-11-21T09:04:48.600000 -CVE-2024-27622,0,0,7e6bbf556aa75d48d688825538873f3e9f5345a7685bf80c7b908a680a32b3ff,2024-11-21T09:04:48.827000 -CVE-2024-27623,0,0,75b2ee33202636d29e2457755d9050c966fd7c9e2b10f99b81b27a365a949df9,2024-11-21T09:04:49.047000 -CVE-2024-27625,0,0,7c150d2f8dc1b9688fc881fd20ec6f3d11b62f100e993066e42db1cf5787b3e2,2024-11-21T09:04:49.267000 +CVE-2024-27622,0,1,8e0b032d21a35fdd5288842c4805671f9cf9ea0437669d9f87a13ae4b3bdf881,2025-03-28T16:05:54.780000 +CVE-2024-27623,0,1,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8ee1,2025-03-28T16:07:47.727000 +CVE-2024-27625,0,1,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000 CVE-2024-27626,0,0,9a1abf5d0b8cb2d3b863768b43ec83911190b875da99fdca947dfb8d0f43eff6,2024-11-21T09:04:49.480000 CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000 CVE-2024-27628,0,0,1f8afca8560984d1e89d56d5ba3d725ffacfb46d6fb433f79a414003de710b28,2024-11-21T09:04:49.920000 @@ -255007,7 +255007,7 @@ CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab4 CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000 CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000 CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000 -CVE-2024-27689,0,1,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000 +CVE-2024-27689,0,0,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000 CVE-2024-2769,0,0,f5fed59b7bca296011d1da69594ac44436bea25a4aa43870a75a391217b8bea1,2025-02-21T17:14:54.783000 CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000 CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000 @@ -255037,10 +255037,10 @@ CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000 CVE-2024-27734,0,0,5520fe6516adbd7c3f921cf16d2643163c02ae324582977bf7301b0b4ba5b2bc,2024-11-21T09:04:58.490000 CVE-2024-2774,0,0,0c25920b57d442dd5a233b579cf27e95446a07cdad8c6e0e7b03eb2c3014b13c,2025-02-21T17:49:07.243000 -CVE-2024-27743,0,1,cd7c0a0ce5fe4f27e3ad8aff189ec43ab8a8aa92d1fa4e983c682c35b1e638a4,2025-03-28T14:34:38.150000 -CVE-2024-27744,0,1,d280c6a50d1acc2279803f87f5fd590eca421c9059b05f8d5d568ff9b17bc89a,2025-03-28T14:34:30.930000 -CVE-2024-27746,0,1,b585be55013faaaa137868651d1760039a51ba5162ac0d5a3114230e67117775,2025-03-28T14:34:25.407000 -CVE-2024-27747,0,1,6f1ddae8b249acf53b9166e440726ecfc1ce36472977a70dc04ccd917691be1b,2025-03-28T14:34:16.973000 +CVE-2024-27743,0,0,cd7c0a0ce5fe4f27e3ad8aff189ec43ab8a8aa92d1fa4e983c682c35b1e638a4,2025-03-28T14:34:38.150000 +CVE-2024-27744,0,0,d280c6a50d1acc2279803f87f5fd590eca421c9059b05f8d5d568ff9b17bc89a,2025-03-28T14:34:30.930000 +CVE-2024-27746,0,0,b585be55013faaaa137868651d1760039a51ba5162ac0d5a3114230e67117775,2025-03-28T14:34:25.407000 +CVE-2024-27747,0,0,6f1ddae8b249acf53b9166e440726ecfc1ce36472977a70dc04ccd917691be1b,2025-03-28T14:34:16.973000 CVE-2024-2775,0,0,c7ffaeb0461f05cca21e646af6acc77ea3eef3d3454b74ba7b43a7ce629618f8,2025-02-20T18:29:08.757000 CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000 CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000 @@ -255640,31 +255640,31 @@ CVE-2024-28558,0,0,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0c CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000 CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000 CVE-2024-28560,0,0,bb940286b1ac2c7041e7fd9a499645864d82efca5b646de14d7cabba2bdacf62,2024-11-21T09:06:31.887000 -CVE-2024-28562,0,1,546f9e95f1ac7221637a3c37ac915ba60e52c8426360cde1cf4cc63831388938,2025-03-28T14:44:56.623000 -CVE-2024-28563,0,1,822cdb8b0e5e61e29acef8fcea7528fc6793f08518f6f570a4af369999fc5e2b,2025-03-28T14:52:00.437000 -CVE-2024-28564,0,1,edb16379ed48243b327497243e538094e4fe994646ba0dedf46e13be97bb55f2,2025-03-28T14:51:57.007000 -CVE-2024-28565,0,1,618b66620abb3c0bb79b06e8932dfaaac3a3b1cac10f5266e1bbed23527a9220,2025-03-28T14:51:53.900000 -CVE-2024-28566,0,1,81ac8320f758b1290567ab5bbff6732548d5cbd00ed4018aa55d9406326b287b,2025-03-28T14:51:49.903000 -CVE-2024-28567,0,1,30291626499bb9e642bdbcddcc7d995098d34c83a7fdbb9365bc256dab3d9e35,2025-03-28T14:49:08.173000 -CVE-2024-28568,0,1,5dcf253cce1d2e0ec342a381869dbadcf4885f82a3c38c89389ff9298b986b10,2025-03-28T14:49:04.690000 -CVE-2024-28569,0,1,89f94c291c3764568419aeba0eea5234bfeda10e1719928f6e04eda112f29a96,2025-03-28T14:49:01.337000 +CVE-2024-28562,0,0,546f9e95f1ac7221637a3c37ac915ba60e52c8426360cde1cf4cc63831388938,2025-03-28T14:44:56.623000 +CVE-2024-28563,0,0,822cdb8b0e5e61e29acef8fcea7528fc6793f08518f6f570a4af369999fc5e2b,2025-03-28T14:52:00.437000 +CVE-2024-28564,0,0,edb16379ed48243b327497243e538094e4fe994646ba0dedf46e13be97bb55f2,2025-03-28T14:51:57.007000 +CVE-2024-28565,0,0,618b66620abb3c0bb79b06e8932dfaaac3a3b1cac10f5266e1bbed23527a9220,2025-03-28T14:51:53.900000 +CVE-2024-28566,0,0,81ac8320f758b1290567ab5bbff6732548d5cbd00ed4018aa55d9406326b287b,2025-03-28T14:51:49.903000 +CVE-2024-28567,0,0,30291626499bb9e642bdbcddcc7d995098d34c83a7fdbb9365bc256dab3d9e35,2025-03-28T14:49:08.173000 +CVE-2024-28568,0,0,5dcf253cce1d2e0ec342a381869dbadcf4885f82a3c38c89389ff9298b986b10,2025-03-28T14:49:04.690000 +CVE-2024-28569,0,0,89f94c291c3764568419aeba0eea5234bfeda10e1719928f6e04eda112f29a96,2025-03-28T14:49:01.337000 CVE-2024-2857,0,0,6295ecc20584366c794ee0ccb42f15320623f61e630cf97810cfc422fe1c34d8,2024-11-21T09:10:41.607000 -CVE-2024-28570,0,1,ad2785ae9617051620d5840e06eafe4ff9dfef47c56d434ee1acd01fb2e620e8,2025-03-28T14:48:56.937000 -CVE-2024-28571,0,1,40b1f850be2810c82e5fb19cd21bcf0a3e3ac534513afaedf079c7e24a03f718,2025-03-28T14:48:54.140000 -CVE-2024-28572,0,1,04fc282e4b7f64248bc2cb60eff2823593936b427825c6a62dff9231c9ea838e,2025-03-28T14:48:51.143000 -CVE-2024-28573,0,1,f48b33ec35392a77c74384a73dbb40982da7413ac85987a6ae26244b20fcb870,2025-03-28T14:48:47.437000 -CVE-2024-28574,0,1,e24221c7f9c0dc767f1a4af68f67dac8b863bc93b77a4d3fc34c5f9e8dd5eb3a,2025-03-28T14:48:43.373000 -CVE-2024-28575,0,1,6d698b31f6a8ee56112b639023cf9679319442f063850d57ad76a28d58acd6a3,2025-03-28T14:48:40.390000 -CVE-2024-28576,0,1,0351857f9663fe04411fd141642711a40532f1c9ea1f0c9c81917feb5c58bf9d,2025-03-28T14:48:37.483000 -CVE-2024-28577,0,1,a7cb6c7ed03f3487ca50cdc6503815f6723fe0131c0bbe949ef36ec326df72a7,2025-03-28T14:48:33.360000 -CVE-2024-28578,0,1,cf270d69ca34a93783a0b985174a8c47f840b263a63da4a88622d3d39feb79cb,2025-03-28T14:48:28.610000 -CVE-2024-28579,0,1,7a9c0efba9c8a73c1ffa4bd3ee26fdfe2e3e640138bbe9e85ad9a2ceb4968d3a,2025-03-28T14:48:24.560000 +CVE-2024-28570,0,0,ad2785ae9617051620d5840e06eafe4ff9dfef47c56d434ee1acd01fb2e620e8,2025-03-28T14:48:56.937000 +CVE-2024-28571,0,0,40b1f850be2810c82e5fb19cd21bcf0a3e3ac534513afaedf079c7e24a03f718,2025-03-28T14:48:54.140000 +CVE-2024-28572,0,0,04fc282e4b7f64248bc2cb60eff2823593936b427825c6a62dff9231c9ea838e,2025-03-28T14:48:51.143000 +CVE-2024-28573,0,0,f48b33ec35392a77c74384a73dbb40982da7413ac85987a6ae26244b20fcb870,2025-03-28T14:48:47.437000 +CVE-2024-28574,0,0,e24221c7f9c0dc767f1a4af68f67dac8b863bc93b77a4d3fc34c5f9e8dd5eb3a,2025-03-28T14:48:43.373000 +CVE-2024-28575,0,0,6d698b31f6a8ee56112b639023cf9679319442f063850d57ad76a28d58acd6a3,2025-03-28T14:48:40.390000 +CVE-2024-28576,0,0,0351857f9663fe04411fd141642711a40532f1c9ea1f0c9c81917feb5c58bf9d,2025-03-28T14:48:37.483000 +CVE-2024-28577,0,0,a7cb6c7ed03f3487ca50cdc6503815f6723fe0131c0bbe949ef36ec326df72a7,2025-03-28T14:48:33.360000 +CVE-2024-28578,0,0,cf270d69ca34a93783a0b985174a8c47f840b263a63da4a88622d3d39feb79cb,2025-03-28T14:48:28.610000 +CVE-2024-28579,0,0,7a9c0efba9c8a73c1ffa4bd3ee26fdfe2e3e640138bbe9e85ad9a2ceb4968d3a,2025-03-28T14:48:24.560000 CVE-2024-2858,0,0,1b76ee215a17131c0be72ed024c7b73b1e03349dc8f6072a53a0e1699d6fdc20,2024-11-21T09:10:41.807000 -CVE-2024-28580,0,1,0c82968f6366c553f74f7c6ec07a86559c4777b7d5e30537a1d20c17d787afcb,2025-03-28T14:48:19.057000 -CVE-2024-28581,0,1,191b8c9324750f099e546daee36bcabaa27fb826baee53f51e3285fbb77b43a2,2025-03-28T14:48:15.920000 -CVE-2024-28582,0,1,6e69e62a685361851f0997bc47167c320b84ea905c873f3b4702a12de5a6a826,2025-03-28T14:48:12.423000 -CVE-2024-28583,0,1,871d5e7614a91d5aa7be768444e4b1a611dd29c5c2e4535b36fd330788bc9c11,2025-03-28T14:48:08.290000 -CVE-2024-28584,0,1,280815d56b9906ce1763261fe7a802bfeefc69e503ae39d7d5e342479901b86d,2025-03-28T14:47:52.610000 +CVE-2024-28580,0,0,0c82968f6366c553f74f7c6ec07a86559c4777b7d5e30537a1d20c17d787afcb,2025-03-28T14:48:19.057000 +CVE-2024-28581,0,0,191b8c9324750f099e546daee36bcabaa27fb826baee53f51e3285fbb77b43a2,2025-03-28T14:48:15.920000 +CVE-2024-28582,0,0,6e69e62a685361851f0997bc47167c320b84ea905c873f3b4702a12de5a6a826,2025-03-28T14:48:12.423000 +CVE-2024-28583,0,0,871d5e7614a91d5aa7be768444e4b1a611dd29c5c2e4535b36fd330788bc9c11,2025-03-28T14:48:08.290000 +CVE-2024-28584,0,0,280815d56b9906ce1763261fe7a802bfeefc69e503ae39d7d5e342479901b86d,2025-03-28T14:47:52.610000 CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000 CVE-2024-2859,0,0,caa75afab36dcf492b03d579a92cc4d5b32496de16e8a53f8ac97b57d5699ab1,2025-03-19T19:15:40.793000 CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000 @@ -256144,7 +256144,7 @@ CVE-2024-29176,0,0,10c519a58243fa60d8cb12375f6db3b7c0c78f193cb795fac43f3b2804858 CVE-2024-29177,0,0,989bb0df1643b9a7b89e37a8003e76b7f921fc34121bcb1e8d027d237205360d,2024-11-21T09:07:43.943000 CVE-2024-29178,0,0,8f45c2ad8a2db5b223440df97d47eee1d54dd86d0f4715fcd3f0e401dc692ad0,2025-02-13T18:17:50.040000 CVE-2024-29179,0,0,a03213dd44931706586fdbc3bca5ca0578ffb309b141b195bed3df3b6ff74c9d,2025-01-09T16:59:41.167000 -CVE-2024-2918,0,0,4b176845f014bb23abda3ba74984151a83286559b65ff253d8f5f37f236b6815,2024-11-21T09:10:50.213000 +CVE-2024-2918,0,1,b3253139b585010c2d50af768987f0d0ac0a0e24eb36954fbc1bf3b7aa2ef5ba,2025-03-28T16:20:56.060000 CVE-2024-29180,0,0,116b696fe96a4565704c86f1098f1218e060f9688c96251259ff2087a89c91b1,2024-11-21T09:07:44.450000 CVE-2024-29181,0,0,787534a49fdc63ee4e12d4639da0074229100df572eea4d1a3a06db8df3f16a1,2024-11-21T09:07:44.597000 CVE-2024-29182,0,0,84fab37a55923e968892a68e297c3b6f80fcae95a1591c1201e406df4067b079,2024-11-21T09:07:44.747000 @@ -256176,7 +256176,7 @@ CVE-2024-29206,0,0,8a7eb39d95b3b371c830e05b1b6e4cde0bfabacd8958128965c1eeebb11f8 CVE-2024-29207,0,0,2464c80a3c697e101d9833ca029d1f5331b8df477f1dd413b74e2ad355f20379,2024-11-21T09:07:49.203000 CVE-2024-29208,0,0,8acb575fbb6553fe88b9329632fc776d834e7be7ceeb397e3472ead1329f3bc1,2024-11-21T09:07:49.330000 CVE-2024-29209,0,0,0602187db9645bc24c7ea3bede39626c24d7ca8f446afb88b1649784b10602c9,2024-11-21T09:07:49.460000 -CVE-2024-2921,0,0,cb6cec1b05a416480770f2949b980096381a44a237be65b81e14330f95779be4,2024-11-21T09:10:50.660000 +CVE-2024-2921,0,1,7a5d30115f272319572d92a96c5c73cfed51411b5828c82b1c4e054fb0f33624,2025-03-28T16:21:04.050000 CVE-2024-29210,0,0,0b9e1da3e79f2303b1e56f9a5c9d0f9d5677bc9bee283f6034952eed6ce5812a,2024-11-21T09:07:49.607000 CVE-2024-29211,0,0,0331567c6af8fd83b1e0a24feaf54333b88f51ecbe3f9d759c864c4433a7edc5,2024-11-14T19:09:01.213000 CVE-2024-29212,0,0,57ad6f456ad8c4e58aee0ad243fdb4a1692ad3d121ea88d523c26b7fe273ad46,2024-11-21T09:07:49.800000 @@ -256219,7 +256219,7 @@ CVE-2024-2927,0,0,760e13d63ffb1aa6a6097fc1c420dd924f8af6747ca04c686b3b6cab9f0c73 CVE-2024-29271,0,0,37f926466d04417e896efefe23e469b02c33926c2512f94216987bab3c6b9581,2024-11-21T09:07:53.797000 CVE-2024-29272,0,0,2856fc70b0ec5cc9b3179f269199b1b80194795a938f481175966887300de617,2024-11-21T09:07:54.027000 CVE-2024-29273,0,0,e88c38979e6a8cb440359a757929c3c3768beb837dec53069b260cb2536d1e3b,2024-11-21T09:07:54.247000 -CVE-2024-29275,0,0,04d24ec0b09e8992b316d39205c49d05d0ba002c7de004a46972837ba649ad19,2024-11-21T09:07:54.473000 +CVE-2024-29275,0,1,89179450cff6bd242efa87e5702bd962171bbc5420f761d638b1bc409f5cc15b,2025-03-28T16:51:45.747000 CVE-2024-29276,0,0,e492e2b9f2cab402ec63c3351f8ac901d3688e777b31189c69f2d34536b203c2,2024-11-21T09:07:54.710000 CVE-2024-29278,0,0,810e815ceeacd459126cd2f0be1468e4723065d75f15ecab73f4c892d8b4bcaf,2024-11-21T09:07:54.933000 CVE-2024-2928,0,0,4f9d141452f84e180c0e1f09f7c8fd6e6fdfae447a1da31584938ee63d171ea3,2024-11-21T09:10:51.707000 @@ -256296,13 +256296,13 @@ CVE-2024-2946,0,0,997d6b53bb745a8fe904139e2791e2c813b08bddcde7c3f57e212bb43a8941 CVE-2024-29460,0,0,8d92453cad8a8393fa15cddde56132ecc5c7ca6e2ee3a6965bdc21d4886ca532,2024-11-21T09:08:02.840000 CVE-2024-29461,0,0,6784514e8f6ad0fcfc7af2e2ecc7f7e5ac701f479b42634f80923d877f6e76a5,2025-03-17T16:15:21.387000 CVE-2024-29466,0,0,d1c8dd4175f772e9684f7c0531d839c45304893b8eb7f47c0e48698c58964c2e,2025-03-20T20:15:31.863000 -CVE-2024-29469,0,0,b4ff7e7dd0886c37f289432ddc27d014390f9ccece3870733ae3b10ba447da3a,2024-11-21T09:08:03.500000 +CVE-2024-29469,0,1,c185a691753b377e74e3ffa745c574e83b0f5b88bb3c96fe75965fbcc7484a3a,2025-03-28T16:45:49.587000 CVE-2024-2947,0,0,a2260296cea0a8b0297fccf6e19d9b38e7eac981b1298727580d42f3bdd9e8c4,2024-11-21T09:10:54.473000 -CVE-2024-29470,0,0,75cc4ff47ee046b1275e5889318f83247d27860717755453f2a30467ae3c8e1c,2024-11-21T09:08:03.713000 +CVE-2024-29470,0,1,6a20d214e4f4bb836b3ce1259e09859cfc9cbe197dae98c68b134c2321b5cae9,2025-03-28T16:48:37.833000 CVE-2024-29471,0,0,aedd63d93fa18021f61e0c8ed7383f117836a9ddd5bfe77b5e623c014ee1e4cd,2024-11-21T09:08:03.933000 CVE-2024-29472,0,0,15d290ea9f98736b449bc7787935a2cd2021c80d69ba95973c22cb5842a1df64,2025-03-13T18:15:39.353000 CVE-2024-29473,0,0,f2998a926737c827876c84ada013454825da8f5d7ba056248f2c493caf13fc94,2024-11-21T09:08:04.343000 -CVE-2024-29474,0,0,8d13151693ee147ceb114c1cd4d5297dd4a25e25b3dffd00fd435190cec6d708,2024-11-21T09:08:04.493000 +CVE-2024-29474,0,1,541f226998628ae6b5e31191d9f1979e464f65bfbf8cd71ee02cb3f83ba33174,2025-03-28T16:48:47.957000 CVE-2024-29477,0,0,ae3fe05fb8c437005b62ea61c5e00f7ff5ab4cd6c6fae4f89f5257a31a7ae6f4,2025-03-06T19:33:27.710000 CVE-2024-2948,0,0,9b014acbc58947b357b9e41de566aaedde9b165ceb6c89be18c403d44f038e7f,2024-11-21T09:10:54.623000 CVE-2024-29489,0,0,07f5b3a5e4c9d9dd4bd17cfda9a58f8a163c6a3150e80753fbcf5f8a1d2c0bab,2024-11-21T09:08:04.877000 @@ -257213,7 +257213,7 @@ CVE-2024-3056,0,0,156a3ff16ef1e7c0a07171966ca2163c4735c8d33004ad66e5a8927f3659dc CVE-2024-30560,0,0,b59125ce2223ca2880fb89db3a3f3dfd059a1d0d73b4049fe43e1fd24daf2c54,2024-11-21T09:12:10.740000 CVE-2024-30561,0,0,ac7e0304f31638e780a2d720d189c314381f988fd2e6f5eb3ed2071500f77264,2024-11-21T09:12:10.877000 CVE-2024-30564,0,0,b20ff337c9f1037b2e952029ea8bdf19426b12dd02e41f2275aa126ef8bb1798,2024-11-21T09:12:11.007000 -CVE-2024-30565,0,0,3f8705cb7248f632f330b4ce75cd3dfc475f4e47b875590050e266452f0faa28,2024-11-21T09:12:11.230000 +CVE-2024-30565,0,1,fed5348d7a25dfad7ba408e22e1df26a888cfa70ec82dfdec6da97c387e5ca81,2025-03-28T16:52:54.670000 CVE-2024-30567,0,0,56d321622fe54066281ae3f4c3e57cc485754758b6b7eac706a1b8d07c9db2f8,2024-11-21T09:12:11.443000 CVE-2024-30568,0,0,2f2974e4f43eb513d22f486c8b5e262c042a4e7b166d459a8d8058619c7643f0,2024-11-21T09:12:11.660000 CVE-2024-30569,0,0,af716782dfdbdd6300d40d892f04bd4f48102bcc5dac712ef7ce5d499c07c5fb,2024-11-21T09:12:11.920000 @@ -257996,7 +257996,7 @@ CVE-2024-31650,0,0,74932210814720d3e9cb26d5c43a0857ecc1658ed6e15daf4bdd59e219bf9 CVE-2024-31651,0,0,7a05bf060550658aeafb598f6d26f061393d2c8a3005e7e0ac280f9d616f37cc,2024-11-21T09:13:47.943000 CVE-2024-31652,0,0,af62d2ee0de062f978c0bade4d4d954f663c94f8c5efa1dc0544f972ca6821cd,2024-11-21T09:13:48.143000 CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000 -CVE-2024-31666,0,0,aeab187d4e372cf53ada217bf529b4da90a82de4a9a4da55410824233a756180,2025-03-26T21:15:22.100000 +CVE-2024-31666,0,1,9feb924667e4d55fe73065a5c4296ea21e1ac0f03e29d40ad28b081993f9d303,2025-03-28T16:00:36.103000 CVE-2024-31668,0,0,92d852b5513f85b46c5c8aacca49dc78103d1045b501ee09fe75860fd2d477f4,2024-12-18T16:15:12.693000 CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000 CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000 @@ -260838,7 +260838,7 @@ CVE-2024-35432,0,0,ced9de72c3bbcb4e9eb80bc2fabbb0ed55c2fd0dc103afeb5274fbf689dfa CVE-2024-35433,0,0,b493ef1c1f660f4525c4b3c861e30fc780cde47e49bfe7f8f859b2235b5ed7e1,2024-11-21T09:20:20.267000 CVE-2024-35434,0,0,0fcffaa00cbc213252ffe7916deef7a46e78adaf94b00c9474f03d7ed84f9b20,2024-11-21T09:20:20.497000 CVE-2024-3544,0,0,2056c8385985aefccc45ead5e31b0ec097417378af08b30a42b3680f42015625,2025-02-03T21:38:22.117000 -CVE-2024-3545,0,0,7b9236373d9ab11af1789b681fa050d76729541f270e002aeefd34c01bf94533,2024-11-21T09:29:50.790000 +CVE-2024-3545,0,1,955377816aa30a64ceef290f6fe292fba51e636d73b3d97e950ee6c5c33cc26c,2025-03-28T16:20:52.220000 CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000 CVE-2024-3546,0,0,6a929a5ec13b1df70de88509356c904b07d7b8ba34b598d5dfca415671fdec86,2024-11-21T09:29:50.977000 CVE-2024-35468,0,0,f078143d20bd8ff2771314faaf608d4d85c29a73695f1655b68a13225fe33a65,2024-11-21T09:20:20.703000 @@ -263987,6 +263987,7 @@ CVE-2024-39308,0,0,5e2a254789b6adf99c0777cff7acf6dd961d09c4b36426a3aeec492e32936 CVE-2024-39309,0,0,05dddb230d488a4715733b5828a558e0d37a47d27fd705c4212d0a536cb382bd,2024-11-21T09:27:25.990000 CVE-2024-3931,0,0,da17b20e582e862546056d14aa128822fb3b0fc4d7319c4f35adbc82010d816c,2024-11-21T09:30:43.577000 CVE-2024-39310,0,0,09dc0d6f8f165690ce5741ca2ed6e9da3275d325f18578ccaad0e38dbe7b8f91,2024-11-21T09:27:26.120000 +CVE-2024-39311,1,1,22f01950122e6f925bdd258499f4df1d2c65b77c53d3a12e6c666fd4e0853f8b,2025-03-28T16:15:27.900000 CVE-2024-39312,0,0,40b5287c2d6ecd3d71481f475e176c68c18b6b66eb89c859b58dc9d5ca882f06,2025-03-05T15:02:51.830000 CVE-2024-39313,0,0,b115d3b78f35e7dea98a72603bba4219df7032cb204602053744e9732af62a26,2025-03-06T18:04:02.763000 CVE-2024-39314,0,0,e7aff7b8a85ec42f1938bc61b661a77715a4979d21eca4d4fbf4901151758256,2024-11-21T09:27:26.497000 @@ -266458,7 +266459,7 @@ CVE-2024-42584,0,0,c802f479d90286fd5c5341698abdb95dfefafd21b5b328ae1fe1d56c59837 CVE-2024-42585,0,0,1e32a3d5f79837e833d41285fe15b9d72191a8fec92b249430433a51895c5189,2024-08-20T16:35:31.307000 CVE-2024-42586,0,0,7a159575f356a4882566414d5b649fe23f9c478a0df95f8cdbbe9c8880c8c34f,2024-08-20T16:35:33.523000 CVE-2024-4259,0,0,7b5db6f5af934278f3b40f71abd4c0cfc960e3e509cb7a0f49a52fd67ef76f30,2025-03-14T09:15:12.003000 -CVE-2024-42598,0,0,55d16ea8304188ee4320cfffe1073abd24faafec63a7452351eaa97abbb17b84,2024-08-22T18:15:10.187000 +CVE-2024-42598,0,1,5fb3f3bd56c5e052710708c02989a440782ca185eddfe9310a5b9cfa07e3f31f,2025-03-28T16:53:29.593000 CVE-2024-42599,0,0,5708f882270384fd1c370b56aa51de239b6f56c6475b221424a79cba5b347ea6,2024-08-26T17:35:07.137000 CVE-2024-4260,0,0,7cc4b7fd661ec19af96c223fcd725ef21b11847fb0c17ee8c63eee5e50cbac7c,2024-11-21T09:42:29.750000 CVE-2024-42603,0,0,230eae16acd0b4472ab1bd8a982d41be12a5b6a1c3a4d2f3a11ba5a34ee12543,2024-08-21T13:21:56.383000 @@ -266808,7 +266809,7 @@ CVE-2024-43165,0,0,d6b26bb563a0e6badcd424e8717f3eee2117ad61bb0aaa9e33b8f5d6bf543 CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05ca8c,2024-11-21T09:35:06.587000 CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000 CVE-2024-43169,0,0,ca312dffe966efd8b5b66da9976b865eeded21d5219926bc8f6ba4521a4d3905,2025-03-07T19:45:45.010000 -CVE-2024-4317,0,0,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000 +CVE-2024-4317,0,1,bc4c1d6b66ecacc00a7702284dd4cbda765fcde49e5260fc82751a2023009737,2025-03-28T15:15:45.250000 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 CVE-2024-43176,0,0,63af555209e7ed77ba0827d2538004bfc82a8d5acdbed249baeecac6794319ce,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 @@ -267114,7 +267115,7 @@ CVE-2024-43480,0,0,2b8c7026769acc492cb135f3a902f5b8efd2fdfa0fc93d7a520b9c444afc6 CVE-2024-43481,0,0,d15cfdba06a15c9666080e0bd42adbcd2af12dfa448c0c50a4e9ceaa264f4d30,2024-10-16T21:34:19.840000 CVE-2024-43482,0,0,89903c68b36e49a6091c3e7a5777c860656178e35e49a4d00a3feccbed7e71eb,2024-09-18T14:11:50.303000 CVE-2024-43483,0,0,5894fab1cc031d8ea06b78ea45889e81fae431abd9aa278d2ff49e57fe811037,2024-10-21T17:35:34.827000 -CVE-2024-43484,0,0,39a653762326643169601b95e3e894f19f4fa90fbcba8636a1563048542fd009,2024-10-21T17:35:44.460000 +CVE-2024-43484,0,1,9726772d466a20462c9a13a6c4abf30d49378de50bf4250e311123b67f2cb9a7,2025-03-28T15:15:44.823000 