From fd76f99df04ac617021a0376a693d78b6751834c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 19 Mar 2025 15:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-03-19T15:00:19.479491+00:00 --- CVE-2018/CVE-2018-94xx/CVE-2018-9447.json | 39 ++++++- CVE-2023/CVE-2023-321xx/CVE-2023-32110.json | 52 +++++++++- CVE-2023/CVE-2023-383xx/CVE-2023-38385.json | 48 ++++++++- CVE-2023/CVE-2023-383xx/CVE-2023-38388.json | 52 +++++++++- CVE-2023/CVE-2023-60xx/CVE-2023-6047.json | 52 +++++++++- CVE-2023/CVE-2023-61xx/CVE-2023-6191.json | 31 +++++- CVE-2024/CVE-2024-00xx/CVE-2024-0020.json | 14 ++- CVE-2024/CVE-2024-126xx/CVE-2024-12604.json | 68 +++++++++++- CVE-2024/CVE-2024-132xx/CVE-2024-13222.json | 27 ++++- CVE-2024/CVE-2024-132xx/CVE-2024-13225.json | 27 ++++- CVE-2024/CVE-2024-200xx/CVE-2024-20059.json | 27 ++++- CVE-2024/CVE-2024-237xx/CVE-2024-23788.json | 14 ++- CVE-2024/CVE-2024-239xx/CVE-2024-23945.json | 39 ++++++- CVE-2024/CVE-2024-244xx/CVE-2024-24422.json | 32 +++++- CVE-2024/CVE-2024-42xx/CVE-2024-4289.json | 27 ++++- CVE-2024/CVE-2024-430xx/CVE-2024-43096.json | 39 ++++++- CVE-2024/CVE-2024-441xx/CVE-2024-44152.json | 34 +++++- CVE-2024/CVE-2024-452xx/CVE-2024-45239.json | 34 +++++- CVE-2024/CVE-2024-465xx/CVE-2024-46564.json | 34 +++++- CVE-2024/CVE-2024-487xx/CVE-2024-48789.json | 14 ++- CVE-2024/CVE-2024-545xx/CVE-2024-54519.json | 34 +++++- CVE-2024/CVE-2024-555xx/CVE-2024-55551.json | 29 ++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56310.json | 39 ++++++- CVE-2024/CVE-2024-570xx/CVE-2024-57022.json | 34 +++++- CVE-2024/CVE-2024-574xx/CVE-2024-57451.json | 39 ++++++- CVE-2024/CVE-2024-577xx/CVE-2024-57724.json | 39 ++++++- CVE-2025/CVE-2025-22xx/CVE-2025-2280.json | 4 +- CVE-2025/CVE-2025-241xx/CVE-2025-24109.json | 36 ++++++- CVE-2025/CVE-2025-241xx/CVE-2025-24159.json | 36 ++++++- CVE-2025/CVE-2025-255xx/CVE-2025-25500.json | 10 +- CVE-2025/CVE-2025-255xx/CVE-2025-25598.json | 41 +++++++- CVE-2025/CVE-2025-262xx/CVE-2025-26263.json | 4 +- CVE-2025/CVE-2025-262xx/CVE-2025-26264.json | 4 +- CVE-2025/CVE-2025-267xx/CVE-2025-26702.json | 58 ++++++++++- CVE-2025/CVE-2025-267xx/CVE-2025-26703.json | 58 ++++++++++- CVE-2025/CVE-2025-267xx/CVE-2025-26704.json | 58 ++++++++++- CVE-2025/CVE-2025-267xx/CVE-2025-26705.json | 58 ++++++++++- CVE-2025/CVE-2025-267xx/CVE-2025-26706.json | 58 ++++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28857.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28859.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28860.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28861.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28862.json | 46 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28863.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28864.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28866.json | 47 ++++++++- CVE-2025/CVE-2025-288xx/CVE-2025-28868.json | 47 ++++++++- CVE-2025/CVE-2025-298xx/CVE-2025-29891.json | 26 ++--- README.md | 43 +++++--- _state.csv | 109 ++++++++++---------- 50 files changed, 1738 insertions(+), 205 deletions(-) create mode 100644 CVE-2024/CVE-2024-555xx/CVE-2024-55551.json diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json index 013dcbc88a5..83566fa28a5 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9447.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9447", "sourceIdentifier": "security@android.com", "published": "2025-01-17T23:15:12.327", - "lastModified": "2025-02-18T21:15:13.370", + "lastModified": "2025-03-19T14:15:34.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En onCreate de EmergencyCallbackModeExitDialog.java, existe una forma posible de bloquear el modo de devoluci\u00f3n de llamada de emergencia debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-08-01", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json index b2da4272c3d..4db82a705ff 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32110.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32110", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T07:15:53.300", - "lastModified": "2024-11-21T08:02:43.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T13:37:32.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiterx:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "98564483-27C8-4969-A3F1-CF751AF09A4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38385.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38385.json index 2568b888ab9..ac07882e107 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38385.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38385.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38385", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:19.183", - "lastModified": "2024-12-13T15:15:19.183", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T13:57:05.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.3.5", + "matchCriteriaId": "1D82A557-9559-442C-9A1B-9E67ABDFD987" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/jupiterx-core/vulnerability/wordpress-jupiter-x-core-plugin-3-0-0-3-3-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json index e71965c37d2..7aeaa6d8566 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38388.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38388", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T21:15:51.113", - "lastModified": "2024-11-21T08:13:27.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T13:49:31.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.8", + "matchCriteriaId": "0B4BF657-5A8E-43E8-834B-B0C0B65D5373" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json index 24ad5ff5f10..d5b220591e6 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6047", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-03-29T12:15:07.570", - "lastModified": "2024-11-21T08:43:02.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T14:28:26.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:algoritimbilisim:e-commerce_software:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.9.2", + "matchCriteriaId": "B2D85945-1413-41C8-BEB9-907FCC4646A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0252", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0252", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6191.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6191.json index b7c58a2e9c9..9c0be85607f 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6191.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6191.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6191", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-03-29T12:15:07.907", - "lastModified": "2024-11-21T08:43:19.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-19T14:45:55.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webpdks:webpdks:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3742DBF3-034C-40DA-839F-680B5A6B3928" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0253", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0253", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json index a3fb333b053..41143f60e04 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0020", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.667", - "lastModified": "2024-12-16T18:59:20.550", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:34.860", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json index 0d2eb836e69..5843440a1c7 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12604", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2025-03-10T15:15:36.947", - "lastModified": "2025-03-10T15:15:36.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:55:40.523", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "iletisim@usom.gov.tr", @@ -26,7 +26,7 @@ "cvssMetricV31": [ { "source": "iletisim@usom.gov.tr", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -60,16 +80,54 @@ "value": "CWE-640" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + }, + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tapandsign:tap\\&sign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.025", + "matchCriteriaId": "7E38B9DF-2BC7-40C1-A07F-77CEE465DF41" + } + ] + } + ] } ], "references": [ { "url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-25-0063", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13222.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13222.json index 17ce410c5ba..0334440fdcf 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13222.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13222.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13222", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-31T06:15:28.813", - "lastModified": "2025-02-18T19:15:13.130", + "lastModified": "2025-03-19T14:15:35.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento User Messages de WordPress hasta la versi\u00f3n 1.2.4 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/069e1f81-448d-4d27-b288-87111dade2f2/", diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13225.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13225.json index 6286ecd02a4..78ec3026663 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13225.