CVE-2024-43485,0,0,d337f08e2ac97c6c2247123acf322480c683dcae8b32e15558c2a5b46a074c53,2024-10-21T18:01:28.623000 CVE-2024-43487,0,0,a9a7f267c4a773e9412c8796bdc2a9677324c51e1b310739b73411f6cc12c2a7,2024-09-18T14:10:20.320000 CVE-2024-43488,0,0,b22dc2eda805ba4c390a3bcdecf7b116f03391446b1f75ee5351fa05c368a1fb,2024-10-21T21:05:53.340000 @@ -267885,7 +267886,7 @@ CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000 CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000 CVE-2024-44275,0,0,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000 -CVE-2024-44276,0,1,1cb833ffb18fa9f2e36eaf915a97fc850b9e1576b6bef756fa1155e91f6af5a1,2025-03-28T14:09:35.787000 +CVE-2024-44276,0,0,1cb833ffb18fa9f2e36eaf915a97fc850b9e1576b6bef756fa1155e91f6af5a1,2025-03-28T14:09:35.787000 CVE-2024-44277,0,0,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000 CVE-2024-44278,0,0,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000 CVE-2024-44279,0,0,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000 @@ -268848,7 +268849,7 @@ CVE-2024-45765,0,0,d08df3289bc68e719740469698ac413966bdff60f13781ac62b99dc021094 CVE-2024-45766,0,0,3c96c4b692f72cef2f3b9553cac8d6f167af7d571a147249c8f73e3c5c52eb55,2024-12-02T14:37:32.017000 CVE-2024-45767,0,0,7c5b48c8e706e6c8ae501761d8be0d401e1b87d8e52b758c1a580381e866ae36,2024-12-02T14:32:37.183000 CVE-2024-45769,0,0,b04be771ec22a94fd636520cce7793ef84bf69518cc6b17c7f3bae1b59effde1,2024-11-12T18:15:35.427000 -CVE-2024-4577,0,0,eb1924de0f14ef2d02449ec7ed7fa4317489ceb6cc64a8c3762d1c0f65ad153f,2025-03-21T20:18:54.330000 +CVE-2024-4577,0,1,d0fa159b4741afb83a3b240f8c8a3f769329bb7a38feb781505372c4d7939d09,2025-03-28T15:12:44.513000 CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf0a5,2024-11-12T18:15:35.643000 CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000 CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000 @@ -270711,7 +270712,7 @@ CVE-2024-48455,0,0,7d16a6752881f9c2507814c64a467c98b64e570b5df68063a15b1ef3b600b CVE-2024-48456,0,0,5157f8dd26a6f4dec318ad8d7c80b2cd217ac77f0e9ed233c772d4f65ef0a60a,2025-01-07T16:15:34.867000 CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a537,2025-01-07T16:15:35.057000 CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000 -CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000 +CVE-2024-4846,0,1,bd5a813f3f1de37afd20443e535ede94f3264c3881bcbee42428d6668b3c1747,2025-03-28T16:22:26.443000 CVE-2024-48460,0,0,34f8ed9ab98ddfc75ca095067339237e8229c3fecc07fb29885848ae665d4986,2025-02-03T21:15:13.217000 CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000 CVE-2024-48463,0,0,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000 @@ -270760,6 +270761,7 @@ CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,43edac6988670c251a3268565520d2147fd38eb2c203678751a12426c018f3e3,2025-03-25T17:50:50.723000 CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000 +CVE-2024-48615,1,1,ffb075ce68902a7e23959bd31c513cf7242c5d81addf3194d35e465800a51a23,2025-03-28T15:15:45.023000 CVE-2024-4862,0,0,f2cdc4c8590cc224b89516a71786d6254cfba1f6171c0919e726c428cf5def93,2025-03-06T15:07:23.547000 CVE-2024-48622,0,0,7b5734fdf710218dd18d04eccbe27f1ea32dc572aaf26b2fbfe91cd5543b9021,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,5cea775385f6ce5ebba2cd449299789230da6b7f1dc9f4a14dddcec3dde7198b,2024-10-16T16:38:43.170000 @@ -272540,7 +272542,7 @@ CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5 CVE-2024-50715,0,0,d80036605e9d39c57bf73ec8b65a72ebad6adcf1d272a88d9f7f78f0167202ea,2024-12-28T18:15:09.790000 CVE-2024-50716,0,0,ff7139747070d1865bee3e35d9818a32b6c31830627003594b66b97e8ce57a71,2024-12-28T18:15:09.997000 CVE-2024-50717,0,0,11fa2afbcd3540c8ea3fc4871e24ced6a1f1f3bff6d82e6a5d9acf86b4274a63,2024-12-28T18:15:10.210000 -CVE-2024-5072,0,0,38bd8ba0572ad544e5273dfb8f5f6bfba13772caa98624367620d218345874da,2024-11-21T09:46:54.310000 +CVE-2024-5072,0,1,6e11f88ba479eebe1eca4c1def7025f7c31c1c452b47f6e805c5fc6c1f1b914c,2025-03-28T16:22:30.187000 CVE-2024-50724,0,0,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000 CVE-2024-5073,0,0,8f9666a5d3a8eb23f45b7a6a371b532fc485ca12ecc00275ad0b6ca4b8ff4f3a,2025-01-15T17:48:03.477000 CVE-2024-5074,0,0,300fb8a2ae76071163fb30d885721444a084ca820de7e72b30304998ec6beaa3,2024-11-21T09:46:54.600000 @@ -273017,6 +273019,7 @@ CVE-2024-51620,0,0,9f3c5342b04529a4ba1988a0378987633ac6cb1420149d0012236cb557c55 CVE-2024-51621,0,0,ad990faa68f653d7edf7c4f127742a95822a936152b7da682aa6af8f3bdebf72,2024-11-12T13:56:24.513000 CVE-2024-51622,0,0,a8223a947586efb89290aa6e2c15be7977fcd06db44d443b9982678fa8c720d2,2024-11-12T13:56:24.513000 CVE-2024-51623,0,0,6703f5b025cb8d843ba74bc3560cd376d306a31d87ea460aef29dbc5f0ab92c2,2024-11-12T13:56:24.513000 +CVE-2024-51624,1,1,8f53721ed483dfa9530df52f849cb93b7770c1b7f77398ad87fb77602b93a663,2025-03-28T15:15:45.393000 CVE-2024-51625,0,0,09d0e1888715d9f8121d4711c3d9a85a6cbccc4072e1d4a8a7b65f0a1d54580a,2024-11-12T13:56:24.513000 CVE-2024-51626,0,0,3ea6cfbecf6d0a010e47ec7e18ebc64f13a22acb8963c62d98cc5b7cb452635b,2024-11-06T22:10:20.517000 CVE-2024-51627,0,0,9441dbfd558987f77e4ef79fd5c47060c88079ff7367a501635d73f88eaccb82,2024-11-12T13:56:24.513000 @@ -274381,7 +274384,7 @@ CVE-2024-53427,0,0,5e821b042543ee82d33c34720304409034d0bf41a56200df2ff2594b425b9 CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000 CVE-2024-5343,0,0,a520df0d2c87c5fe35335a1b343c956cc8dcf1b7b7959b5acc51996bdc11fd0c,2024-11-21T09:47:27.647000 CVE-2024-53432,0,0,91200366caef4fd477ae549a4b97936ab0103419821400acdfe9619ad1d645ce,2024-12-04T16:15:26.240000 -CVE-2024-53438,0,0,af421dbe7c7f38fc48dc3da6bba61e62d4aceee28575a50b869f0d02d1e1b7ee,2025-02-03T19:15:12.633000 +CVE-2024-53438,0,1,6f86d2f1fae70eddbba85a1a03508a82fab6b4531d5e5c5b62e05bbbfde6e5f5,2025-03-28T16:39:27.213000 CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000 CVE-2024-53441,0,0,15e36cc5d95e47c6196e0366735e3d4fafceb35f2476d36323b8dd3867fef6fc,2024-12-12T02:07:57.850000 CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db1661418723b2,2024-12-11T17:15:19.083000 @@ -274822,7 +274825,7 @@ CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef6643 CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 CVE-2024-54084,0,0,c1aee3e143998bbdc982177558f44486e207fe61fab43f3469a59c234690bf0a,2025-03-11T14:15:22.730000 -CVE-2024-54085,0,0,2eb4e85a4954fad493e63b1d0363f6c2a2915f74115cdae84734b8297025373b,2025-03-11T14:15:22.893000 +CVE-2024-54085,0,1,44631dc4ea36ebfeac3463397955a78235aa73c39f9e5787179507a91ff8a117,2025-03-28T15:15:45.540000 CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000 CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 @@ -274910,7 +274913,7 @@ CVE-2024-54175,0,0,6922222bcdfc7b96fef3a341f6cefc80aabd1e3cb954e956a74e6c94cdaed CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000 CVE-2024-5418,0,0,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000 -CVE-2024-54181,0,0,dfc1a5ecb59f8ee1aa215392f6a5f462d2b4bfc57816ecf4c45667d73975fba9,2024-12-30T14:15:05.867000 +CVE-2024-54181,0,1,3e04974e8b1a6b14bc562b3f38845258be106e346d87e72f2301979081de7867,2025-03-28T16:32:40.990000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000 CVE-2024-54193,0,0,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000 @@ -275009,6 +275012,7 @@ CVE-2024-54288,0,0,3c9c3c6eb7ea5d0e80b3dc6c380a970c41d1702fdccfcbf7a1eb9279bdb11 CVE-2024-54289,0,0,4924b8c9ee0119eb21584ceb261116e542e084f80864da6819de24f085376959,2024-12-13T15:15:32.840000 CVE-2024-5429,0,0,c5c127d3962dc4b6ee503ad5fd97fce8ef1325aee9713e37b6918218af05ded4,2024-10-18T12:53:04.627000 CVE-2024-54290,0,0,94f24c824c8ffe1a5d1b4e7456c8c53bdf7ab3ec7f2d25cded89b1a2e931e028,2024-12-13T15:15:32.997000 +CVE-2024-54291,1,1,9a44c4ae6a95498120b4d9319fe1f8f6e2e5ff693096da121c310da094a09236,2025-03-28T15:15:45.663000 CVE-2024-54292,0,0,23ca83ef1b927ea8c753f6ff6aac4e8f46b4cc684f1a85a4d56d010b0b62eebe,2024-12-13T15:15:33.143000 CVE-2024-54293,0,0,42cf37db0ff709eca735462416937e47c8f3a74562d752738c510e807b90fce1,2024-12-13T15:15:33.293000 CVE-2024-54294,0,0,8a9334dff3a1a76409b7a41f4dc2a8fa7e8f1ac279aeea257fda6867355ac748,2024-12-13T15:15:33.420000 @@ -275086,6 +275090,7 @@ CVE-2024-54359,0,0,fa0a9f20451ac7e0c36ba20018c12a0ec4833a93fa93fc8eddd26232eff57 CVE-2024-5436,0,0,16a2d2f1a9a3d9d246e525c05e5f6ef4140f57c182ceaa616ff131de2cb2ad61,2024-11-21T09:47:40.917000 CVE-2024-54360,0,0,7cecc5c9b33bbc356f5772e4c43bd169f3e770f679ac31dc4fe24a944af9b3f9,2024-12-16T15:15:08.793000 CVE-2024-54361,0,0,1fbefec397ae08c1d4ab1ee239f4011081ba235e6463dd89ca2c24fccd07c3a3,2024-12-16T15:15:08.970000 +CVE-2024-54362,1,1,a3db78471162f72e0fc5a1a57347650c81d8dbc6bf8e6d956c5ff13f375a42dc,2025-03-28T15:15:45.827000 CVE-2024-54363,0,0,a758b21d504842c72bce968c480430a0b58b48352a9cec3cae02554bd59f1189,2024-12-16T15:15:09.130000 CVE-2024-54364,0,0,302e6428c3975bfd1b81b5caf03464d744cd6a9b74a7e91f70bc8fe4275e821f,2024-12-16T15:15:09.283000 CVE-2024-54365,0,0,5e337e24502c845aef33f4c06f7c4e94b03b2019f78d434025bd26e36b24fbbc,2024-12-16T15:15:09.437000 @@ -275398,7 +275403,7 @@ CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3 CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000 -CVE-2024-54954,0,0,c5f7bba0f482724c8baeb34ff731ef8127c621f5f601d09231830cf72a39e47f,2025-02-26T19:15:22.440000 +CVE-2024-54954,0,1,bd6322507b33dbf7676b3d047db7e71ad46212f09cfe0c196ceeabe7a1c0b796,2025-03-28T16:49:01.760000 CVE-2024-54957,0,0,e4e8d12c7fc7d58c0714df01efc15cd62969d1708fd6892bccb61bf01ac33284,2025-03-03T16:15:38.450000 CVE-2024-54958,0,0,69980aeea30a2a881a4d3d60af27dc56a66e90cd80d98f68c95b14c20a9676de,2025-02-21T22:15:12.440000 CVE-2024-54959,0,0,9f0a686e6ecddb708d340473cce33ce83c57a259a6f56d0e5117df6a2fd44baa,2025-02-21T22:15:12.593000 @@ -275454,9 +275459,9 @@ CVE-2024-55089,0,0,fe8d9b2e0356506b20b9e891287266dbbb47fd17083ee062946773a1570b3 CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000 CVE-2024-55099,0,0,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000 CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000 -CVE-2024-55100,0,0,95028b27871ac62718afbfbab3332a8b1dc5af8fb564b5f3ff9235ca8136b414,2024-12-17T17:15:09.497000 -CVE-2024-55103,0,0,2d1bf7de6e8ddbeed19c39c30ece97ef5f046f11bf32a09905b7319aebfbbd7a,2024-12-17T18:15:25.260000 -CVE-2024-55104,0,0,89d3d58efc57157a740708a2dcef2c59f16a1c0cc5594654e6cb8083054710bc,2024-12-17T18:15:25.460000 +CVE-2024-55100,0,1,33d0b68b4a1b95b13d83b0a554f1c0b5e79107824be878c03bd773954b614651,2025-03-28T16:25:16.377000 +CVE-2024-55103,0,1,ee0ccf1ed1fd812fbea27730ca088b997a7c393b2a345905c94250b1dd4695f0,2025-03-28T16:26:07.910000 +CVE-2024-55104,0,1,ae0215fb336b22e1e2cf2bf52097046ebc3a3cc5276eb6f7eee4333132e842c3,2025-03-28T16:31:25.177000 CVE-2024-5511,0,0,56fb77e68915452d67789c3a74a2cde0633cd6fde099063447a457a2d0c56373,2024-11-22T20:15:09.453000 CVE-2024-5512,0,0,e291a0f62c622b98719d0669427609426642277e7e0c79f3db83875786e582a2,2024-11-22T20:15:09.563000 CVE-2024-5513,0,0,6fc05209f2de569aa2d53ff875b7b70727a658dcae4b0d69e9a3aacc36b9dc55,2024-11-22T20:15:09.673000 @@ -275492,7 +275497,7 @@ CVE-2024-55227,0,0,ea2a0123939f9b1ea5315d2e571a3cfd2a2b9c563e7d434bfdd1e42b71dd3 CVE-2024-55228,0,0,eecb7530d030d8ee385f7f9d91b0f88ebc1f92238de3682fd2d3a79e15c4889f,2025-02-19T20:15:35.670000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,0f2879a830bf65ca740c9104d0f5b7cf06ebbf48cb12754d4e2775c0b62dda8b,2025-03-27T16:30:14.617000 -CVE-2024-55232,0,0,1864ac97778845b0c2006d5c17dbf59eb90aad80a835e2f552f3f64f26c6392b,2024-12-26T20:15:22.673000 +CVE-2024-55232,0,1,0ca7947c8f20ab530f6ef9f382dd1a93ea84b85960cc7132226746574ebf3ddb,2025-03-28T16:21:59.560000 CVE-2024-55239,0,0,cbfed4e5dffe1c92f805fb83f4f8a51e197e12f93a7416bc9c5ac9864cc8d243,2024-12-25T03:15:19.813000 CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000 CVE-2024-55241,0,0,187ea8b2ce4e3d344bad396027a912baec6f3e2b9e5b42839c08917307b0c3f3,2025-02-11T15:15:18.593000 @@ -275538,7 +275543,7 @@ CVE-2024-55457,0,0,7b4cb86f3761833ca26fd0a858cadcf91eb7e69cbfa7df0c347b996d089fc CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55460,0,0,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000 -CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000 +CVE-2024-55461,0,1,df958f7c00c8a8535af124b3f4fbfcd81a3726621b4e3eac8dd977dfbdb6bb10,2025-03-28T16:55:56.543000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000 CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf26a,2024-12-20T18:15:30.730000 @@ -275886,7 +275891,7 @@ CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b18 CVE-2024-56161,0,0,74b9e0f4da77c5661e3a9b8f6f148609867e6a20dd72c293a01b3c60c27da44c,2025-03-06T19:15:26.840000 CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000 CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000 -CVE-2024-56171,0,0,8cc43a9d9ba32f16f963a5c9359e85704bcc5f8cac2b879034099a3ffd3643fe,2025-02-18T23:15:09.413000 +CVE-2024-56171,0,1,f6d3110b767b8d3afcd970fbc47d832abca9ca5dd825fdae066e60289081341d,2025-03-28T15:15:46.003000 CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000 CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 @@ -277399,9 +277404,9 @@ CVE-2024-6051,0,0,aa65e6649174075424662e8995678fc6862fc773008508455b7b34ad879623 CVE-2024-6052,0,0,c0bac5c1634a8b4157b1fe6fe6b7f990473233d9a06dfef8ea9121e1562fd02b,2024-11-21T09:48:50.920000 CVE-2024-6053,0,0,821b1378f2d36782acdeacabe835656b85ef0b1b32b265c41c1abe4fabc86b3b,2024-09-19T17:22:36.697000 CVE-2024-6054,0,0,330d22a9d680926a5514364dfbd4b4ba63aaad75c104e23030c0427d4e976830,2024-11-21T09:48:51.140000 -CVE-2024-6055,0,0,96ba422005b25d13763e673ef8d9c92e9f506083cd474d58581e00898310f77d,2024-11-21T09:48:51.270000 +CVE-2024-6055,0,1,42a35b7ae9753e0ad1b002364a5ff21ca96538d34d90fc5fed78b800b4d9c519,2025-03-28T16:23:27.830000 CVE-2024-6056,0,0,e867b5abf71fb1c916cafbb891319ba249810d32d78cab4b12066b0b31c1e483,2024-11-21T09:48:51.450000 -CVE-2024-6057,0,0,0b4d6228732dfc77397c755c729e8b8c35779bd0d7a41f7c12504aa93da62077,2024-11-21T09:48:51.630000 +CVE-2024-6057,0,1,5fecce42da2860467a149f2dc60cc0949eee30db8ccbc48966f7c82fcc888a8d,2025-03-28T16:23:36.887000 CVE-2024-6058,0,0,aa14c9702325d70d9e2fb76f706ea4bc493b952790d84b7627114ec1e983bf94,2024-11-21T09:48:51.813000 CVE-2024-6059,0,0,528ce858c4a3e1c773b05c440d73dc25fd6995206f35b7652bf7b372346f70d4,2024-11-21T09:48:51.973000 CVE-2024-6060,0,0,92e2403422bea418868af02fada6c1f01b8ca159584156cb8703e0169c604688,2024-11-21T09:48:52.130000 @@ -277687,7 +277692,7 @@ CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318 CVE-2024-6351,0,0,a12a4c2d39ff729e4e90846810aec1c0c565a0e734f8a92541ca3181ef73eaf9,2025-02-18T19:15:22.833000 CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 -CVE-2024-6354,0,0,3cda1563f8e5e6324dfebe36358cd6d36f2322ef740f70cdc8d5c2e216669f46,2025-03-13T19:15:49.370000 +CVE-2024-6354,0,1,36b911a8bccf1843ecfd3b30e222c7cea3be951fcc6dea1b76d52cdcc7af4e33,2025-03-28T16:19:33.260000 CVE-2024-6355,0,0,1a7342d55f17bb222d87b5a8aab97562ff1d52e95ca0e20d2b55888a028fccfc,2024-11-21T09:49:28.797000 CVE-2024-6356,0,0,391f80ddd9c80912d68ca7cb34a9ed8abc87902780460bba886ae0d7ec0ded03,2025-02-05T10:15:22.523000 CVE-2024-6357,0,0,ac68351f8f2ae9df9a3fd8303856280c67b015f60c2dc9118a8436cb09ca3676,2024-08-19T17:23:16.973000 @@ -277813,7 +277818,7 @@ CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566f CVE-2024-6489,0,0,231e9813e515f1abdef06bf7e87ae67da0b47c391d532eef0539e6f69c239697,2025-02-04T18:04:39.737000 CVE-2024-6490,0,0,f07c5d01534f9d7db74ad4f9c70da26cd7d2ecd19d83d76ec7babc7619efc0e4,2024-11-21T09:49:44.290000 CVE-2024-6491,0,0,a07e0d56f7fc28c3f1292b90a22fd6a616cc710caf31e939ed63246741b6e559,2025-02-04T18:04:16.517000 -CVE-2024-6492,0,0,9c2414922871ab30614f56835ecccc8694f189e5e267c59f2a5c738ba43c5038,2024-11-21T09:49:44.590000 +CVE-2024-6492,0,1,36a4a1db3aaa39764112385de78ff2b5ce319dcb4c7577f39d9fee3ff43cf6e7,2025-03-28T16:22:07.177000 CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff16217,2024-09-27T21:28:49.020000 CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000 CVE-2024-6495,0,0,552714992ade7df369704ec5a67abc29783969349a6aa7efbf61b2aacecb1af3,2025-01-15T17:37:12.707000 @@ -278654,7 +278659,7 @@ CVE-2024-7399,0,0,c63a2f56ac97180c8eeaff7425fc4e1891afb5117e5e5ee0a06426ef5c6cec CVE-2024-7400,0,0,b76f467bea873c8198d239fa89d885a8d397522f6f80ed1fa2b1862679c1bdd0,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,0c1aa626bf1f013cd6efcf64cafc89bc58668305e616bb93bc951d283ad465e7,2024-09-05T18:34:17.433000 CVE-2024-7404,0,0,6148e9ce6d58228af84e4655cbde2088c6036af50794e9b6097ba0e8b415003e,2024-12-12T21:48:13.673000 -CVE-2024-7407,1,1,d00d43dbbd913d662b499a9096f6a0c797a075c158935863f0d5c141726d1d39,2025-03-28T13:15:40.760000 +CVE-2024-7407,0,0,d00d43dbbd913d662b499a9096f6a0c797a075c158935863f0d5c141726d1d39,2025-03-28T13:15:40.760000 CVE-2024-7408,0,0,941fb6d771fbc604d540f68018eab8ecb75ec650c1b66e874ba92cbbafa4a029,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,745add50a7f9f83aeae3165fe582507d9b760d467cb9268750136f81de9a6463,2024-12-12T04:15:08.177000 CVE-2024-7410,0,0,3acc879284fb297363138787309c2aa9ff410cc3958418c08efd55e0119fa6e8,2024-08-12T13:41:36.517000 @@ -279363,7 +279368,7 @@ CVE-2024-8172,0,0,5e062d7fa9b382dea93e1f767fffb1fa53a9fae08c970d11918d99fbdd4158 CVE-2024-8173,0,0,79d0a5bcc298ac96a53f7987d1a6d8cd25e9e6d09db6737baa14ffb177e446db,2024-09-05T18:39:00.950000 CVE-2024-8174,0,0,3446999d604a73b64824b7dfc0f9030b87b9bf86620bf485c6700ced4124e5f3,2024-08-27T14:32:08.607000 CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000 -CVE-2024-8176,0,0,006810a4d7106c310b9a2cc60ff63ef3c53febee391d37178f91b3de5a1cdfa3,2025-03-17T17:15:36.167000 +CVE-2024-8176,0,1,01a8df828e80c9f18e787cea5f03b7bf9ef4a881de418100d7f98fcac62a2ae1,2025-03-28T15:15:46.157000 CVE-2024-8177,0,0,b6b87a35240fa465258bcf1069a2f42ce120e742e643226c45df1f3c07fd30d8,2024-12-13T01:29:28.587000 CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000 CVE-2024-8179,0,0,b1b4aece608ad1a17ae7c49798e553f4880b682fdd1e7f65e9fe5b21bed13415,2024-12-12T12:15:27.937000 @@ -281087,8 +281092,8 @@ CVE-2025-0184,0,0,b184a63ccfba52aab27fef6691d340e1daddf4d99a47576e2d38909af97d37 CVE-2025-0185,0,0,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000 CVE-2025-0187,0,0,d12a337bc74d87519d5374b684a3dea7ffdd06cf77effdc0f40e0dc463609868,2025-03-20T10:15:51.413000 CVE-2025-0188,0,0,e9031ff53ffef21475c8aa9f8ab1c19b6522b51f136de0f15b15cb0b70e0e528,2025-03-20T10:15:51.533000 -CVE-2025-0189,0,1,eb102a6a48c92eda67c16e70908cbfabd41b03486056a8f701abee55cf0ab25b,2025-03-28T14:31:37.077000 -CVE-2025-0190,0,1,53e2908612bb73c2c24609187f041bdce849fd9fe447d49d2376c215d06f80fc,2025-03-28T14:28:25.273000 +CVE-2025-0189,0,0,eb102a6a48c92eda67c16e70908cbfabd41b03486056a8f701abee55cf0ab25b,2025-03-28T14:31:37.077000 +CVE-2025-0190,0,0,53e2908612bb73c2c24609187f041bdce849fd9fe447d49d2376c215d06f80fc,2025-03-28T14:28:25.273000 CVE-2025-0191,0,0,64c66c7c1427f64cc3892b0da850af5ec28804e7cd62aedbe5c560debd12fdd9,2025-03-20T10:15:51.907000 CVE-2025-0192,0,0,4efec9c1255ccd0a3d2bb956c84c31801bd3aa354ef28ec5fc9595ff9332bb67,2025-03-20T10:15:52.033000 CVE-2025-0193,0,0,e17fc9e0ccd728e301ded30b14f7be42c74aa85aac5db475710fd304e3ff3102,2025-01-15T11:15:09.280000 @@ -281147,7 +281152,7 @@ CVE-2025-0254,0,0,c0b515e46d918691acf880cf7e48dd1484bbbda9200e70d05e0bbba9fd762e CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000 CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000 CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000 -CVE-2025-0281,0,1,2f178337cc54bece29a62c185e27ac31b0fc9ea32855fcb9c996c42739c26e1a,2025-03-28T14:22:53.790000 +CVE-2025-0281,0,0,2f178337cc54bece29a62c185e27ac31b0fc9ea32855fcb9c996c42739c26e1a,2025-03-28T14:22:53.790000 CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 CVE-2025-0285,0,0,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000 @@ -281172,7 +281177,7 @@ CVE-2025-0306,0,0,d624312a1c8b12756fc5d0bd3e740f6bb7afb0946b71499dfca32a0f9d8ebf CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da39d,2025-02-07T18:15:28.337000 CVE-2025-0308,0,0,69aa7199372cd49af22bdf53a6d4af3a3fe1a182a67295d9df7e0ede45a3d01c,2025-02-25T22:14:17.707000 CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000 -CVE-2025-0312,0,1,a77dfe55b9b8e9fd0cba677d874c5e6e1fc87ea1c4a7421660dac4e10405e186,2025-03-28T14:11:12.457000 +CVE-2025-0312,0,0,a77dfe55b9b8e9fd0cba677d874c5e6e1fc87ea1c4a7421660dac4e10405e186,2025-03-28T14:11:12.457000 CVE-2025-0313,0,0,e04e59ca18724183fc504276fd01824f7c821656cc44b0d64bb8f617e07b8fd8,2025-03-20T16:15:14.923000 CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000 CVE-2025-0315,0,0,5d98fa6a770161856e42c23257da6b1a5bceff2066d6b0d41a72d94c75bb0350,2025-03-20T10:15:52.530000 @@ -281655,7 +281660,7 @@ CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b5 CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000 CVE-2025-0985,0,0,b7e69fe9aab5a8f8f386d8658128b018c3bd5d2957b0618e798c2f6db4110f39,2025-02-28T17:15:15.937000 -CVE-2025-0986,1,1,ed15f2edadbeabb249f8bae31b072a394f7d803c08951aaaa5c8a49022221b78,2025-03-28T14:15:19.357000 +CVE-2025-0986,0,0,ed15f2edadbeabb249f8bae31b072a394f7d803c08951aaaa5c8a49022221b78,2025-03-28T14:15:19.357000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000 CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000 @@ -281805,7 +281810,7 @@ CVE-2025-1189,0,0,e4eb678cba834278c817b0655cf1d1ccb0ebf3aac198cbef30b78dc9ecdd35 CVE-2025-1190,0,0,33f0c1cfdf1b5453d3ca4168d001f81bd5d9763fb79c5da74115fc04295cf4e5,2025-02-18T18:47:00.127000 CVE-2025-1191,0,0,68ae64db52ba71826cca74e51d5098a0f6b7516bdf742f4f6aa2dfaf1af2b56d,2025-02-18T17:51:51.260000 CVE-2025-1192,0,0,bddfdd8bf7ec90d72695992bca2c3b133244650a31e9e38c0b8b8d53178351ce,2025-02-18T17:52:35.107000 -CVE-2025-1193,0,0,27e75799b537e2de7edb54e06b6e2c56ad7e3022fd1313c3a37564f7ef341b08,2025-02-10T18:15:34.273000 +CVE-2025-1193,0,1,eb3ead96a13b793e6e9b5b92bec2342b3721a77c6d9f3280b201ec2aa1c59b07,2025-03-28T16:20:35.580000 CVE-2025-1195,0,0,80f030388af8fea7825bd1907b4fe21f17857f909b5920854f4ff3175ca4ca32,2025-02-20T20:37:54.487000 CVE-2025-1196,0,0,dd006c25814afd256aa97758b279860261417526a6b19678795b25893f289a48,2025-02-20T20:38:49.990000 CVE-2025-1197,0,0,de43e5b6692d1b9b0eebd9c927bc4fff429b39277d83cf06754f96cad74186b0,2025-02-24T16:15:20.820000 @@ -281836,7 +281841,7 @@ CVE-2025-1227,0,0,d63c7e3c8d25c84b516f2d4288c4058312ea310a35098a6f5f948110a8cf3b CVE-2025-1228,0,0,12c830b22a778120983d037d36321ed8fb02836367f4bbbd9be0e19668100480,2025-02-12T22:15:41.493000 CVE-2025-1229,0,0,fa5787151bd081a7c3655f50c46799853d648eeeec0e4010ed7332955f8d9df1,2025-02-12T22:15:41.667000 CVE-2025-1230,0,0,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448d5,2025-02-12T11:15:11.230000 -CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef33383e,2025-02-11T15:15:20.643000 +CVE-2025-1231,0,1,dcc7744995b7d6bb53bad0c3a17ccdace3cc9ce75803cc23b72d1ab8d116a265,2025-03-28T16:22:09.763000 CVE-2025-1232,0,0,70fa05f64d70f4f99806ee5917ab254387b18b5b1cbfa977b5d854807b6ef4a0,2025-03-19T15:15:53.263000 CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000 CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000 @@ -282081,8 +282086,8 @@ CVE-2025-1628,0,0,0981be15b6355fe96e6cf6533415aadaefca54b32ab4ef2345058038a2f7e6 CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0c3,2025-02-24T05:15:11.280000 CVE-2025-1632,0,0,73963594ec349af4ff5563baefa2275473270d101d132ae7dd238c3c85b0ecda,2025-03-25T15:41:41.683000 CVE-2025-1634,0,0,765d25a71e7596e3d1f1f1f40fca8aaec5cc08e3158b2f39db981240c06c1630,2025-03-03T14:15:34.237000 -CVE-2025-1635,0,0,47aabed071498e67f6b790182bf107f39e0743498ccf0a7bbe6a278ecc424354,2025-03-18T17:15:45.017000 -CVE-2025-1636,0,0,5c3492630ae3406e3a5b69018aeb8c51fcf5010ce6bdb8f42c1a19106407dd65,2025-03-18T17:15:45.263000 +CVE-2025-1635,0,1,0499f172f9ad04082d92344ffc1551c65c1ba825d69539bd091607b7115ee757,2025-03-28T16:20:27.283000 +CVE-2025-1636,0,1,76209b53ada620ac1db5782040876be75fe1cf6931e7839f2c9a9e46ee35bb38,2025-03-28T16:20:21.163000 CVE-2025-1638,0,0,627220f87bb0a3619d145b1fa74713ce7dfbc18460f28421739180b159028d87,2025-03-01T08:15:34.167000 CVE-2025-1639,0,0,da159a509ff0db0fc6859254884c97bbcb558323cbe73cc135353de09e900bc4,2025-03-05T16:42:35.967000 CVE-2025-1640,0,0,ba1070cfb95f1953dddd4c9b0d163f5480fe2b853bdc18f3b9a9da9de694a46b,2025-02-28T17:50:32.953000 @@ -282097,7 +282102,7 @@ CVE-2025-1649,0,0,3b5fbb2e4731dcc40a7a4ed88d2c8a60211ff1f5cbe5c969993021f107517e CVE-2025-1650,0,0,4218c32cbb82256e1ff0a9ceabf09dcbbee0c890d930e1b88a57eb073009cf05,2025-03-13T17:15:35.990000 CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf17c,2025-03-13T17:15:36.153000 CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000 -CVE-2025-1653,0,1,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000 +CVE-2025-1653,0,0,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000 CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000 CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000 CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000 @@ -282153,19 +282158,19 @@ CVE-2025-1755,0,0,09476b6d542bfcc927e067fe8e3ce0d3ca1fbe0a9d5ffac658df7f448d43f3 CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000 CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000 CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000 -CVE-2025-1762,0,0,ce5f230370b79f7bc53052e2ff511d886eca4bd8b9760a3e1a224e01388ab45e,2025-03-28T06:15:32.770000 +CVE-2025-1762,0,1,ed408e94e382a24562a9dcd1306de2cef96ecfa0e24adc939b624bf82fa44f9c,2025-03-28T15:15:46.297000 CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000 CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000 CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000 CVE-2025-1768,0,0,21c4d8708441d636d3d85a241f0a7821ff945f56838f66ee7adb3147ed9da671,2025-03-07T11:15:15.653000 CVE-2025-1769,0,0,40a5f722c30fac35eb6f1c2b5584f1f53ecf84c5015f4b5e10367b65507f6b46,2025-03-27T16:45:27.850000 CVE-2025-1770,0,0,dabca41c99283c1e30c784be93a5fbf7941611623d961fbc22d34f6c0b873c34,2025-03-20T06:15:22.903000 -CVE-2025-1771,0,0,f941eeb87406f27b32688fc24536403440e01c6f12dad32afe5e745de8f06ad7,2025-03-15T05:15:47.253000 -CVE-2025-1773,0,0,8ec8dbded090ba64a07cfd6b14e86950d4c62160e124de793edae4c60a6f92e5,2025-03-15T05:15:47.403000 +CVE-2025-1771,0,1,fbe92b0fe50601c60b5583b38f822aee7d75f574ab45d98310de4f563be4c316,2025-03-28T15:05:47.470000 +CVE-2025-1773,0,1,e53acc6a4d10abe2acaf7ea6efebc18b3608dede84de9a0653563728a0b5f4b1,2025-03-28T15:02:33.313000 CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000 CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000 CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000 -CVE-2025-1781,1,1,9110731c3988f380d19d25549f49f14dcac832bed7aa92d5e3ee29cdbb0c344e,2025-03-28T14:15:19.687000 +CVE-2025-1781,0,0,9110731c3988f380d19d25549f49f14dcac832bed7aa92d5e3ee29cdbb0c344e,2025-03-28T14:15:19.687000 CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000 CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000 CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000 @@ -282336,7 +282341,7 @@ CVE-2025-2002,0,0,f6633a4bf95f1acca6461e5746742a468fcfc4de740f49e091d294f640d7fe CVE-2025-20021,0,0,cf31c7f602ee9b0ba953ed77eb772822363a1b9145058bcffb29e8773e23b7d0,2025-03-04T19:12:58.403000 CVE-2025-20024,0,0,1421aed3b28d8aa108abc69a83b80de8afd5f6f8b68be3b64553a4ed5e3780c6,2025-03-04T19:12:22.553000 CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000 -CVE-2025-2003,0,0,1b1804be805ddc2f4a439446a67f221006a8e61bdc04aeb480345599447d9d73,2025-03-05T20:16:06.380000 +CVE-2025-2003,0,1,1ff74da9902681eb388838cb7011652f9b1b0fb32f468944cb3ae220136a25e3,2025-03-28T16:22:53.547000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 CVE-2025-20042,0,0,7331f9a32fa8f7edda7e90ecfb8214172e30817ece2cf7e097fe968d19847586,2025-03-04T19:11:26.743000 @@ -282365,8 +282370,8 @@ CVE-2025-20118,0,0,46ee44de51b9da02bd8d432dfa199efdea3d4009128ccc31daf3be958d7ba CVE-2025-20119,0,0,966174a4c9d991ad6b83e65d9f7d13b4b14250c9460c971b03cac87408097d39,2025-02-26T18:15:14.570000 CVE-2025-2012,0,0,0b8d8afd00eda96ec005af8edf0d7d04b1fb0ed2ed11512934641682f43663d5,2025-03-11T21:15:52.333000 CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 -CVE-2025-20124,0,1,6db356d2fcd38b26aa3e47d7a0ec82ed7c18925211d51966c9b8a29c55acd1c9,2025-03-28T13:22:42.077000 -CVE-2025-20125,0,1,d061ff1519e48d95901944b45526454224b9d67046eae5a72bdd0b7b8937d87d,2025-03-28T13:37:16.650000 +CVE-2025-20124,0,0,6db356d2fcd38b26aa3e47d7a0ec82ed7c18925211d51966c9b8a29c55acd1c9,2025-03-28T13:22:42.077000 +CVE-2025-20125,0,0,d061ff1519e48d95901944b45526454224b9d67046eae5a72bdd0b7b8937d87d,2025-03-28T13:37:16.650000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000 CVE-2025-2013,0,0,7432ed434a81be08eebea71dc536132f3b4153ef4361ce42ddf523e2ec29dcd5,2025-03-11T21:15:52.473000 @@ -282406,8 +282411,8 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000 CVE-2025-2020,0,0,ce26c5965e99864b9e0a9b9af3af837a751d1f222c43aeb691010c4ea46e517a,2025-03-11T21:15:53.477000 -CVE-2025-20204,0,1,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000 -CVE-2025-20205,0,1,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000 +CVE-2025-20204,0,0,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000 +CVE-2025-20205,0,0,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000 CVE-2025-20206,0,0,9a82394590b91b4aed7223068e34dd2e6c890c30b29f73231c2aa9f9587d8fd0,2025-03-05T17:15:14.450000 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 CVE-2025-20208,0,0,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000 @@ -282591,7 +282596,7 @@ CVE-2025-21105,0,0,7769ede7d6d67929cda835ad36f1b7f8a4f0b24a4fa55bfbbf6043d06ace2 CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2f91,2025-02-20T12:15:11.373000 CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000 CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 -CVE-2025-21117,0,1,645b1da2e8af06c5f3d21bae0eae50f754102ea2f31528d1d042846d09e2ec44,2025-03-28T13:24:51.620000 +CVE-2025-21117,0,0,645b1da2e8af06c5f3d21bae0eae50f754102ea2f31528d1d042846d09e2ec44,2025-03-28T13:24:51.620000 CVE-2025-2112,0,0,12876043094c79f81e904e1d2257170a373b17e7d0d24c6eb1a19e93cc051c0d,2025-03-10T16:15:13.817000 CVE-2025-21121,0,0,802c8ab06cca7a283fc5df774dee22f4815bee93ce4d27eceff64530964239b4,2025-03-03T14:59:35.637000 CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000 @@ -283010,7 +283015,7 @@ CVE-2025-21636,0,0,3ae85a8633d6e4c7c4afc5f451961d9da40e543a763d571ae649ce9785a31 CVE-2025-21637,0,0,05925b5efa9f02ac6aa5ea9a870677d070a2594d067656530286fdfa84ac33a2,2025-02-27T22:01:21.430000 CVE-2025-21638,0,0,2cf12756103fa057c758685520e5d32673cabca9788320ddb76ebc6dafda2566,2025-02-27T22:01:34.240000 CVE-2025-21639,0,0,6951f75342622895a60945bf95682a2b99fe500b47ade5ffb8d5307929bbefd5,2025-02-27T22:01:10.337000 -CVE-2025-2164,0,0,900cdbdb61ceb1074a5b4a7bb3af5359c5aca5494dec7a9cf45edd03737a9725,2025-03-15T04:15:22.260000 +CVE-2025-2164,0,1,d129d9f55d497cb5ee956a685ad5a71b65aaa7cdf73250ad0c7ad1c2f1b56f93,2025-03-28T16:07:07.700000 CVE-2025-21640,0,0,543f40a49c92fa803e05fd285cd1c9581d6fecdba4ff3a54d984f97f6ee95e4a,2025-02-27T22:01:01.257000 CVE-2025-21641,0,0,e146fe147f4fa7c09deeed8b7b710dae78c5022fd48636d72f67d9a8f95f9998,2025-02-27T15:15:08.843000 CVE-2025-21642,0,0,db386d9b7ed30d3f5c13d931cfd57fded14502dce954776abee9b860bf0b293e,2025-02-28T18:54:58.420000 @@ -283235,7 +283240,7 @@ CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809 CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000 CVE-2025-21853,0,0,69aef8837c81847ced3742cc31c58a0f2fa01f1030a59d09ec56b6defad2ef68,2025-03-13T16:30:22.740000 CVE-2025-21854,0,0,9c78450b8715b387e8b26947750bb1e0ffed5820b15e3f2e0a35a80d6d8f2f8c,2025-03-13T21:18:24.623000 -CVE-2025-21855,0,0,ac6ee5f35379a2857d20f2a16134ba52ced6422d01cb5d14bb2ca34275bd4e05,2025-03-13T21:18:17.013000 +CVE-2025-21855,0,1,b60684fe956750d19be1267ce72b8af8344e6c62db29457ed70e99353d1b5be9,2025-03-28T16:15:28.047000 CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4332,2025-03-13T21:18:08.423000 CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000 CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000 @@ -283260,7 +283265,7 @@ CVE-2025-21875,0,0,b5625c8e550275d03916a5a20e4feeb93d091dd6e8a0bc9bd35a7506d0cb5 CVE-2025-21876,0,0,4a0038b7c7e3ad9384cea82279b1cf64a05a3e4225ed9d56a36a485128171757,2025-03-27T16:45:12.210000 CVE-2025-21877,0,0,c437563af9a3bbb4466053437f14e6318de6523f073b70a549fee56451cd2d50,2025-03-27T16:45:12.210000 CVE-2025-21878,0,0,85bb1d4ce91851874a9876add0fe2bdb719454b0f602c413429852acacb7c4e9,2025-03-27T16:45:12.210000 -CVE-2025-21879,0,0,f898a4c7a195d54b37167f5fa610cb1df343883f0a4083de16fe54ec6dcdf952,2025-03-27T16:45:12.210000 +CVE-2025-21879,0,1,75655f5a5bc5528b706a589f55c3efbfd28ed61fa015fc73f11c37ccde2072ef,2025-03-28T16:15:28.220000 CVE-2025-21880,0,0,65446dd7a88d3aea0edc0fbbc44ae1ecb39e31762207fdb90d675ebb3ecfd495,2025-03-27T16:45:12.210000 CVE-2025-21881,0,0,621c593ef852fd10664a6193911b19f75ba42ef286e0ef80709cdd2519027040,2025-03-27T16:45:12.210000 CVE-2025-21882,0,0,b07c3caf9a06f9aa5a6a3daff13eb0af4f51c57b66970e54bef6a1226adf5b1d,2025-03-27T16:45:12.210000 @@ -283442,9 +283447,11 @@ CVE-2025-22352,0,0,05ab364f7e7a1c5c049208b0f9460479a7ff74cb37dbb98d3f27efafd51be CVE-2025-22353,0,0,000f3439c34c0fd18a96f9bb39dd1b25c8059f2fcd0e1683a6551f664e444d87,2025-01-07T11:15:18.693000 CVE-2025-22354,0,0,66e404e55340b213b0c2657d1f6b7ed8a803e8838cb6bbee91b29999b4687ec1,2025-01-07T17:15:33.230000 CVE-2025-22355,0,0,ca39854898c1796213661f5ba88920b4dbe4062400b636abea87602baebf8bcc,2025-01-07T11:15:18.857000 +CVE-2025-22356,1,1,f66e564e441e6a31914a9bb8a7588151fe7dec30c3ccb2bf4c774036642a51a2,2025-03-28T15:15:46.490000 CVE-2025-22357,0,0,8145dc70a7e6819f28516928dba6a6374a9f2bfc6bb0f15e92ae4f33b07e879f,2025-01-07T11:15:19.013000 CVE-2025-22358,0,0,58275121d439329ac6bcb88bfbc8948125788be2bee13fdbccdb8edd57659b00,2025-01-07T11:15:19.167000 CVE-2025-22359,0,0,995a1cace9e7721854dee56d9daa4b4cd821bc63cb750269e526e424750b384b,2025-01-07T11:15:19.310000 +CVE-2025-22360,1,1,580ef71ac9fa009edf5b1ead3908022ca89b43b2036176e5e9dfe965196629df,2025-03-28T15:15:46.653000 CVE-2025-22361,0,0,af12e2c6ebfec3624d0ee30cd638aa7b24fc59355579c0263e32fae5077df9f7,2025-01-09T16:16:26.830000 CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf16a,2025-01-07T11:15:19.453000 CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000 @@ -283495,6 +283502,7 @@ CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-2250,0,0,6a0e04abb2adbc03bbe00299adb0beb9b8293cf33361973132e7a4e0a309006c,2025-03-13T04:15:23.137000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 +CVE-2025-22501,1,1,f764511be8b399ef05e4ccd91d6432c253d7550ed40d1d01d5036be9672bf429,2025-03-28T15:15:46.790000 CVE-2025-22502,0,0,3183867d6d0bb4304290089bf31cd36b52e2a0152aa74b8aad25d0ed6a2a48d9,2025-01-07T16:15:45.717000 CVE-2025-22503,0,0,2312eda7beecfe6ecfb9249f8a971c65cfe30e58668d20a90b2c6b9852f7f977,2025-01-07T16:15:45.877000 CVE-2025-22504,0,0,a9139c7e10a4bdae0f6c289db8b58ce819e8b48dfb9a72eac5250d51a0c5e3e4,2025-01-09T16:16:27.110000 @@ -283516,8 +283524,10 @@ CVE-2025-2252,0,0,8225b36f95860f767886fbbd52c7dc832516be319652facf235d70dcb25749 CVE-2025-22520,0,0,d90fcded13c83210ff25a704cf2d7700ad6fc2bbd95729d89ec73c52d86588de,2025-01-07T16:15:47.310000 CVE-2025-22521,0,0,e62fb335e410addf0641d689eefeeec9d9054d8a13b83f38fee365914160d44b,2025-01-09T16:16:27.743000 CVE-2025-22522,0,0,1ebc82346c4e34dee12844f6aa464ab0e7c0d220eb4925eee3392344e450fdee,2025-01-07T16:15:47.513000 +CVE-2025-22523,1,1,571fb27b1a71084b0550d66118199cd511fd05776edc5144dea99385547d5410,2025-03-28T15:15:46.930000 CVE-2025-22524,0,0,8a23e2aa149aafa1995794612c63a3f12fada023081e14e67818a48edc5f07e4,2025-01-07T16:15:47.680000 CVE-2025-22525,0,0,2450e2a7890b860ebbedbee23a3778e19f1af2d502cf8e6fca48c14a5e43a264,2025-01-07T16:15:47.830000 +CVE-2025-22526,1,1,0116cd0dc36d5d75b394e47514fa7a68168fc69fe6489cd0b781b82b3130e6d3,2025-03-28T15:15:47.067000 CVE-2025-22527,0,0,dddb72d486920faec7518243d87904d14ce0784eb212bedd940fa2ffaca5856a,2025-01-09T16:16:27.890000 CVE-2025-22528,0,0,587c2eb86a91198b816a3b392027083dc7733d721ed5f73afa2d78180d1fdaca,2025-01-07T16:15:47.987000 CVE-2025-22529,0,0,f078564d1a2cecc5128f9b5ad9b171bcf776a688face6093deb4549ab61309fe,2025-01-07T16:15:48.180000 @@ -283557,6 +283567,7 @@ CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5 CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000 CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000 CVE-2025-22564,0,0,c6bcdc2f84aa39c7ba65ae760aaf069d1367d782297729876d0295b371334f83,2025-01-31T09:15:07.627000 +CVE-2025-22566,1,1,6ab24387f0e08fe630e9a2da799ac67e4ee47c64288e0fec37f660c5c7df2f9d,2025-03-28T15:15:47.210000 CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000 CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000 CVE-2025-22569,0,0,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000 @@ -283566,6 +283577,7 @@ CVE-2025-22571,0,0,589592d19e0408795b9c88db00be613623e0a28c0ced64bee3ab080db5508 CVE-2025-22572,0,0,09d362e6905110bf03efd8d9b3422685fc5a6f559575660b2f11c273a0d7b10c,2025-01-07T16:15:53.357000 CVE-2025-22573,0,0,cef0a0fee2a846fdd99777eab6d59d8922d33c31d91c1289eff639dfb1ced15d,2025-01-07T16:15:53.520000 CVE-2025-22574,0,0,84e101e6655207515e3d308aae10328b324f66020c49c27e6a9a740f08e66749,2025-01-07T16:15:53.667000 +CVE-2025-22575,1,1,e9a0d68eeeec2e5d05fa557ad057d6034f6501f1166684f77d113aeb31d41c54,2025-03-28T15:15:47.350000 CVE-2025-22576,0,0,d91ec1220267346d1a0f0443983782bbf181c797facca8f491a7bfecb878d90d,2025-01-13T14:15:12.117000 CVE-2025-22577,0,0,de49ca44634bd4c2dcd4ed4b2c861f3aeca16b15d3e20dc646883514b316145b,2025-01-07T16:15:53.823000 CVE-2025-22578,0,0,a663c0074d74b9b4b7e504663f4236ea23bd746235c7a6cf544a9a518e4833f7,2025-01-07T16:15:53.970000 @@ -283657,7 +283669,7 @@ CVE-2025-22665,0,0,ee04fd003d3737181aa71ed8aee1455af1ed540c5946074dd04fa358f3424 CVE-2025-22667,0,0,2ab317bfb9739f9ac69abaab5066562f28e15bdd464ff7c31f6ed096782914f7,2025-03-27T16:45:12.210000 CVE-2025-22668,0,0,d1a30578a3813e474f66c5bc21c20232c78286e745c9ce23f3a63f59b8708ff3,2025-03-27T16:45:12.210000 CVE-2025-22669,0,0,e5fbf912bc05fa45475aad2c168ae954ab63ba0abbd5bea8bdde2e4ebd40e813,2025-03-27T16:45:12.210000 -CVE-2025-2267,0,0,8ebcb576f6cf45b856cc4a4913dbe0761ad22d81a4d32ef5308ef162a12eadbc,2025-03-15T04:15:22.443000 +CVE-2025-2267,0,1,0c210bb94de91f1a5c946acfcd05444c3820c09c735514c8cda79d04010d61ad,2025-03-28T15:41:57.253000 CVE-2025-22670,0,0,f7d120be15ec687637a24f4cfe34ca174d878f05cc9709f53bbf32189a117b75,2025-03-27T16:45:12.210000 CVE-2025-22671,0,0,7049746c0103b49a53468496e534a8831850ccdfee2f43af04ce208028c9bf54,2025-03-27T16:45:12.210000 CVE-2025-22672,0,0,d6fe52a7a95257cebb58cc9fe6e43dddd5412620585ce73657df41a91a7113a6,2025-03-27T16:45:12.210000 @@ -283746,9 +283758,10 @@ CVE-2025-22763,0,0,947af1deb8d9cae5ca079e909cf29879fdb4e7f4a385aecbc64b3952727ab CVE-2025-22764,0,0,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4fd3,2025-01-15T16:15:39.373000 CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000 CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000 +CVE-2025-22767,1,1,906bf89a24611fd4deed246b2242643be50252a1e1a56dc404717f2c6936d024,2025-03-28T15:15:47.490000 CVE-2025-22768,0,0,d67e24e3bb095b6fc3cdd1ddf309e20d3ead32546acca77b1e796ad170199e1e,2025-01-23T16:15:37.403000 CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 -CVE-2025-2277,0,0,cf9ff4985b9ed26fd50a71c17f474b066305b0d2fd8d5ad5d89d1344cd28a585,2025-03-18T17:15:47.460000 +CVE-2025-2277,0,1,a8bc5cd0b16e309d43e095ac49658b66e2986d9cb52a0ffd2f162d5b8eec71aa,2025-03-28T16:22:58.023000 CVE-2025-22770,0,0,6c0a61f5d2c09a807a23423a9bcfcaaafa14efb25e8cd93f2594fef192e51f9d,2025-03-27T16:45:12.210000 CVE-2025-22772,0,0,a49a7641398a6c78abf7bdcb1538e84ecbf25664c0b69cb2fc2516de3178101d,2025-01-22T15:15:14.990000 CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 @@ -283757,7 +283770,7 @@ CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22 CVE-2025-22778,0,0,a2bc20469f55e874da32fca9be88da64c934748fc51c1927967277612aa1f61f,2025-01-15T16:15:40.350000 CVE-2025-22779,0,0,1dbe2ad312835dc346b83ea64bb7019d11586a48cc8d249ef5a6c76c895b3238,2025-01-15T16:15:40.510000 -CVE-2025-2278,0,0,561180bd46cf51d19a3cdbb94bf0249db283e0249df2bb035a2b96b1dc90d1f4,2025-03-18T17:15:47.670000 +CVE-2025-2278,0,1,1f6ba3e8865a0fc197221680bef34c2019c013aa87a883c69215d2a422304533,2025-03-28T16:23:02.837000 CVE-2025-22780,0,0,2d5a324e293c4c4f1be80441263a70eba23c271f2f2cb79bdaadc07dcabb9591,2025-01-15T16:15:40.660000 CVE-2025-22781,0,0,1afa1e21c86cac8ee7b1d1071985c89e8ee67ff99915e1b488521ef5a115afa5,2025-01-15T16:15:40.813000 CVE-2025-22782,0,0,4d4a57c4ca0b47080b236548a74a5ed3bac54edcb8336bdf840fd3b341ca7ef9,2025-01-15T16:15:40.973000 @@ -283773,7 +283786,7 @@ CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9 CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000 CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000 -CVE-2025-2280,0,0,f4a48035829663cfae86ea311e78db4fe353e4689096d30459dc2c2261cf7c40,2025-03-19T14:15:39.743000 +CVE-2025-2280,0,1,3c729bf718b53d7a8fbc2e72fa5f16dcd614901b486dc8adcf49241fbde2616b,2025-03-28T16:23:07.340000 CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000 CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 @@ -285596,7 +285609,7 @@ CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000 CVE-2025-25684,0,0,3b58a1bef0cae9aea4ea5fa2ee9c7e1f876d6c7c88d8df3de973a9b1df4c99cc,2025-03-19T20:15:19.383000 CVE-2025-25685,0,0,204deb7c4ce53f6e492fa281d6e8bf3f8c2d8728cd8c95a39540e1d64c356261,2025-03-21T14:15:16.177000 -CVE-2025-25686,0,0,16544cfc13e7a6b609c704dc6fb6aeb6a50027f9223e1cc198abb8926085b841,2025-03-27T16:45:12.210000 +CVE-2025-25686,0,1,e949e54740011abafbecbb4bc49b486613f5e4303f5a0e5cbdbf56266ecf9912,2025-03-28T16:15:28.993000 CVE-2025-25709,0,0,9d314f451c270f6d71f71b4acae3d9115f11fe64a66489ce5bdac5bbfa4be764,2025-03-12T14:15:16.077000 CVE-2025-25711,0,0,687cbddc40bafa1aa553307129c536c978baa7c3ff70ab2a66988ede6a6f0e53,2025-03-12T16:15:23.023000 CVE-2025-25723,0,0,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000 @@ -285646,11 +285659,11 @@ CVE-2025-25793,0,0,06fda905cb5d366b2dea7114751b25efc66045f1d1efc5dda933bb838933d CVE-2025-25794,0,0,0998585ca8b4d1c33b7e8f931090b2805dd26430daee7449f23e43ab4da36dc0,2025-03-06T18:15:41.883000 CVE-2025-25796,0,0,55b92943226ba1df7d1079492bfa786eeb07d68abd2ff61cb507b6fe778a3f45,2025-03-06T18:15:42.103000 CVE-2025-25797,0,0,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cbc26,2025-03-06T18:15:42.377000 -CVE-2025-25799,0,0,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000 -CVE-2025-25800,0,0,84c0703ad8895be752ba6115cd9ffe473c7260c43dbc52d30ca606520fed7ac5,2025-02-26T16:15:17.053000 -CVE-2025-25802,0,0,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000 +CVE-2025-25799,0,1,415d9296bcdb789b1daa56df27f39194cdf4cfa7d524e01604ed37241e3e04ce,2025-03-28T16:59:59.810000 +CVE-2025-25800,0,1,ea55c8654d981d4133ce161a389a2e22daffcd91bf7b6df3a2ed9667b331879a,2025-03-28T16:59:53.310000 +CVE-2025-25802,0,1,5b7312d109c7306b98466d7b4ccf8332b5ad6cb4414de741bacf1428ceb36893,2025-03-28T16:59:38.873000 CVE-2025-2581,0,0,152f852fdf29a94280a5a1f86deb5956c11dda610413d186f51763bbca5cb2f2,2025-03-27T13:24:49.403000 -CVE-2025-25813,0,0,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000 +CVE-2025-25813,0,1,1cba07b97776d83599b7df63b5b5766d7b58fec6ea11e828d5d68a4a88b39cb9,2025-03-28T16:59:27.230000 CVE-2025-25818,0,0,40ddbafdf9692bd0bb31a2e859c8e57e42e627fd7e19bb409eb5a4ac63b878d1,2025-03-03T17:15:15.230000 CVE-2025-2582,0,0,4785ce7c12661aad317c69e36620dea23112ae200c7b0211413b5528a73e06a9,2025-03-24T14:29:50.370000 CVE-2025-25823,0,0,01cc00e46c57e1cd4b84caa1ec0705b698501680e84031ab252f0d5809c36fcf,2025-03-06T21:15:15.130000 @@ -285784,7 +285797,7 @@ CVE-2025-2626,0,0,2ec672e2fe0c1e79dfa3082efb3637c788281bb0a435927822d89abd613cd4 CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000 CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000 CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000 -CVE-2025-26265,0,0,dfd260c0fccd729b752a019ec6af0a4a8e67997f385fa4c034496b4b03036302,2025-03-27T16:45:12.210000 +CVE-2025-26265,0,1,a1e1cddd3368455d8fc7af1822e4326b1b03402845c4f5127e6206ac1ed92a37,2025-03-28T15:15:47.830000 CVE-2025-2627,0,0,866d688a78139ad30a252503dfe1e20ddb58caaa73407bb43bc362af005f98f6,2025-03-24T15:15:17.530000 CVE-2025-2628,0,0,83a1631f49317916690a06572d89f47748433e4b0c01a8875ee0f80e5ce95629,2025-03-24T14:15:19.187000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 @@ -286242,6 +286255,7 @@ CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3 CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000 CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000 CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e195d,2025-03-27T16:45:46.410000 +CVE-2025-2713,1,1,96361d4a279a8339e89efce75d6906b399a84623aa4512151ae5c208d68dbf4f,2025-03-28T16:15:30.043000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000 CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216889,2025-03-10T19:15:40.770000 @@ -286634,11 +286648,11 @@ CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b9478 CVE-2025-2815,0,0,ae8483c7dc37fd3e44032d03f541292a385437aa962e27f88b8c36a255e50f41,2025-03-28T12:15:15.550000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000 -CVE-2025-28219,1,1,d7fe6408904eaf7d1b8df2498bf4e47705c64034b5d3901d1f8d354d75fdc406,2025-03-28T14:15:20.253000 -CVE-2025-28220,1,1,19854ddd28ca5587c3d8eceae6031d6a48f7eae409d298a89bc08248184124c1,2025-03-28T14:15:20.377000 -CVE-2025-28221,1,1,ae9d4c3b6977b54666ee5723ceeaac1c5cc795e338ba7aa47e34a0f2f6384543,2025-03-28T14:15:20.483000 +CVE-2025-28219,0,0,d7fe6408904eaf7d1b8df2498bf4e47705c64034b5d3901d1f8d354d75fdc406,2025-03-28T14:15:20.253000 +CVE-2025-28220,0,0,19854ddd28ca5587c3d8eceae6031d6a48f7eae409d298a89bc08248184124c1,2025-03-28T14:15:20.377000 +CVE-2025-28221,0,0,ae9d4c3b6977b54666ee5723ceeaac1c5cc795e338ba7aa47e34a0f2f6384543,2025-03-28T14:15:20.483000 CVE-2025-2825,0,0,b0ac602f299249f0031cd4605db7336883e5a9c727d54fb2508254997b2a81ae,2025-03-27T16:45:27.850000 -CVE-2025-28253,0,0,817483eedee34c743a4481820dc3dbf577051ae76a82bf6f0b0a1c9d13de7780,2025-03-27T23:15:34.867000 +CVE-2025-28253,0,1,a8b8aa6ae9cb84bb3406c0157f0953fee5aa3538db7d6748813526907b039fa0,2025-03-28T16:15:29.490000 CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000 CVE-2025-2832,0,0,9ba849558861453fef9ac84ebe5df211359e27bc420cd4cffb0300d913dc6662,2025-03-27T16:45:27.850000 CVE-2025-2833,0,0,eb7c84413fdadec03caac6d347a0740edf7f927c7fe3c7d696d59524f7f2cbfe,2025-03-27T16:45:27.850000 @@ -286650,22 +286664,22 @@ CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e5 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000 CVE-2025-2852,0,0,765e659269b1e0d3eb25b4a8bbde2d93ec95002b11855016ed47d09f9b6497d1,2025-03-27T16:45:12.210000 -CVE-2025-2854,0,1,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000 +CVE-2025-2854,0,0,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000 CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000 -CVE-2025-2857,0,0,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000 -CVE-2025-2858,1,1,6bbee639dd0aab6dd26bbfcd974d0bcddafdc32a33a61593861e278ccf5bda8f,2025-03-28T14:15:20.650000 -CVE-2025-2859,1,1,67f56f2fbf417b2f61e42c53ed212a256361b5ba25b19b84b5ca84c7ed2c0b9d,2025-03-28T14:15:20.810000 -CVE-2025-2860,1,1,2f5f3312ae65adf4f8e2a2e3b13946f9917e6188fdcd30086ab5d086b3970fba,2025-03-28T14:15:20.967000 -CVE-2025-2861,1,1,45a0b85fdef388e3fa22ae322d4e453181f488a75d88d85c29f8ce89913c6443,2025-03-28T14:15:21.113000 -CVE-2025-2862,1,1,fe00293c4cf30ffbab114d7bf2f7dee730dc374d918c22070c7ec496d286c22c,2025-03-28T14:15:21.257000 -CVE-2025-2863,1,1,34e0071c0cdcac7436cc82f177934ff700cbed706c62795b825c9d44db7660cc,2025-03-28T14:15:21.410000 -CVE-2025-2864,1,1,493b556778b174bf0df7fb7bf034c03dcd1c20da8165cd4f2a8ad8b89ce26c0e,2025-03-28T14:15:21.570000 -CVE-2025-2865,1,1,3b9a08d9359bdaa5849a4681ad69ec471503afa2c59d2d24179744630a925929,2025-03-28T14:15:21.727000 +CVE-2025-2857,0,1,8c7f8ac266f15d25c9af4fc5e517cf8a450da35ae1d4923b3d1c4b2dbd19ab2e,2025-03-28T16:15:30.180000 +CVE-2025-2858,0,0,6bbee639dd0aab6dd26bbfcd974d0bcddafdc32a33a61593861e278ccf5bda8f,2025-03-28T14:15:20.650000 +CVE-2025-2859,0,0,67f56f2fbf417b2f61e42c53ed212a256361b5ba25b19b84b5ca84c7ed2c0b9d,2025-03-28T14:15:20.810000 +CVE-2025-2860,0,0,2f5f3312ae65adf4f8e2a2e3b13946f9917e6188fdcd30086ab5d086b3970fba,2025-03-28T14:15:20.967000 +CVE-2025-2861,0,0,45a0b85fdef388e3fa22ae322d4e453181f488a75d88d85c29f8ce89913c6443,2025-03-28T14:15:21.113000 +CVE-2025-2862,0,0,fe00293c4cf30ffbab114d7bf2f7dee730dc374d918c22070c7ec496d286c22c,2025-03-28T14:15:21.257000 +CVE-2025-2863,0,0,34e0071c0cdcac7436cc82f177934ff700cbed706c62795b825c9d44db7660cc,2025-03-28T14:15:21.410000 +CVE-2025-2864,0,0,493b556778b174bf0df7fb7bf034c03dcd1c20da8165cd4f2a8ad8b89ce26c0e,2025-03-28T14:15:21.570000 +CVE-2025-2865,0,0,3b9a08d9359bdaa5849a4681ad69ec471503afa2c59d2d24179744630a925929,2025-03-28T14:15:21.727000 CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000 CVE-2025-2868,0,0,33f03011f98d9b773c14b1eaa32de439498e396e9d02b847bc09f3a2dda95cda,2025-03-28T11:15:37.840000 CVE-2025-2869,0,0,70e39c53ec99674bbca84518f2d52539d24d976a5693f00166c6a21ea8ec0e44,2025-03-28T11:15:38.053000 CVE-2025-2870,0,0,b58b8becc9dd52506e052ae4c75da0c6f2fc105e0d55b4b26829d67c68e704ee,2025-03-28T11:15:38.207000 -CVE-2025-2877,1,1,cc98c6b852ffd3902484764384f64302df452aade6e9454fddef82a200fbdcb4,2025-03-28T14:15:21.877000 +CVE-2025-2877,0,0,cc98c6b852ffd3902484764384f64302df452aade6e9454fddef82a200fbdcb4,2025-03-28T14:15:21.877000 CVE-2025-2878,0,0,28f11500fb554822acb92093abd5f7f7b4e10dac47c29b89b43c371fafe7f359,2025-03-27T23:15:35.067000 