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13225.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13225", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-31T06:15:29.117", - "lastModified": "2025-02-18T19:15:13.430", + "lastModified": "2025-03-19T14:15:35.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento ECT Home Page Products de WordPress hasta la versi\u00f3n 1.9 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8efd7d62-3f74-4108-970e-bd5ed24914ff/", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20059.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20059.json index a661e04c7e5..57ea39f8d85 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20059.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20059", "sourceIdentifier": "security@mediatek.com", "published": "2024-05-06T03:15:09.787", - "lastModified": "2024-11-21T08:51:55.990", + "lastModified": "2025-03-19T14:15:35.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En este caso, existe una posible escalada de privilegios debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541749; ID del problema: ALPS08541749." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json index 557f2790b62..45b248b2d4b 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23788", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-02-14T10:15:08.830", - "lastModified": "2024-12-13T17:32:04.810", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:36.007", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23945.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23945.json index bd9efe73854..d5286bab1d5 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23945.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23945.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23945", "sourceIdentifier": "security@apache.org", "published": "2024-12-23T16:15:05.590", - "lastModified": "2025-02-18T22:15:10.600", + "lastModified": "2025-03-19T14:15:36.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,44 @@ "value": "Signing cookies es una caracter\u00edstica de seguridad de la aplicaci\u00f3n que agrega una firma digital a los datos de las cookies para verificar su autenticidad e integridad. La firma ayuda a evitar que actores malintencionados modifiquen el valor de la cookie, lo que puede provocar vulnerabilidades de seguridad y explotaci\u00f3n. El componente de servicio de Apache Hive expone accidentalmente la cookie firmada al usuario final cuando hay una discrepancia en la firma entre la cookie actual y la esperada. Exponer la firma de cookie correcta puede conducir a una mayor explotaci\u00f3n. La l\u00f3gica vulnerable de CookieSigner se introdujo en Apache Hive mediante HIVE-9710 (1.2.0) y en Apache Spark mediante SPARK-14987 (2.0.0). Los componentes afectados son los siguientes: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json index 3efeabee743..2e7512ce0fc 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24422", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.267", - "lastModified": "2025-02-18T21:15:21.150", + "lastModified": "2025-03-19T14:15:36.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4289.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4289.json index c75e56bda25..465173582dc 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4289.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4289.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4289", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-21T06:15:09.517", - "lastModified": "2024-11-21T09:42:32.977", + "lastModified": "2025-03-19T14:15:37.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " El complemento de WordPress Sailthru Triggermail hasta la versi\u00f3n 1.1 no sanitiza ni escapa varios par\u00e1metros antes de devolverlos a p\u00e1ginas y atributos, lo que genera Cross Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json index eb85ff37c8f..bc534a89e05 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43096", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.497", - "lastModified": "2025-02-18T21:15:21.990", + "lastModified": "2025-03-19T14:15:36.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En build_read_multi_rsp de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44152.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44152.json index 78946e67031..02cba9c8943 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44152.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44152.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44152", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:50.763", - "lastModified": "2024-09-24T15:55:06.100", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:36.703", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45239.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45239.json index 4df8d6d4df9..f8fd25a7676 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45239.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45239", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-24T23:15:04.353", - "lastModified": "2024-08-27T15:49:31.417", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:36.867", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46564.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46564.json index 85cf492cac2..c95832d8fad 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46564.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46564", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:17.263", - "lastModified": "2024-09-24T16:41:55.907", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:37.093", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json index 9fb1085b1a6..28e9cbb7f2e 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48789.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48789", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T18:15:05.230", - "lastModified": "2024-10-15T15:35:19.560", + "lastModified": "2025-03-19T14:15:37.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://drivedeck.de/", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json index 1312972d53c..a7b666b4dc4 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54519", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.367", - "lastModified": "2025-03-04T16:02:20.193", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:37.577", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json new file mode 100644 index 00000000000..e79cd950f38 --- /dev/null +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55551.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-55551", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-19T14:15:37.733", + "lastModified": "2025-03-19T14:15:37.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Exasol jdbc driver 24.2.0. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.exasol.com/db/latest/connect_exasol/drivers/jdbc.htm", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/azraelxuemo/9565ec9219e0c3e9afd5474904c39d0f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json index c2e868cc53c..7fd5c30dc99 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56310", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T21:15:16.433", - "lastModified": "2025-01-14T17:15:18.487", + "lastModified": "2025-03-19T14:15:37.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "REDCap hasta la versi\u00f3n 15.0.0 tiene una falla de seguridad en el nombre de Project Dashboards, lo que expone a los usuarios a un ataque de Cross-Site Request Forgery (CSRF). Un atacante puede aprovechar esto al atraer a los usuarios para que hagan clic en un nombre de Project Dashboards que contenga la carga maliciosa, lo que desencadena una solicitud de cierre de sesi\u00f3n y finaliza su sesi\u00f3n. Esta vulnerabilidad se origina en la ausencia de protecciones CSRF en la funcionalidad de cierre de sesi\u00f3n, lo que permite que se ejecuten acciones maliciosas sin el consentimiento del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json index fdd86ceb2db..92234586a79 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57022", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:18.083", - "lastModified": "2025-03-10T17:27:02.037", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:38.007", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json index a94c992489a..8bb391cb051 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57451.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57451", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:14.893", - "lastModified": "2025-02-18T19:15:22.057", + "lastModified": "2025-03-19T14:15:38.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ChestnutCMS <=1.5.0 tiene una vulnerabilidad Directory Traversal en contentcore.controller.FileController#getFileList, que permite a los atacantes ver cualquier directorio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json index e804b13c705..e56a5738984 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57724", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:27.387", - "lastModified": "2025-02-18T20:15:23.023", + "lastModified": "2025-03-19T14:15:38.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente gray_record_cell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json index 4f044d90081..19317430b6a 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2280.json @@ -2,13 +2,13 @@ "id": "CVE-2025-2280", "sourceIdentifier": "security@devolutions.net", "published": "2025-03-13T13:15:58.533", - "lastModified": "2025-03-18T17:15:47.873", + "lastModified": "2025-03-19T14:15:39.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper access control in web extension restriction feature in Devolutions Server 2024.3.13 and earlier allows an authenticated user to bypass the browser extension restriction feature." + "value": "Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0\n\n and earlier allows an authenticated user to bypass the browser extension restriction feature." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json index 9068283b893..081df8b4e0d 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24109.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24109", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.347", - "lastModified": "2025-03-04T15:26:30.650", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:38.700", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json index 18775febf5d..45c494d9cd1 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24159", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.897", - "lastModified": "2025-03-04T14:57:16.473", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-19T14:15:38.853", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json index 20dd7c12ee3..4bb9a23b785 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25500.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25500", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T14:15:43.493", - "lastModified": "2025-03-18T14:15:43.493", + "lastModified": "2025-03-19T14:15:39.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain." + }, + { + "lang": "es", + "value": "Un problema en CosmWasm anterior a la versi\u00f3n 2.2.0 permite a los atacantes eludir las restricciones de capacidad en las cadenas de bloques aprovechando la falta de validaci\u00f3n de capacidad en tiempo de ejecuci\u00f3n. Esto permite a los atacantes implementar un contrato sin la aplicaci\u00f3n de la capacidad y ejecutar acciones no autorizadas en la cadena de bloques." } ], "metrics": {}, @@ -16,10 +20,6 @@ { "url": "https://gist.github.com/H3T76/8096a6ff9410f3a6d9a25db1a68ae657#file-cve-2025-25500", "source": "cve@mitre.org" - }, - { - "url": "https://github.com/CVEProject/cveproject.github.io/blob/gh-pages/requester/reservation-guidelines.md", - "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25598.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25598.json index 3ce173f46b7..35ff4d01894 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25598.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25598.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25598", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-13T18:15:50.857", - "lastModified": "2025-03-13T18:15:50.857", - "vulnStatus": "Received", + "lastModified": "2025-03-19T14:15:39.140", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en la consola de tareas programadas de Inova Logic CUSTOMER MONITOR (CM) v3.1.757.1 permite a los atacantes escalar privilegios mediante la colocaci\u00f3n de un ejecutable manipulado en una tarea programada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/quriusfox/vulnerability-research/tree/main/CVE-2025-25598", diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json index 25c5f1002db..6714aeb8086 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26263.json @@ -2,13 +2,13 @@ "id": "CVE-2025-26263", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T16:15:40.127", - "lastModified": "2025-03-17T06:15:24.630", + "lastModified": "2025-03-19T14:15:39.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process." + "value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json b/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json index 741ad96cee4..cd76f1a8ccf 100644 --- a/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json +++ b/CVE-2025/CVE-2025-262xx/CVE-2025-26264.json @@ -2,13 +2,13 @@ "id": "CVE-2025-26264", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-27T22:15:38.947", - "lastModified": "2025-03-17T06:15:25.070", + "lastModified": "2025-03-19T14:15:39.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise." + "value": "GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26702.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26702.json index 9e7f03eb0cb..c260a1c604a 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26702.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26702.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26702", "sourceIdentifier": "psirt@zte.com.cn", "published": "2025-03-11T07:15:34.133", - "lastModified": "2025-03-11T07:15:34.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:08:01.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.03", + "versionEndExcluding": "6.1.03.05", + "matchCriteriaId": "26E446FB-FC8E-4FCE-8E89-275726CB572B" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1820079027271819342", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26703.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26703.json index 93e971f2066..036a5d0f3b7 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26703.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26703.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26703", "sourceIdentifier": "psirt@zte.com.cn", "published": "2025-03-11T07:15:34.580", - "lastModified": "2025-03-11T07:15:34.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:09:38.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.03", + "versionEndExcluding": "6.1.03.05", + "matchCriteriaId": "26E446FB-FC8E-4FCE-8E89-275726CB572B" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/5666152569221570627", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26704.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26704.json index 8d8fbdfd671..fd1ffd89b89 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26704.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26704.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26704", "sourceIdentifier": "psirt@zte.com.cn", "published": "2025-03-11T07:15:34.967", - "lastModified": "2025-03-11T07:15:34.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:11:17.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.03 ", + "versionEndIncluding": "6.1.03.05", + "matchCriteriaId": "1C51DC63-52FE-4472-936B-843E5779BD21" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646494", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26705.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26705.json index ffd1a91275f..9d5e1135b55 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26705.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26705.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26705", "sourceIdentifier": "psirt@zte.com.cn", "published": "2025-03-11T07:15:35.330", - "lastModified": "2025-03-11T07:15:35.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:12:26.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.03 ", + "versionEndExcluding": "6.1.03.06", + "matchCriteriaId": "11809C5D-1649-478C-9D20-FA1DEDAB143B" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/577084989971263576", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26706.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26706.json index 7af7c96934d..faedb94e802 100644 --- a/CVE-2025/CVE-2025-267xx/CVE-2025-26706.json +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26706.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26706", "sourceIdentifier": "psirt@zte.com.cn", "published": "2025-03-11T07:15:35.703", - "lastModified": "2025-03-11T07:15:35.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:15:36.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,12 +69,44 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.03 ", + "versionEndIncluding": "6.1.03.07", + "matchCriteriaId": "7F571305-1F0A-4A17-A7B3-532965576C3F" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646486", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28857.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28857.json index 98cd7913c38..55909869d8f 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28857.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28857.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28857", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:42.903", - "lastModified": "2025-03-11T21:15:42.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T13:41:38.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rankchecker:rankchecker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.9", + "matchCriteriaId": "CB37F6EA-5711-4307-82AD-2EB718289689" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/rankchecker-io-integration/vulnerability/wordpress-rankchecker-io-integration-plugin-1-0-9-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28859.