CVE-2025-2885,0,0,1f299ee6f9c1687c7ad3d5b4a66ac1f9f94c352f666602218763c98e2dde7ca0,2025-03-27T23:15:35.240000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 @@ -286760,19 +286774,20 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 -CVE-2025-2901,1,1,38f9c417a6c20fb5be2bc1a8b73e0b30e4b01f4859c5680551c20eedbe06df17,2025-03-28T14:15:22.020000 +CVE-2025-2901,0,0,38f9c417a6c20fb5be2bc1a8b73e0b30e4b01f4859c5680551c20eedbe06df17,2025-03-28T14:15:22.020000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 -CVE-2025-29072,0,0,35ce48c77c318e6003a1e18972edd70a67880d00b73ee6fdb606d5e887da4951,2025-03-27T16:45:12.210000 -CVE-2025-2908,1,1,f64cd7fcb5d24ae83e31008923f3bbe96834955e323591c3be0523672ebfdf4d,2025-03-28T13:15:41.217000 -CVE-2025-2909,1,1,3a720593aa3fbf005f652d39614ce0640eb45ef48808a9985cc786293f08c174,2025-03-28T13:15:41.387000 -CVE-2025-2910,1,1,4978130c69eda3969fc4aaa24df412c9ffafc7d3ed2c7fd50401dcf2d877cc1e,2025-03-28T13:15:41.533000 +CVE-2025-29072,0,1,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000 +CVE-2025-2908,0,0,f64cd7fcb5d24ae83e31008923f3bbe96834955e323591c3be0523672ebfdf4d,2025-03-28T13:15:41.217000 +CVE-2025-2909,0,0,3a720593aa3fbf005f652d39614ce0640eb45ef48808a9985cc786293f08c174,2025-03-28T13:15:41.387000 +CVE-2025-2910,0,0,4978130c69eda3969fc4aaa24df412c9ffafc7d3ed2c7fd50401dcf2d877cc1e,2025-03-28T13:15:41.533000 CVE-2025-29100,0,0,0625adea7bf9c09ffed0ed9abe2303de146d9db5873c20263fd526077ae2d8d9,2025-03-27T16:45:46.410000 CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000 -CVE-2025-2911,1,1,9bae5cfa1688da65016914b89758dc8a004a890da707071921228c5eff17be45,2025-03-28T13:15:41.673000 +CVE-2025-2911,0,0,9bae5cfa1688da65016914b89758dc8a004a890da707071921228c5eff17be45,2025-03-28T13:15:41.673000 CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000 +CVE-2025-2912,1,1,5ab256fc4daf55a091c66b443a5cb117e84957e8d8aafcf84069f19e4af8d370,2025-03-28T16:15:30.540000 CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000 CVE-2025-29135,0,0,da45252de14e5b082a9bdba4d9fc8b7a9e0d31f1a0a6a8b0f99fb851cd8fdacf,2025-03-27T16:45:46.410000 CVE-2025-29137,0,0,720ba11d924de175b1bf67482cc142061a1b9799fd3947bba36e81cdb29bc0c0,2025-03-19T21:15:41.063000 @@ -286786,7 +286801,7 @@ CVE-2025-29226,0,0,598431993e1dea28d2a41edf1a133ff19583a46461026345d090d7abff0d6 CVE-2025-29227,0,0,15031612a342f1663453dfb027586c6db2ea2f4e163dcc47110f16a263fdb927,2025-03-21T19:15:46.310000 CVE-2025-29230,0,0,82fd9baf0d57bfe253b1907c4d74fadd09e960a1c557455f486f92c59e6e235a,2025-03-21T18:15:38.943000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 -CVE-2025-29306,0,0,e1023615173b6d92ee43b1044c0a9ac09bc1586c199274f23eafc952a95e5ccf,2025-03-27T19:15:49.290000 +CVE-2025-29306,0,1,4f87f1ebaf7c5b741fadee1edf2e451c434982cd60f837c58193f7ed402bad84,2025-03-28T16:15:29.790000 CVE-2025-29310,0,0,5968624cc4eac663d93be6b2916e12611652e7aaf63c8a9dec75d1bf422a4ce5,2025-03-27T16:45:46.410000 CVE-2025-29311,0,0,161950615d0127c3236db6118583f44a1a788e99b252d828a62135dca0485d9d,2025-03-27T16:45:46.410000 CVE-2025-29312,0,0,ce414325add69c05fcd36bd91b11e6c0ba3aecbf3624ac26ac84c6a1a5a8fea8,2025-03-27T16:45:46.410000 @@ -286818,18 +286833,18 @@ CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b2 CVE-2025-29431,0,0,31720ec0bc8cba4659c1c2d3999cf0913efe8183aa46190b4c6f3ec8b4bb5bc1,2025-03-19T19:15:50.223000 CVE-2025-29483,0,0,1c4dfd2a92ae2ca576ed75da199ffe16123bea30fcc4252e1e6d3267ab61b70c,2025-03-27T19:15:49.380000 CVE-2025-29484,0,0,1bb36b7e889238e32c77bbf1cc0cbeefbc7ec16e65b841e22b84a9a74bef45f0,2025-03-27T16:45:12.210000 -CVE-2025-29485,0,0,de1a86369d082156c421a3233bf3d853b9b73c385a63f0f12155fdcc620be3cf,2025-03-27T16:45:12.210000 -CVE-2025-29486,0,0,b4ca882bf3d4e82aabe25b1ce07ad473b478483d0b500ef2eb50d269623c7e3b,2025-03-27T16:45:12.210000 -CVE-2025-29487,0,0,4f461c675a6a660687c03d3aa7e0fba76af65ea3fb392d2945747bcc747d73be,2025-03-27T16:45:12.210000 -CVE-2025-29488,0,0,6d7ca18964f3ffc4691c000bcebf150e0a5dba4f986bdbb6866d132450afcfcf,2025-03-27T16:45:12.210000 -CVE-2025-29489,0,0,e37ba4a786954d6b97b93249a31a9cbcb28296593dcc7185fa864c7842feea89,2025-03-27T16:45:12.210000 -CVE-2025-29490,0,0,14c31ddebec1a9c1d34abb9b83e3a99901f6579f3b70fd4831843e7a78733e6e,2025-03-27T16:45:12.210000 +CVE-2025-29485,0,1,a90eb4b6c5b21729d86eccd7437a691aeb2a77a7d210351930dbb4a5241de983,2025-03-28T15:15:48.190000 +CVE-2025-29486,0,1,1b3df15e286c8f27c384e8318b565c7647b0a4cfc1c1cd099edc64bf2c6ff74a,2025-03-28T15:15:48.343000 +CVE-2025-29487,0,1,29d4692e859b266290f3ecf47d9a215e6a5cda0a2496ca35008ff62bfd56b8ec,2025-03-28T15:15:48.517000 +CVE-2025-29488,0,1,676354dc442725cc84646407473f7ec622e20118f9911304ed7c1e03a4d3dd62,2025-03-28T15:15:48.677000 +CVE-2025-29489,0,1,c542b0081736f299e3eddc2b10a74e1957379d530c199cc8784590485d3a3612,2025-03-28T15:15:48.843000 +CVE-2025-29490,0,1,239c2ee908d51ad454be4fcc8198d71a5b81e7afb0ced47a96d8814d228ce782,2025-03-28T15:15:49.003000 CVE-2025-29491,0,0,a8ca5ba20032238cecdecb3f597c4593a5afc4806411516f094f73370000dd77,2025-03-27T16:45:12.210000 -CVE-2025-29492,0,0,4094592a4caf64a7a40c6ecddc7cb2bce9a5afdc48f1ed076766211047b5c685,2025-03-27T16:45:12.210000 +CVE-2025-29492,0,1,e81103bf9904a487e48c06929c3a67a543f1e370bb047da816ab0e7790559c26,2025-03-28T15:15:49.160000 CVE-2025-29493,0,0,08a1ab78ec268d739fc1098610e90551a6ad9856cad1af6fff58580c3121e59a,2025-03-27T16:45:12.210000 CVE-2025-29494,0,0,69c8b5e5f693646824ed50741c5ecb70250608ac60c24fbe19dce1ae89d87b16,2025-03-27T16:45:12.210000 CVE-2025-29496,0,0,678ecacecabab25ca8d8a8ac9007e1aa5ec03d73a9037186d88b893590d2e6f9,2025-03-27T16:45:12.210000 -CVE-2025-29497,0,0,947b209706f2a759d81f436e9621775ee35057d394656120063432143fb85767,2025-03-27T16:45:12.210000 +CVE-2025-29497,0,1,e326377f67368daac8dc4e6847d23b1fb255475e030a6e57d99cfca3fa44a44c,2025-03-28T15:15:49.313000 CVE-2025-29635,0,0,777467e4305cb03534788245920edd5bae11b2ba20b7be470dbace3c9dda6025,2025-03-27T16:45:46.410000 CVE-2025-29640,0,0,684661940e38e3fbc4f2676adca19fd07a4b95839bb039ae44b7731f40899f4a,2025-03-24T18:15:23.613000 CVE-2025-29641,0,0,da834c0947f85989328576ecb3102fddbcebc6673f6bdf9795762806f49bd137,2025-03-24T18:15:23.773000 @@ -286870,7 +286885,8 @@ CVE-2025-29923,0,0,89bab0cfc368a6ef6eb66f57c2b9e15b441c30032ed6f96b7591687487c7f CVE-2025-29924,0,0,33ff2ffe448b023fe20ba1aebf83c3931032be11ba9e01550609a234d855b785,2025-03-19T20:15:19.873000 CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4bdc,2025-03-19T20:15:19.987000 CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000 -CVE-2025-29927,0,0,326931490ffe364c6a5bf57ee56c72d130519e69a3e9f76987d9e7afa4b7cc3f,2025-03-23T22:15:13.217000 +CVE-2025-29927,0,1,49e3b1fc7c81fe1198308a06e6e60ce9a5b39547427dcb2d29573308c768b45c,2025-03-28T15:15:49.470000 +CVE-2025-29928,1,1,ebdd8da37c1a6c0e8a7b7c3f48194d57772db75755ce9af767f7cc6981a21f42,2025-03-28T15:15:49.587000 CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000 CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000 CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000 @@ -286890,7 +286906,7 @@ CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c1 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000 CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 -CVE-2025-30093,0,0,121b8925c56c9b2babddec51424e1a66dd8b32b15f254aeeeeaab40cbb5fc7a3,2025-03-27T19:15:49.677000 +CVE-2025-30093,0,1,82d1ae5af8a54ad73b5f613fe0a531ff84c3e1bf6913004ed80488115a169d31,2025-03-28T16:15:30.733000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000 CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000 @@ -286929,6 +286945,7 @@ CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39 CVE-2025-30204,0,0,b1fa78b55f063476d0284edd7879b33da275b35192b8e844de9525f5d85299bd,2025-03-21T22:15:26.420000 CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000 CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000 +CVE-2025-30211,1,1,0258d28f73f9ed36e99cfa924563d34a135876bc82b84b892b2524e412e79ac1,2025-03-28T15:15:50.863000 CVE-2025-30212,0,0,972410e2716e8f2e53ffd488d4d423564ff98176b3c1d36a04eac762d7cbcb18,2025-03-27T16:45:46.410000 CVE-2025-30213,0,0,9bc622ae8e82b32e191467dd2fc76643485ad29790111a6b5bc5c8f5ed285211,2025-03-27T16:45:46.410000 CVE-2025-30214,0,0,18b0a8e5b0aa52930309829b5c50a4314f3b9445c89b2192f63b40d54ef90591,2025-03-27T16:45:46.410000 @@ -286966,6 +286983,8 @@ CVE-2025-30364,0,0,4b4940d6e80ca4623ac6e07b442fa34d2a2e5145a055b7fec311f87ad7ea2 CVE-2025-30365,0,0,0fb6ad8b9cc1386c7c7a199337e2288c094cca4c0b764a4aa22a6d4630d8da57,2025-03-27T19:15:50.297000 CVE-2025-30366,0,0,e9a3d99ed82d95574110d0e12c95e3535524dfda831f7e1f11e16e0930a733dd,2025-03-27T19:15:50.427000 CVE-2025-30367,0,0,8f521c65fc5c6a4f459b61da6b32b8b65de98a3a2ad3f6a40dd09a099e12f187,2025-03-27T19:15:50.537000 +CVE-2025-30371,1,1,8dc4d8c1d0bd87053b801d6b16fb901bc3dbd25d2de1fd9ce0257602ddfa0c74,2025-03-28T15:15:51.090000 +CVE-2025-30372,1,1,7c023e358dc7161da52e82fbbb2bc2e953f46d72df45f4fe07ac1284d6066f70,2025-03-28T16:15:30.950000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000 CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000 @@ -287170,6 +287189,7 @@ CVE-2025-30921,0,0,0f49c6a76231945cfa45ff97ac30f85385ce79f7b853b4f89aa238944aeb0 CVE-2025-30922,0,0,9ff4dd0946f44b4c7c54a61d5993f66f06f3cb56f15e96b4e5bc278cdcc10d45,2025-03-27T16:45:12.210000 CVE-2025-30923,0,0,4337439665787ddec21f95bc117262f2db948b09c40c497dd22aee51e7ef404f,2025-03-27T16:45:12.210000 CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa4c3,2025-03-27T16:45:12.210000 +CVE-2025-31010,1,1,31498ccdd07db6f7d27f2349b983f4b4be3be2dbe1ad2b1546c3ac773939b274,2025-03-28T15:15:51.367000 CVE-2025-31031,0,0,360863ecb71afb67efd4d379f6b1c5b283b29564bb09f7fc4134e2e3067f2d6b,2025-03-27T23:15:35.850000 CVE-2025-31073,0,0,7cf1e90fe970527146c17b4af0ba7b62d42e4f1b27572eefc3a359e973f1fd01,2025-03-28T10:15:16.253000 CVE-2025-31075,0,0,8965c2af5d900a1c0742b24db6f20f74f7dcc4028f642ff88d07617b499b0c55,2025-03-28T10:15:16.430000