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28859.json index 1aa3a4e4f9f..ff5d2872a7b 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28859.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28859.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28859", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.050", - "lastModified": "2025-03-11T21:15:43.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:01:43.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codevibrant:maintenance_notice:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.5", + "matchCriteriaId": "127CD716-70AF-45EF-8F72-4E0E64BD1A0C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/maintenance-notice/vulnerability/wordpress-maintenance-notice-plugin-1-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28860.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28860.json index adefbe41817..d67e553ed7f 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28860.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28860.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28860", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.193", - "lastModified": "2025-03-11T21:15:43.193", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:06:00.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ppdpurveyor:google_news_editors_picks_feed_generator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1", + "matchCriteriaId": "2C47212C-D0BC-4402-90B9-4CDB2FF249CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/google-news-editors-picks-news-feeds/vulnerability/wordpress-google-news-editors-picks-feed-generator-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28861.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28861.json index 1c67493ad1f..221c4578dbd 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28861.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28861.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28861", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.337", - "lastModified": "2025-03-11T21:15:43.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:08:16.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bhzad:wp_jquery_persian_datepicker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.0", + "matchCriteriaId": "65AF6282-5B7F-425A-892C-9960FE036E7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wpjqp-datepicker/vulnerability/wordpress-wp-jquery-persian-datepicker-plugin-0-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28862.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28862.json index 8a58d9c78bb..b54f6eb9c3e 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28862.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28862.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28862", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.490", - "lastModified": "2025-03-11T21:15:43.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:13:16.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:venugopal:comment_date_and_gravatar_remover:1.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "10C8FFD7-31F6-4696-BA34-DA2B59F67522" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/remove-date-and-gravatar-under-comment/vulnerability/wordpress-comment-date-and-gravatar-remover-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28863.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28863.json index f4a482aba24..76bbbae65c3 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28863.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28863.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28863", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.647", - "lastModified": "2025-03-11T21:15:43.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:14:18.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:carlosminatti:delete_original_image:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.4", + "matchCriteriaId": "ADFDC217-657F-4D84-9B55-BB61C4ED47E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/delete-original-image/vulnerability/wordpress-delete-original-image-plugin-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28864.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28864.json index 8aca6756870..81e9e1fd1de 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28864.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28864.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28864", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.810", - "lastModified": "2025-03-11T21:15:43.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:16:41.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:planetstudio:builder_for_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.2", + "matchCriteriaId": "FBF6364E-259A-44A2-8533-B73DBB729EBC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/cf7-builder/vulnerability/wordpress-builder-for-contact-form-7-by-webconstruct-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28866.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28866.json index 1d5cb92bd45..bffe2e25570 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28866.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28866.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28866", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:43.970", - "lastModified": "2025-03-11T21:15:43.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:17:39.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smerriman:login_logger:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.1", + "matchCriteriaId": "130C0737-23E4-4828-BD71-F6532F40797D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/login-logger/vulnerability/wordpress-login-logger-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28868.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28868.json index b0a4e905d26..c4f768ad685 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28868.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28868.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28868", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:44.283", - "lastModified": "2025-03-11T21:15:44.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-19T14:27:00.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ziplist:recipes:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1", + "matchCriteriaId": "19222997-375C-4574-831B-2B680C174A4B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/ziplist-recipe-plugin/vulnerability/wordpress-ziplist-recipe-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29891.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29891.json index 2a3fa8e10bc..06b2dd7e613 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29891.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29891.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29891", "sourceIdentifier": "security@apache.org", "published": "2025-03-12T15:15:40.997", - "lastModified": "2025-03-13T09:15:14.860", + "lastModified": "2025-03-19T14:15:39.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,19 +22,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", - "baseScore": 4.2, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 4.8, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.2, "impactScore": 2.5 } ] @@ -42,17 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-164" - } - ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -69,6 +59,10 @@ { "url": "https://camel.apache.org/security/CVE-2025-29891.html", "source": "security@apache.org" + }, + { + "url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 4880533f8d0..96bccf8e7a4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-19T13:00:19.786508+00:00 +2025-03-19T15:00:19.479491+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-19T12:15:14.463000+00:00 +2025-03-19T14:55:40.523000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285667 +285668 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `1` -- [CVE-2024-12920](CVE-2024/CVE-2024-129xx/CVE-2024-12920.json) (`2025-03-19T12:15:12.797`) -- [CVE-2024-13442](CVE-2024/CVE-2024-134xx/CVE-2024-13442.json) (`2025-03-19T12:15:13.857`) -- [CVE-2024-13933](CVE-2024/CVE-2024-139xx/CVE-2024-13933.json) (`2025-03-19T12:15:14.003`) -- [CVE-2024-45644](CVE-2024/CVE-2024-456xx/CVE-2024-45644.json) (`2025-03-19T12:15:14.153`) -- [CVE-2025-2511](CVE-2025/CVE-2025-25xx/CVE-2025-2511.json) (`2025-03-19T12:15:14.313`) -- [CVE-2025-2512](CVE-2025/CVE-2025-25xx/CVE-2025-2512.json) (`2025-03-19T12:15:14.463`) +- [CVE-2024-55551](CVE-2024/CVE-2024-555xx/CVE-2024-55551.json) (`2025-03-19T14:15:37.733`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `47` -- [CVE-2024-26795](CVE-2024/CVE-2024-267xx/CVE-2024-26795.json) (`2025-03-19T11:42:41.993`) +- [CVE-2024-57022](CVE-2024/CVE-2024-570xx/CVE-2024-57022.json) (`2025-03-19T14:15:38.007`) +- [CVE-2024-57451](CVE-2024/CVE-2024-574xx/CVE-2024-57451.json) (`2025-03-19T14:15:38.187`) +- [CVE-2024-57724](CVE-2024/CVE-2024-577xx/CVE-2024-57724.json) (`2025-03-19T14:15:38.337`) +- [CVE-2025-2280](CVE-2025/CVE-2025-22xx/CVE-2025-2280.json) (`2025-03-19T14:15:39.743`) +- [CVE-2025-24109](CVE-2025/CVE-2025-241xx/CVE-2025-24109.json) (`2025-03-19T14:15:38.700`) +- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-03-19T14:15:38.853`) +- [CVE-2025-25500](CVE-2025/CVE-2025-255xx/CVE-2025-25500.json) (`2025-03-19T14:15:39.033`) +- [CVE-2025-25598](CVE-2025/CVE-2025-255xx/CVE-2025-25598.json) (`2025-03-19T14:15:39.140`) +- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-03-19T14:15:39.293`) +- [CVE-2025-26264](CVE-2025/CVE-2025-262xx/CVE-2025-26264.json) (`2025-03-19T14:15:39.440`) +- [CVE-2025-26702](CVE-2025/CVE-2025-267xx/CVE-2025-26702.json) (`2025-03-19T14:08:01.357`) +- [CVE-2025-26703](CVE-2025/CVE-2025-267xx/CVE-2025-26703.json) (`2025-03-19T14:09:38.080`) +- [CVE-2025-26704](CVE-2025/CVE-2025-267xx/CVE-2025-26704.json) (`2025-03-19T14:11:17.600`) +- [CVE-2025-26705](CVE-2025/CVE-2025-267xx/CVE-2025-26705.json) (`2025-03-19T14:12:26.253`) +- [CVE-2025-26706](CVE-2025/CVE-2025-267xx/CVE-2025-26706.json) (`2025-03-19T14:15:36.417`) +- [CVE-2025-28857](CVE-2025/CVE-2025-288xx/CVE-2025-28857.json) (`2025-03-19T13:41:38.270`) +- [CVE-2025-28859](CVE-2025/CVE-2025-288xx/CVE-2025-28859.json) (`2025-03-19T14:01:43.707`) +- [CVE-2025-28860](CVE-2025/CVE-2025-288xx/CVE-2025-28860.json) (`2025-03-19T14:06:00.333`) +- [CVE-2025-28861](CVE-2025/CVE-2025-288xx/CVE-2025-28861.json) (`2025-03-19T14:08:16.920`) +- [CVE-2025-28862](CVE-2025/CVE-2025-288xx/CVE-2025-28862.json) (`2025-03-19T14:13:16.610`) +- [CVE-2025-28863](CVE-2025/CVE-2025-288xx/CVE-2025-28863.json) (`2025-03-19T14:14:18.080`) +- [CVE-2025-28864](CVE-2025/CVE-2025-288xx/CVE-2025-28864.json) (`2025-03-19T14:16:41.287`) +- [CVE-2025-28866](CVE-2025/CVE-2025-288xx/CVE-2025-28866.json) (`2025-03-19T14:17:39.090`) +- [CVE-2025-28868](CVE-2025/CVE-2025-288xx/CVE-2025-28868.json) (`2025-03-19T14:27:00.497`) +- [CVE-2025-29891](CVE-2025/CVE-2025-298xx/CVE-2025-29891.json) (`2025-03-19T14:15:39.573`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e6ba1c2aae9..ba3ee7ba6d5 100644 --- a/_state.csv +++ b/_state.csv @@ -127032,7 +127032,7 @@ CVE-2018-9441,0,0,575f828caed05d70445398c6546d07e6187af95dfab7246adaf485e88049a8 CVE-2018-9444,0,0,71c23de0a19dd0833cbf31bcd17198f1ee23b3012d3e983445d1d8427624bfea,2024-11-21T04:15:29.460000 CVE-2018-9445,0,0,6f497d920b5dea1dff5b6fdf23b01b78b0db0eccdf0018e269ce9b214bfe106e,2024-11-21T04:15:29.570000 CVE-2018-9446,0,0,c234b9792d5f51536c0fd269b29b1abbbcfb1e948520636234fcd7501d794384,2024-11-21T04:15:29.697000 -CVE-2018-9447,0,0,c76e06ec9a4508f07296cb0ca9614aa80994653f7590c5bed8eafda199c21832,2025-02-18T21:15:13.370000 +CVE-2018-9447,0,1,db5297e04cb86cbd19de4ce1da388e9ae6978c5e078051658a3b64eb380d8cc8,2025-03-19T14:15:34.120000 CVE-2018-9448,0,0,69c64fe6ebbff0200617e0b85ea10efd9da70ed74749831ad78b183a3e956ce7,2024-11-21T04:15:29.810000 CVE-2018-9449,0,0,40c2935e250f77217097c1d24f2eb94cea68528fe2bd69e2fca6dbdff2691446,2024-12-18T20:10:01.940000 CVE-2018-9450,0,0,71a6672dc17cc007950c7f48e044c7117901d3605e37bc8deb02b63ead4edb96,2024-11-21T04:15:29.930000 @@ -225714,7 +225714,7 @@ CVE-2023-32107,0,0,b5793e75f71371b8b6819f39eb03f5486732b0ba2bf9ce407a16cdea099c4 CVE-2023-32108,0,0,a934ffc0869767d2ad20cbf489ed2b68feb2f8c481d9bfda763b1daaca8eb204,2024-11-21T08:02:43.510000 CVE-2023-32109,0,0,3a4edfa6c3aa31ce79dc3464d8877bcae3fd1ddf0b4075d905032ec1aeed0b39,2024-11-21T08:02:43.630000 CVE-2023-3211,0,0,5c79f5a4ab5a20ff2e0ea2542823beb167db99bcb267301c9da9f52382558d68,2024-11-21T08:16:42.377000 -CVE-2023-32110,0,0,9e53bc70ab5b02228129bce6dfaed418995d97678d4ac5a9c6c4e76a4638ba71,2024-11-21T08:02:43.730000 +CVE-2023-32110,0,1,c56f591d1b9ebf82f565782ef9fcf1991f96a352778cbc1f827433756a699450,2025-03-19T13:37:32.060000 CVE-2023-32111,0,0,1a327c689519230b35e18a611794e24d3e69479285b03916de59f343d5f0344e,2024-11-21T08:02:43.860000 CVE-2023-32112,0,0,2d658551346032135fc4df8eadb527925bcf203d0c4b6a1317eaa815c5079e00,2024-11-21T08:02:43.980000 CVE-2023-32113,0,0,eeb889f962c9abb8e1fc15bbf3a79439dddc270b385947deb2b48db8cf398f03,2024-11-21T08:02:44.100000 @@ -230663,10 +230663,10 @@ CVE-2023-38381,0,0,131f40c03c1f7c264d58a993d2664cc9ca18c7dc79fcb5b324e793ba6bfc6 CVE-2023-38382,0,0,46aabdbde1d21403733e25a801806deda3d759b7a59108f1e0327e2612369c97,2024-11-21T08:13:27.137000 CVE-2023-38383,0,0,8750a7ad87b6af9dbfb5f26ec581da61550af89d93e4c27561c0df9189eaadbe,2024-12-13T15:15:19.040000 CVE-2023-38384,0,0,432bc4918ca36135512b55018dda0e35c3b42e4dbc1a5c07f3fe37017ce25831,2024-11-21T08:13:27.263000 -CVE-2023-38385,0,0,669acb867d506d6026e6dd7115fdb47c6ff8d51138d21b934b1f3f835198d76e,2024-12-13T15:15:19.183000 +CVE-2023-38385,0,1,5d3cab033bba45025423f86e1a0659404e7528890b35519c19d613144e5855b0,2025-03-19T13:57:05.610000 CVE-2023-38386,0,0,e07e32a1fe94194f1f4c10c32b9d3e83fd8d13afef2568102c653b4d924cba1b,2024-11-21T08:13:27.407000 CVE-2023-38387,0,0,623d775bcaa266a5dc196962abc1582b099379588fb4d57e840c1c6cf4fa5e54,2024-11-21T08:13:27.520000 -CVE-2023-38388,0,0,b7f9db4f6c00e03cf568aaa88d65f74e7aaf06894a52d739b3d18b76af545ea8,2024-11-21T08:13:27.650000 +CVE-2023-38388,0,1,9cb26bf3fa9bc4d7936e19c52d6924d10bdd5aa64565af0e3fbf58a49b358a9d,2025-03-19T13:49:31.673000 CVE-2023-38389,0,0,53d2268dadb48f9591f9849be4d6f9352278d753ebf289d9c3421edfea35839e,2024-11-21T08:13:27.780000 CVE-2023-3839,0,0,99e4f38992390f0792bd1d9c3f9258e68ba21ad7fd20cf000ca333b339e9434a,2024-11-21T08:18:11.323000 CVE-2023-38390,0,0,04540ba10d5b9db941783df86eaf593c37aa0ff8ebfe2841b802123d5603c4f1,2024-11-21T08:13:27.913000 @@ -242305,7 +242305,7 @@ CVE-2023-6043,0,0,4d42ba0e4248fe66359ed05a1105448d1de43c6b28a8a42326e051bf553c2c CVE-2023-6044,0,0,8488b0c2d64eaa394ac1e3ea1a8d07bf823d734aa681fcc8f9f80375294cb645,2024-11-21T08:43:02.067000 CVE-2023-6045,0,0,76a475eac8826ed563f079c0db54754b4e53e106a6075c3fd8ea1a519b7171fd,2024-11-21T08:43:02.177000 CVE-2023-6046,0,0,83b94aa63a7eb00bfbac001e7c18dbf142feb1ad6b62ec50413f35175e462282,2024-11-21T08:43:02.283000 -CVE-2023-6047,0,0,cc9794086fc5bfcae68de9aaacc0f8fbc5d36bd80fb3a14c98b3ddc2bd4b2c4b,2024-11-21T08:43:02.383000 +CVE-2023-6047,0,1,8346245556da8f8494199d0db060767ebd0e6231ec0b0ebb0a9924640c15eff5,2025-03-19T14:28:26.253000 CVE-2023-6048,0,0,067012cb654f53d5db93a1350dd348e4f2947ac9ac3b7fa72a8e5d0708989146,2024-11-21T08:43:02.490000 CVE-2023-6049,0,0,481e4a5d6e72e8ce41e29e3b424a68dbe30b0171d92f9fc9f17ac971e6297e1e,2024-11-21T08:43:02.593000 CVE-2023-6050,0,0,60c3b462fc30a652d1716b02c3dad5506b3f869a4b27869644e1d4ff3ddb9858,2024-11-21T08:43:02.693000 @@ -242438,7 +242438,7 @@ CVE-2023-6187,0,0,8fd9b319140e1592996939e0f05ce20e8fbb504e761af0771471c23ab164f9 CVE-2023-6188,0,0,09daa23440d3cd568eaf0ecbfbc6bb5d7b90ca340bfb9250a0e00eccd46fe784,2024-11-21T08:43:19.057000 CVE-2023-6189,0,0,beafa23b6653271d960b0efe9b1c8f7edcdb0a8b75d12a9c0e5a9673ca00b8fe,2024-11-21T08:43:19.213000 CVE-2023-6190,0,0,8ed78538c4041525960b803e88198605546a55c3cf47128d1e30e8cf0cec0d48,2024-11-27T13:15:16.383000 -CVE-2023-6191,0,0,674a3b71d2e03d1cc751fb32a048486d4c88546b883dd69f41cb5965fd00e87e,2024-11-21T08:43:19.497000 +CVE-2023-6191,0,1,9c5fe08c799b97bbfa6e0631b81cc5f350115f9c9817f807e3cb1531d73541d5,2025-03-19T14:45:55.020000 CVE-2023-6193,0,0,03fd5b3cb55751a3ff3471e4986ed4557dc70e8bb42417035f31e70fadacbbe5,2024-11-21T08:43:19.627000 CVE-2023-6194,0,0,59f670df72e72c8f09561909ca051857ec403afebd9ce05e440183cf16436235,2024-11-21T08:43:19.773000 CVE-2023-6195,0,0,51a9f5b9008872aaff8589cee46ad94ee1bf658d97994daf14236f72e8e38faf,2025-02-18T19:15:11.923000 @@ -243433,7 +243433,7 @@ CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b CVE-2024-0017,0,0,c3ae32d0f7f4b3aee825adaba904bd8ea33c38296423e6c492125686085b5834,2024-12-16T14:32:15.203000 CVE-2024-0018,0,0,dc97236025a554ca5d9fbcfefeab22ae1ca03e1bafa99ec450476dfed39ed381,2024-12-16T19:00:35.303000 CVE-2024-0019,0,0,1a2ededa1eb1dbcaa0bc1c1d84127480128e02c1cf238c266ddf5fd5d1d39ff4,2025-03-13T15:15:39.900000 -CVE-2024-0020,0,0,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede5f,2024-12-16T18:59:20.550000 +CVE-2024-0020,0,1,21a32907b1564d9154c7d4ff0db8ff8780ea7a747120fe57f3cbe387673b9075,2025-03-19T14:15:34.860000 CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000 CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000 CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000 @@ -246791,7 +246791,7 @@ CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce663 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 CVE-2024-12602,0,0,83ff0b84c52513b06515c71947664c6af329bbac5217b6b55ffe20fc2f9da714,2025-03-17T14:19:31.137000 CVE-2024-12603,0,0,1329ad6d4bb1404a279e066983b81ffbd19fd699c3731f10f6b510964794facc,2025-03-14T17:15:40.923000 -CVE-2024-12604,0,0,a6f4270c625ae221b7f85c4bc776086e42b147f47e8fbeef861cbdbdca9ec761,2025-03-10T15:15:36.947000 +CVE-2024-12604,0,1,d9d8da7a2652a20e74bc7819a8c68623b940ac46df22f67266e2f292fdb1975e,2025-03-19T14:55:40.523000 CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000 CVE-2024-12607,0,0,40c18637fc3558dc9dc09323eb99bf48f8a620096ef9648f41f49596324b9617,2025-03-07T09:15:14.700000 @@ -247045,7 +247045,7 @@ CVE-2024-12917,0,0,d8b07f4bcfb7f08bc2f227c861fa1e6577e90bb6cc2a5373042cad71096d6 CVE-2024-12918,0,0,1035e9b27a2101293cfa4dc6b919699346b5a15e701cb7622e7b4fe97d2a43ff,2025-02-24T15:15:12.537000 CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 -CVE-2024-12920,1,1,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000 +CVE-2024-12920,0,0,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000 CVE-2024-12921,0,0,66514a714672aa9f260463c855267bb42fb72ace141e13c7370829c4ab97853e,2025-01-30T06:15:29.653000 CVE-2024-12922,0,0,3c37006850d140c98149834c97117e5d90bae2ea48a41001d4db464e7915c4fd,2025-03-19T06:15:15.120000 CVE-2024-12926,0,0,34efd8bf14c03e0212df6da35930928f45cf16a2638f05d82d7eb2cf46388400,2024-12-27T15:15:10.360000 @@ -247339,10 +247339,10 @@ CVE-2024-13219,0,0,a03a53f4e8ee76aae1f68ea77b3d02d84a8b663ce18b5d410a5e09c6d7e9e CVE-2024-1322,0,0,6d01a44e4ccc96742bbde907457ae18a669aea26c3c00f3c945d2c4b2b833c47,2025-02-28T03:12:58.057000 CVE-2024-13220,0,0,2a29f93de8fe785956cee813d639f3b7bb31198e316ff621daafc5854ef7c753,2025-02-18T19:15:12.920000 CVE-2024-13221,0,0,cbd1a7d3e900c883178aa5ebf5e7730a05696e4d330353970b2ee62e177da934,2025-03-14T16:15:28.530000 -CVE-2024-13222,0,0,3369cae0a43fcf974ee9682b40ff21b7fd6cb19d101c9348f9e995ea2e1296da,2025-02-18T19:15:13.130000 +CVE-2024-13222,0,1,58f0085a1407de24c3cbe5e9312e8772fe787b4e9a861aa13f1a7dfd4a9c64f1,2025-03-19T14:15:35.370000 CVE-2024-13223,0,0,30235d227081c2fe7536cc919cc2f0b95ea40b13ff9e4c274ce474e2acc32f0c,2025-03-14T18:15:27.667000 CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a842,2025-02-18T19:15:13.330000 -CVE-2024-13225,0,0,fd5bdb87f02a5554907e108887a0ec447c92e5005d465261f05bb066fe20b559,2025-02-18T19:15:13.430000 +CVE-2024-13225,0,1,6b43d53a9f0c4910354c6a7419b4cc9a74975f7fd7ceed90095e0d3896c67dc0,2025-03-19T14:15:35.517000 CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000 CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000 CVE-2024-13228,0,0,40cdaa381c65554c70f52b52abe8e4f273527cf6f5176b112ffc2cc6f91fc27e,2025-03-11T07:15:32.670000 @@ -247561,7 +247561,7 @@ CVE-2024-13439,0,0,2f059501bc7533dd49b97287e80dce5e31332841fdcf6ed4dd7d300b721f1 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000 CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000 -CVE-2024-13442,1,1,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000 +CVE-2024-13442,0,0,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000 CVE-2024-13443,0,0,45895be01f051ac07538c729bc325487d84fe178af27003bb0a84004bc553820,2025-02-19T04:15:10.360000 CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000 CVE-2024-13445,0,0,e320e7547c6eda6e85243dd50e1b8e91047011502ea9fdec246dbbf1d042f305,2025-02-25T20:22:07.157000 @@ -247994,7 +247994,7 @@ CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 -CVE-2024-13933,1,1,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000 +CVE-2024-13933,0,0,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000 CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000 CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000 CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000 @@ -248630,7 +248630,7 @@ CVE-2024-20055,0,0,0cd1a1a1bc134a6a6fa4bf90d380bff04abbc6c81e19c2261236da7a278b9 CVE-2024-20056,0,0,81d428e4d181e8312b32dda0cff6cfde75ef18609600caa3b7da7e981bb2a321,2025-03-13T18:15:36.880000 CVE-2024-20057,0,0,d41872e09ed050e0d60edcf8c8cb9f2f16a39b7414f40d966be0c0dadc633d3d,2024-11-21T08:51:55.623000 CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859c46,2024-11-21T08:51:55.767000 -CVE-2024-20059,0,0,3f92e7624e6793baad95bf5c5fda85b21dadfac2599351333cf7d3804b909f8b,2024-11-21T08:51:55.990000 +CVE-2024-20059,0,1,f43e5b062f45304be39bcb5dae92b6ee1c5b2ee5de21825d3ba6a3416a54bde3,2025-03-19T14:15:35.787000 CVE-2024-2006,0,0,8edf579119d048fb0addb069e3e97e116defb6c81523e84fb8ce83f7cf4b6a4b,2025-03-13T00:55:44.487000 CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000 CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000 @@ -251705,7 +251705,7 @@ CVE-2024-23784,0,0,fbb08b4f0a06140ba3336bcd5ca10e9f46eba5802513fb502c644b9cd1ce9 CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000 CVE-2024-23786,0,0,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000 CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000 -CVE-2024-23788,0,0,6560a1aa3a129015b4a3affeba177920091f2bc65e89a77b92a05faa90249853,2024-12-13T17:32:04.810000 +CVE-2024-23788,0,1,3ed6bafda21901799a4dfbdf04ba8447f3ad68fc5855c91f97130a2370e8a954,2025-03-19T14:15:36.007000 CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000 CVE-2024-2379,0,0,cf840ac82667bfb1ae0d634974b612d7cc2367516dec6dcacc2bf89b9ebdc547,2024-11-21T09:09:37.570000 CVE-2024-23790,0,0,7f508ff20070766ba08735fb62c77bc7a886506baf978895b0d3cf0b2340c928,2024-11-21T08:58:25.423000 @@ -251865,7 +251865,7 @@ CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22 CVE-2024-23942,0,0,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000 CVE-2024-23943,0,0,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000 CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000 -CVE-2024-23945,0,0,0e48186ccb42f1ffb7728a08d36dafb5b233965e5e36ffdb7b0875fe5f7c17ad,2025-02-18T22:15:10.600000 +CVE-2024-23945,0,1,bb56c069ffece046c263afd9a32b159f25c8a81747a129854e78ff3251c300b0,2025-03-19T14:15:36.173000 CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000 CVE-2024-23947,0,0,71278d4a159cc549aab5b7dbabd025fce93076b316a17d3e2ac8c5a91e551401,2025-02-12T18:43:20.107000 CVE-2024-23948,0,0,c4340c793641d823b9f3789f568fd96f3e2cea4b888e1ca28a5883e79c28a251,2025-02-12T18:43:24.687000 @@ -252103,7 +252103,7 @@ CVE-2024-24419,0,0,6461e4afd495f91efaae96c55ee7f319576a8bc399f40f12fa7c06ee46c44 CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000 CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000 CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000 -CVE-2024-24422,0,0,880bfd6c9396281614ba81f8dd610f47d3689bbb0133e6a43850002af7027433,2025-02-18T21:15:21.150000 +CVE-2024-24422,0,1,cc1fe911e5d9bb47992bcf93c1d25d6815fc8e41d6031807026099db7d254742,2025-03-19T14:15:36.380000 CVE-2024-24423,0,0,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000 CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 @@ -253881,7 +253881,7 @@ CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000 CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000 CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000 -CVE-2024-26795,0,1,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000 +CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000 CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000 CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d4a2,2024-11-21T09:03:05.660000 CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000 @@ -266270,7 +266270,7 @@ CVE-2024-42861,0,0,5ac4827af3e3142d1b282b5930c3cc4ee3777c4ff3aba0df8482c0899ef1a CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000 CVE-2024-4288,0,0,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000 CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000 -CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000 +CVE-2024-4289,0,1,6e68774b9b4cf6699540b01a235c3deca6971edc315dab7ec717a2422c223e69,2025-03-19T14:15:37.420000 CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000 CVE-2024-4290,0,0,6a2079683ecc1d5a391a845f1e72b85d31a18e6140a0ac8996a297bb31d2d7cf,2024-11-21T09:42:33.080000 CVE-2024-42900,0,0,b64f85d57002cf7240c8feee5b45ad026c6f41850d03e921da1c59ae967003ac,2024-08-29T13:25:27.537000 @@ -266394,7 +266394,7 @@ CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1 CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000 CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000 CVE-2024-43095,0,0,4f9b3e24c320d2860d2ce22850ffdfb7559aa75a9e29352b4ab30371d10a8710,2025-01-22T18:15:19.013000 -CVE-2024-43096,0,0,f0917337ccbf01aac70cf0fc4c11a03157db072c393a2498dc0158709302e31e,2025-02-18T21:15:21.990000 +CVE-2024-43096,0,1,754ea5dc94f38edb500836a10edd3af13c0a9f6840364bf5983f93c9c05f47fd,2025-03-19T14:15:36.567000 CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000 CVE-2024-43098,0,0,e6cfab1a6a9535db9ca658414c0bc9df5fe4048cd784e47787ef38dd04ca751f,2025-02-03T15:15:19.603000 CVE-2024-43099,0,0,7fb5b3a3641a114d0dbda5969491e20e79493c82b2229b8431c4fab73912a211,2024-09-14T11:47:14.677000 @@ -267426,7 +267426,7 @@ CVE-2024-44147,0,0,0010b4e6f55ac982db2f0d22f0bf5765f6a7a167f9f9e0d3c647be24e3c70 CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000 CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000 CVE-2024-44151,0,0,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000 -CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000 +CVE-2024-44152,0,1,7a7a0a7282d399fdff70a8c927df72e5141929745d24a60a917ba2999ca54cc8,2025-03-19T14:15:36.703000 CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,89a24bfbf234a70641ab7749eab7b5da9037b819fafebdffc1a16e298ce587bb,2025-03-18T19:15:44.260000 CVE-2024-44155,0,0,dd8c2f2995ac2dd10c9ef39e8cc88034d185cb75998040610feb68362606bf0f,2025-03-18T19:15:44.467000 @@ -268081,7 +268081,7 @@ CVE-2024-45235,0,0,462ae6816185738fa34814bdc082285af9bb3670e44f64ad6e7c839ac8e78 CVE-2024-45236,0,0,10a3f25b1ce0fad9bae9efcffb3b32f23962c65836cda92b85e58e7719d1f481,2024-08-27T15:48:05.687000 CVE-2024-45237,0,0,8d0848c5954ca709a4ae70b4b78d8928a8c3e70a6fc3cc7805b63f3324320128,2024-08-27T15:48:34.030000 CVE-2024-45238,0,0,48fd855edea987481de083e60b583119b838c97c2f2219b92f30f3c9aed602d5,2024-08-26T16:35:13.637000 -CVE-2024-45239,0,0,ce62a7c9f68fbc3e39168952ca22874ec7092ed70581d5bdc84358a9b5fe364a,2024-08-27T15:49:31.417000 +CVE-2024-45239,0,1,308ad4017eec50af32375d82991c06ade20cb132c31cbe263f6c3c9bb55e3d3a,2025-03-19T14:15:36.867000 CVE-2024-4524,0,0,1a29c8363e54142cc04ff20a6c077338074ef9e68a92e0da5cb57a49d3b660ca,2025-02-19T18:02:32.757000 CVE-2024-45240,0,0,a153a5aa66216b02c77221395996978741fedbb71234eea04b7daf427a770991,2024-11-05T22:35:10.623000 CVE-2024-45241,0,0,969a49dfd5da3343c207df3cb1b1cc1199ba4de4eb98ea86e16e4fe39d572348,2024-08-26T16:35:14.650000 @@ -268407,7 +268407,7 @@ CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2 CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000 CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000 CVE-2024-45643,0,0,50fab40ddb7c4d5d733822515e92d29c9d1df8bc52244fdea80f3613919e43c1,2025-03-14T15:15:42.820000 -CVE-2024-45644,1,1,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000 +CVE-2024-45644,0,0,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000 CVE-2024-45647,0,0,99690f8ec38bd0cb79a3ca6e5d0b11de3bd4c9f2564c73834cc738f80a3b4cff,2025-01-29T21:11:50.207000 CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000 CVE-2024-45650,0,0,4e5537e03b2a804010ec65f14134e876717537795080f933ff3b04a2def30a14,2025-01-31T15:15:13.350000 @@ -268851,7 +268851,7 @@ CVE-2024-46559,0,0,574bb782de67d3ca843eb7dadf7886c850048a085dbeb205a59363fd8a35f CVE-2024-4656,0,0,6d241fc1cd2c4b7cf0efdf2dccdedfe28029ef7d9e8fd963203fc60e3122a942,2024-11-21T09:43:19.090000 CVE-2024-46560,0,0,a586c31a90480257b3b10d2df129325a006d5274100f26e7023a1ac0621f5b47,2025-03-14T16:15:35.920000 CVE-2024-46561,0,0,c25954c2fd9d3ad9e3b0bbe0be5d2cc787aa6e3078e6f23b1b9e5e3ce54e8b97,2024-09-24T16:41:54.337000 -CVE-2024-46564,0,0,e3650601e6103c25c0638469ece4f175000c7656b133c286eaafe2153db2c0e0,2024-09-24T16:41:55.907000 +CVE-2024-46564,0,1,e60856fed0c5c52ec0575c0a0cf7d21f60315a4cf6ad706c961eaee2c7364f69,2025-03-19T14:15:37.093000 CVE-2024-46565,0,0,f5657924f5aa18ab256492c2fb84533af8b2d2b6dc20c817da65bf4bfa08a6a2,2025-03-13T16:15:23.200000 CVE-2024-46566,0,0,a645300cad5cbc9678845ef13387d0ff84f678de8f2f73f755a1a4420c48c73c,2025-03-18T21:15:30.230000 CVE-2024-46567,0,0,dc3cb195e900cad9c5ba8c571a707de430f78c6e79b59e5d2ca6aa377b09ee20,2025-03-18T16:15:24.277000 @@ -270480,7 +270480,7 @@ CVE-2024-48784,0,0,0480c0cbca95176a3691abe719169608ed92e96fcba60ce2d516ea18e95c0 CVE-2024-48786,0,0,bbe4462c021ce09fcf89f5b2a0dcd0f951296fd770a62d8b0d79a432dfee8ecc,2024-10-15T19:35:43.413000 CVE-2024-48787,0,0,6564c1e5dbdb27e3c0da30d8c57cbe4f0f15455d949b017d5245d35b4ceece19,2024-10-15T19:35:44.190000 CVE-2024-48788,0,0,8b8214a71f356be931cff2267f2702ed7740182cbb0eb5f3d3efd807a79c28bc,2024-10-15T19:35:44.980000 -CVE-2024-48789,0,0,f8ae2ce83f7bf2d0047756f47e3e493d33946c0823d005b7c7c693bbc20847e9,2024-10-15T15:35:19.560000 +CVE-2024-48789,0,1,67cfce7daeaffa58ebeccb4737bd5b5552cbc794635a12c93461c29c61a25e83,2025-03-19T14:15:37.263000 CVE-2024-4879,0,0,7c395d6e4031631ba9ee91c0f43da9eb3fc030b6d50ab41e344463ed9baa2ff0,2024-11-27T19:07:32.497000 CVE-2024-48790,0,0,927501c5af40d914a6b115eaf64ce905b5d2c59b8ad73c575fddb443d1f4656e,2024-10-16T19:35:13.893000 CVE-2024-48791,0,0,9bb2b832e1e23b3a96788cb485be5297b76b1fc9e62778e7aade734bd9ca825d,2024-10-15T15:35:19.917000 @@ -274864,7 +274864,7 @@ CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0 CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000 CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000 CVE-2024-54518,0,0,d38c926bb772a5ff5d57f8a717fd3f35da4b9e51aa8e226408c9ace4c51813f4,2025-03-14T13:52:08.567000 -CVE-2024-54519,0,0,53097084da19dd38b3872df86440f9d1c2398ee8c0c32a99274a20e3f8ad0a33,2025-03-04T16:02:20.193000 +CVE-2024-54519,0,1,038d1614cfbdc4572202581f7fbe878fb47b32cab7391d269a22f5ea96706a76,2025-03-19T14:15:37.577000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54520,0,0,18b891d1690a96408f82842735c71853309121502ff683d7104fb85f6fd3edce,2025-03-04T16:04:48.440000 CVE-2024-54522,0,0,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000 @@ -275193,6 +275193,7 @@ CVE-2024-55548,0,0,60ec3cfbffa02335f07d92ff09758467617c9784164eac84c7091a0b78c95 CVE-2024-55549,0,0,e40a4c580768b58c769dfa4be1cd90fded892afed66fc33fbb18edf2d01cebbf,2025-03-14T02:15:15.333000 CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000 +CVE-2024-55551,1,1,d05413b76fecbece613f7fd256c99c60af75cf161dd1a411dbd915fd8153a063,2025-03-19T14:15:37.733000 CVE-2024-55553,0,0,7eeb75a14e5e1d77aed9e75af34c2f5c49991b3437b2609ee4ab7150515fb433,2025-01-23T18:15:31.327000 CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000 CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000 @@ -275626,7 +275627,7 @@ CVE-2024-56300,0,0,fd8f91c54d7b2d2f0c20bf657c6cc558d46dbec655d8d7ad2230066619d3c CVE-2024-56301,0,0,f46c9c676999b63d81039c9a073e3c1760c3de4da85396c862849172997d41f7,2025-01-13T14:15:09.887000 CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000 CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc795440,2024-11-21T09:48:03.210000 -CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000 +CVE-2024-56310,0,1,81cb9cd8f363d6d459acd5f1bfeec92cede3b03d846b7830ab32877ba7e765a8,2025-03-19T14:15:37.850000 CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000 CVE-2024-56312,0,0,ec6ad9e3aff51a846de9bba86b7c3a52a17ae2fffb31510f4ca2dae81601a513,2025-03-18T15:15:57.893000 CVE-2024-56313,0,0,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000 @@ -276149,7 +276150,7 @@ CVE-2024-57019,0,0,51cc8b086b8447cea4ec896f4a4e59d09678a95b81b389fa4b6049d603cd1 CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000 CVE-2024-57020,0,0,9454e1c3b56fc45c0cf376ca86b2277ead569dba13637690be836b10ddc0b8da,2025-03-18T19:15:46.330000 CVE-2024-57021,0,0,0783ac9280f5195c94c82d43c182876342e5cdb245119e654e821d65ed0809e6,2025-03-10T17:26:48.597000 -CVE-2024-57022,0,0,1356d2451b9537ddd5990de88e26abbbe2cccf3f2db031034069b49632d38abe,2025-03-10T17:27:02.037000 +CVE-2024-57022,0,1,c99a0b15c70fa516c5e22b536ddcece1907ef44e69d46228494e189b49dab6e4,2025-03-19T14:15:38.007000 CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000 CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000 CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000 @@ -276316,7 +276317,7 @@ CVE-2024-57439,0,0,6e64e016f192ab733e54f5a3035d1b158d0cb22bcd6abee8112395eba7b19 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137ddf,2024-11-21T09:48:16.423000 CVE-2024-57450,0,0,d39c86b260ea84f1a2f257f30527cffe772404e6d44d8d70c9ac83512b1d5bb2,2025-03-15T16:15:13.963000 -CVE-2024-57451,0,0,457f8d0d04958505765bd5482d60461b04ad42fa6a9db7053da5d51c60da0d3a,2025-02-18T19:15:22.057000 +CVE-2024-57451,0,1,2db3406871d80bd68bbad68d68fa327b18fbac1129e57466460b4f3ccd88e278,2025-03-19T14:15:38.187000 CVE-2024-57452,0,0,69b2caf34cf7071b96ea6471a5e6fc7e5be69ea985d031aa0ac8d466b99d25d7,2025-02-04T20:15:49.260000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000 @@ -276476,7 +276477,7 @@ CVE-2024-57720,0,0,c6ea7c04d1f31cae7cfb088d00930ccdd0afdbf506292dce573bf98c3a055 CVE-2024-57721,0,0,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000 CVE-2024-57722,0,0,fe5f4b3d273b2bf55fcc76e08e5390fbe140aa7e5c09f86912f960a4c7a9604f,2025-03-14T18:15:31.113000 CVE-2024-57723,0,0,c92af6f34b1e7a77bd52395245ab2a0062aa33af3c30b437ed91059e3220852d,2025-03-18T21:15:32.023000 -CVE-2024-57724,0,0,43482da76e1d3664f5827ca7ff902585915c01a2cfee87e8119ace671edec575,2025-02-18T20:15:23.023000 +CVE-2024-57724,0,1,487089e408f484b4e1d087661cae83e75947526a640613ebbcac96e43dd9db55,2025-03-19T14:15:38.337000 CVE-2024-57725,0,0,37c96803862b631e561de51a48e8624822d17dc31067e76ef4d04e27dbd1c96e,2025-02-18T15:15:17.067000 CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000 CVE-2024-57727,0,0,40a8243c73e2ffb483061a8498545f248d48c8fe22413e0fd73f6459bc3cda9b,2025-03-14T20:01:25.483000 @@ -283037,7 +283038,7 @@ CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9 CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000 CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000 -CVE-2025-2280,0,0,c600ee299db6fbe4dea5dbc115e68093f4f6491d41513b4303a551f9be05f78f,2025-03-18T17:15:47.873000 +CVE-2025-2280,0,1,f4a48035829663cfae86ea311e78db4fe353e4689096d30459dc2c2261cf7c40,2025-03-19T14:15:39.743000 CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000 CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 @@ -283955,7 +283956,7 @@ CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000 CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 CVE-2025-24108,0,0,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000 -CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c988,2025-03-04T15:26:30.650000 +CVE-2025-24109,0,1,8eb130cf27592d50192927f1b19c4211e2d1fcf396c33ec739b688659623e038,2025-03-19T14:15:38.700000 CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000 CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000 CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf354517c,2025-02-04T22:15:42.030000 @@ -283993,7 +283994,7 @@ CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981 CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000 CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000 CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e8852d,2025-03-03T22:51:31.440000 -CVE-2025-24159,0,0,3b398e5ec735d86e63a66bb20838217a4d8bb188393327507b8a692d20b032c8,2025-03-04T14:57:16.473000 +CVE-2025-24159,0,1,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6096,2025-03-19T14:15:38.853000 CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000 CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000 CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000 @@ -284516,7 +284517,7 @@ CVE-2025-25106,0,0,5adf6027f92cb35d0099585e7a65f3fb0596ff1c0a8b0759d2eee782d9073 CVE-2025-25107,0,0,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000 CVE-2025-25108,0,0,4216f31163792796c6d7a76b0dff1cbbb671cc5df74f5753efeaa4b4e5746e06,2025-03-03T14:15:50.767000 CVE-2025-25109,0,0,6d682a3d6df717c26d33e232bce785fcc26b0d6fbdfb125423df3b58afab6248,2025-03-03T14:15:50.907000 -CVE-2025-2511,1,1,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000 +CVE-2025-2511,0,0,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000 CVE-2025-25110,0,0,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000 CVE-2025-25111,0,0,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000 CVE-2025-25112,0,0,6606855c1cd27f20e8867aa9a0e41193608500ababbffad4e75be64d9d182194,2025-03-03T14:15:51.050000 @@ -284527,7 +284528,7 @@ CVE-2025-25116,0,0,bcf37afc318f5e9ac3f628960ea4fa413ee951eab0cc5618b798180318935 CVE-2025-25117,0,0,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000 CVE-2025-25118,0,0,367270eb5aa7e76ca009abbeed8d68dc0bd7338562d262954a33f7fa4cf2772a,2025-03-03T14:15:51.610000 CVE-2025-25119,0,0,f12a4fb304e58f7685a75296c77c9d95278051f76c1b47108438f8d261173f37,2025-03-03T14:15:51.750000 -CVE-2025-2512,1,1,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000 +CVE-2025-2512,0,0,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000 CVE-2025-25120,0,0,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000 CVE-2025-25121,0,0,affb830fba7b58ecca3c4dde16bde250272ea421c2c05bb933f1730e460c4449,2025-03-03T14:15:51.887000 CVE-2025-25122,0,0,c7933c3b08bb5046faca8cf2e06c3abb9ff38205e55e352fa2bc9dd4eb25abca,2025-03-03T14:15:52.033000 @@ -284695,7 +284696,7 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000 CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000 -CVE-2025-25500,0,0,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000 +CVE-2025-25500,0,1,da1c898cfcbd810f078b7294d1eec0d9905e50224c954d32d8cd7908e965ddf3,2025-03-19T14:15:39.033000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000 CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000 @@ -284728,7 +284729,7 @@ CVE-2025-25586,0,0,744a470f770a9515b6f7dfb52c66d60af37830e5dc13b1912db087fb3afac CVE-2025-25589,0,0,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000 CVE-2025-25590,0,0,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000 CVE-2025-25595,0,0,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000 -CVE-2025-25598,0,0,77f039cd06718093e1c276e16fe184c5d4efc61143dbb11eacdc3787cfa066aa,2025-03-13T18:15:50.857000 +CVE-2025-25598,0,1,ea8ff451786059144f97b5402e36a3bbb5df978993f22c0b25b2578aad85418d,2025-03-19T14:15:39.140000 CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 @@ -284892,8 +284893,8 @@ CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2 CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000 CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000 CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000 -CVE-2025-26263,0,0,33c82bcdd68cdcef2d06780800c3ab6c6f6af78532f2208935cfab51d7c78d3f,2025-03-17T06:15:24.630000 -CVE-2025-26264,0,0,78a1bd2e43e9b3b3479a5073d67ff29ef6c7b849522e2d6fc7c934784cc466cb,2025-03-17T06:15:25.070000 +CVE-2025-26263,0,1,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000 +CVE-2025-26264,0,1,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 @@ -285068,11 +285069,11 @@ CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66b CVE-2025-26699,0,0,e88af5cce40368f723e525bfe75ade49611d14fa54ea6a0ae28e1d64f24ae73d,2025-03-06T19:15:27.683000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 CVE-2025-26701,0,0,89b8b735021c8ba1b57a31289c67376fd76e788ad77a06946ec19e6114a95335,2025-03-11T18:15:33.210000 -CVE-2025-26702,0,0,52293558e0b7c22cf2e8f2ca3cd772feb4c403ac4e7748fff5fc7c1ca294fde9,2025-03-11T07:15:34.133000 -CVE-2025-26703,0,0,094c28df5cba22d3b953f9d7043ec8e7fd878498977b463b336b76b278bde734,2025-03-11T07:15:34.580000 -CVE-2025-26704,0,0,7df36e8590b1e0c4f22127c1f776f171e7128457eb7e10f2d3d1ede0719a6c5e,2025-03-11T07:15:34.967000 -CVE-2025-26705,0,0,6e647080e395211b558a87f67b0324083d4c877d83b69fccf1c9b798f8ff4d63,2025-03-11T07:15:35.330000 -CVE-2025-26706,0,0,c64ce4dfa97ebe74ab023bc4aec6b6c65436ef95ad63caeb02e265c0af10d6a2,2025-03-11T07:15:35.703000 +CVE-2025-26702,0,1,1839f93bfb7ace4325903035b3bb74add19b6f08607cfe0196f58c5d53bcb05c,2025-03-19T14:08:01.357000 +CVE-2025-26703,0,1,5d0f4e93d2d8f53943eec95a19382fdc01adc6b71ca5902ffd41b3078a42a0fe,2025-03-19T14:09:38.080000 +CVE-2025-26704,0,1,419ed24de70dea575c53e5d2943423e1ee68404dd42f3936f3e41631976d677a,2025-03-19T14:11:17.600000 +CVE-2025-26705,0,1,60ec52a3a37b8a1198549fd1a80bc727c4794d468b4358c4011967c60a257f05,2025-03-19T14:12:26.253000 +CVE-2025-26706,0,1,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e749e2,2025-03-19T14:15:36.417000 CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000 CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000 CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000 @@ -285526,16 +285527,16 @@ CVE-2025-28010,0,0,0a11d87519d9b22f0f2ae9be8ae1be8db80c1ae4bdfd1cb8d0cf77b19c42d CVE-2025-28011,0,0,2a370ee125823dd49484207db37abe8d21873504d43764feea8f4c2dabc113d2,2025-03-13T17:15:37.530000 CVE-2025-28015,0,0,0603e9cbef2e5ee55344938ebfb39b43a9cec4a734d3544a5d237aff3bf7420a,2025-03-13T16:15:27.810000 CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000 -CVE-2025-28857,0,0,7639d5f3953225b459d1bad1ea0b4ccaa2504977cf138c727b6fb2178ec9f366,2025-03-11T21:15:42.903000 -CVE-2025-28859,0,0,6f1cc910637d00c9ac6a4de42a12398aecbc5ea7960b119921c942487abc24e7,2025-03-11T21:15:43.050000 -CVE-2025-28860,0,0,6a8a0b0b17c320bdd0b234f5d94b4edbc9f7bbc4a57c83549a224117fd3464a8,2025-03-11T21:15:43.193000 -CVE-2025-28861,0,0,8cd4229cbec76109810d5b343e5b05de1f3301639f651f97050ebe36e9bcd987,2025-03-11T21:15:43.337000 -CVE-2025-28862,0,0,498e18a442d30fb8e225f96e842cc7c3a56b99221a7a581ac6944ff55b2dd6f4,2025-03-11T21:15:43.490000 -CVE-2025-28863,0,0,3800fe89a39973b6b1231d056a9a553d8b250263bbb47326e4368baee010353b,2025-03-11T21:15:43.647000 -CVE-2025-28864,0,0,476816835ccebd5f68ac74b6072001d700dfb9d6006755533c883c8ada0f5cce,2025-03-11T21:15:43.810000 -CVE-2025-28866,0,0,e6e8567798ae0e1def137ae8a79778279de6d299a623ad6b571a34e8fbecf55b,2025-03-11T21:15:43.970000 +CVE-2025-28857,0,1,e1c738bc9844b1bfe2c67596adaf7c2a8564c2cc541068f87b173d55a262a1b8,2025-03-19T13:41:38.270000 +CVE-2025-28859,0,1,1a821bc58dbd31b9f48e7a0ed4774a6a9b375dee8d99a0455626f76a2b5564f8,2025-03-19T14:01:43.707000 +CVE-2025-28860,0,1,66dc2154f8e6a7d5fe774501386200cf25568fdb5590c8e79b061d6b8471f51a,2025-03-19T14:06:00.333000 +CVE-2025-28861,0,1,8f06dd797c877ac540417e774f13db9bcbfcb5efd0679398413b1a7d851d0a33,2025-03-19T14:08:16.920000 +CVE-2025-28862,0,1,262a0346545485f6d48b7aaaaae4bfd67403a534df363d75e6b444693b4d15c9,2025-03-19T14:13:16.610000 +CVE-2025-28863,0,1,30697552adbf533d5aedc6bffbf20d0c5bb50d79e9020ff1669e6e6b9af3055d,2025-03-19T14:14:18.080000 +CVE-2025-28864,0,1,fa24a3929b56ed50394276a64f3f8bff3c17a1ca074b88848c593735e282f43a,2025-03-19T14:16:41.287000 +CVE-2025-28866,0,1,6216179861a4260f9ff8f846c033be3d21e175874bd3a83d400d670ba4d4e4a8,2025-03-19T14:17:39.090000 CVE-2025-28867,0,0,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000 -CVE-2025-28868,0,0,09db76947750674e0f3b002c373925c37261fe218f54cb6c55eebe5eeb4518c8,2025-03-11T21:15:44.283000 +CVE-2025-28868,0,1,cb75dcce807bf86a4d7596310f6bed7a2a7832b4c4f7cc8be6554b5078689d39,2025-03-19T14:27:00.497000 CVE-2025-28870,0,0,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000 CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000 CVE-2025-28872,0,0,f3b7d21384421d1eeb12498b153df5e281517aad4a4d3aff96a3e023ae3b23ad,2025-03-11T21:15:44.757000 @@ -285622,7 +285623,7 @@ CVE-2025-29786,0,0,0c40fa5408515757638473e28641812347d31da5efea9c126f50ced0bd11d CVE-2025-29787,0,0,f2e861b6c4dbf868707fba7b3fb131d1b9814d3e4021455a52a8a2d5236bf0cb,2025-03-17T14:15:22.447000 CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435bf11,2025-03-17T14:15:22.653000 CVE-2025-29790,0,0,675222ea0eab8ae3f29f8b94428bcad2e1e1b41b05f6926d11004b88739188d2,2025-03-18T19:15:50.813000 -CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000 +CVE-2025-29891,0,1,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 CVE-2025-29907,0,0,cfa2108f203bb2d21cc6fdede35a67ff448b143468e6b33a2073415a2c48ea4c,2025-03-18T19:15:51.197000